CVE-2026-9150
Description
A flaw was found in libsolv. This stack-based buffer overflow vulnerability occurs in libsolv's Debian metadata parser when processing specially crafted Debian repository metadata. An attacker could exploit this by providing malicious SHA384 or SHA512 checksum tags, leading to memory corruption and a denial of service (DoS) in the affected system.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stack-based buffer overflow in libsolv's Debian metadata parser allows denial of service via crafted SHA384 or SHA512 checksums.
Vulnerability
A stack-based buffer overflow vulnerability exists in libsolv's Debian metadata parser, specifically in the control2solvable() function. The flaw occurs when processing specially crafted Debian repository metadata containing SHA384 or SHA512 checksum tags. The checksum string is copied into a stack-allocated buffer of size char checksum[32 * 2 + 1] (65 bytes), but SHA384 (96 hex chars) and SHA512 (128 hex chars) checksums exceed this capacity, leading to memory corruption. Affected versions include all libsolv releases prior to the fix implemented in pull request #616 [2][3].
Exploitation
An attacker can exploit this vulnerability by providing a malicious Debian repository metadata file (e.g., a Packages file) that includes a SHA384: or SHA512: tag with an overly long checksum value. When libsolv parses this metadata using tools such as deb2solv, the strcpy() operation in control2solvable() writes beyond the allocated buffer [3]. The attacker does not require authentication; the vulnerability is triggered simply by feeding the crafted data to a libsolv-based application. No user interaction is needed beyond the processing of the repository metadata [1].
Impact
Successful exploitation results in memory corruption, leading to a denial of service (DoS). The crash is observed as a stack-buffer-overflow error, as demonstrated with AddressSanitizer output showing a write of 129 bytes into a 65-byte buffer [3]. The impact is limited to availability, with potential for application termination or instability. No code execution or privilege escalation has been reported [1].
Mitigation
The fix is available in libsolv pull request #616, which enlarges the checksum buffer to accommodate SHA384 and SHA512 strings [3]. Users should update libsolv to a version containing this patch. Red Hat has assigned this CVE with medium severity and is tracking it in Bugzilla [2]. As of the publication date (2026-05-20), no EOL or KEV listing has been noted, and the fix is pending inclusion in downstream distributions.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.