A flaw was found in libsolv. This stack-based buffer overflow vulnerability occurs in libsolv's Debian metadata parser when processing specially crafted Debian repository metadata. An attacker could exploit this by providing malicious SHA384 or SHA512 checksum tags, leading to memory corruption and a denial of service (DoS) in the affected system.

Project Subscriptions

Vendors Products
Red Hat Subscribe
Red Hat Satellite 6 Subscribe
Enterprise Linux Subscribe
Hardened Images Subscribe
Hummingbird Subscribe
Openshift Subscribe
Openshift Container Platform Subscribe
Satellite Subscribe
Update Infrastructure Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

To mitigate this issue, ensure that libsolv only processes trusted and cryptographically signed Debian repository metadata. Avoid ingesting or processing `Packages` files from untrusted or unverified sources.

History

Thu, 21 May 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Red Hat
Red Hat red Hat Satellite 6
Redhat hardened Images
Redhat openshift Container Platform
Redhat update Infrastructure
Vendors & Products Red Hat
Red Hat red Hat Satellite 6
Redhat hardened Images
Redhat openshift Container Platform
Redhat update Infrastructure

Thu, 21 May 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 20 May 2026 23:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in libsolv. This stack-based buffer overflow vulnerability occurs in libsolv's Debian metadata parser when processing specially crafted Debian repository metadata. An attacker could exploit this by providing malicious SHA384 or SHA512 checksum tags, leading to memory corruption and a denial of service (DoS) in the affected system.
Title Libsolv: stack-based buffer overflow in libsolv's debian metadata parser when handling sha384/sha512 checksums
First Time appeared Redhat
Redhat enterprise Linux
Redhat hummingbird
Redhat openshift
Redhat rhui
Redhat satellite
Weaknesses CWE-121
CPEs cpe:/a:redhat:hummingbird:1
cpe:/a:redhat:openshift:4
cpe:/a:redhat:rhui:4::el8
cpe:/a:redhat:satellite:6
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat hummingbird
Redhat openshift
Redhat rhui
Redhat satellite
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-05-21T14:25:03.871Z

Reserved: 2026-05-20T22:15:47.147Z

Link: CVE-2026-9150

cve-icon Vulnrichment

Updated: 2026-05-21T14:03:33.408Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-20T23:16:36.010

Modified: 2026-05-21T15:26:35.653

Link: CVE-2026-9150

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-20T22:59:46Z

Links: CVE-2026-9150 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T08:18:35Z

Weaknesses