A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in undefined behavior, allowing an attacker to bypass cookie expiration logic, causing persistent or unintended cookie behavior. The issue stems from improper validation of large integer inputs during date arithmetic operations within the cookie parsing routines.
Metrics
Affected Vendors & Products
References
History
Wed, 21 May 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:10 |
Tue, 20 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 20 May 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 19 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in undefined behavior, allowing an attacker to bypass cookie expiration logic, causing persistent or unintended cookie behavior. The issue stems from improper validation of large integer inputs during date arithmetic operations within the cookie parsing routines. | |
Title | Libsoup: integer overflow in cookie expiration date handling in libsoup | |
First Time appeared |
Redhat
Redhat enterprise Linux |
|
Weaknesses | CWE-190 | |
CPEs | cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-05-19T17:03:09.472Z
Updated: 2025-05-21T17:19:45.754Z
Reserved: 2025-05-19T04:46:20.918Z
Link: CVE-2025-4945

Updated: 2025-05-20T14:04:47.811Z

Status : Awaiting Analysis
Published: 2025-05-19T17:15:29.103
Modified: 2025-05-21T20:25:16.407
Link: CVE-2025-4945
