Description
A flaw was found in the cookie date handling logic of the libsoup HTTP library, widely used by GNOME and other applications for web communication. When processing cookies with specially crafted expiration dates, the library may perform an out-of-bounds memory read. This flaw could result in unintended disclosure of memory contents, potentially exposing sensitive information from the process using libsoup.
References (16)
Core 16
Core References
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:18183
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:19713
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:19714
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:20959
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:21032
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:21655
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:21656
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:21657
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:21664
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:21665
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:21666
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:21772
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2025:22013
Vendor Advisory vdb-entry
x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2025-11021
Issue Tracking issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2399627
Scores
CVSS v3
7.5
EPSS
0.0008
EPSS Percentile
22.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (17)
Red Hat/Red Hat Enterprise Linux 10
0:3.6.5-3.el10_0.7
Red Hat/Red Hat Enterprise Linux 10
0:3.6.5-3.el10_1.6
Red Hat/Red Hat Enterprise Linux 6
Red Hat/Red Hat Enterprise Linux 7 Extended Lifecycle Support
0:2.62.2-9.el7_9
Red Hat/Red Hat Enterprise Linux 8
0:2.62.3-10.el8_10
Red Hat/Red Hat Enterprise Linux 8.2 Advanced Update Support
0:2.62.3-1.el8_2.6
Red Hat/Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
0:2.62.3-2.el8_4.6
Red Hat/Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
0:2.62.3-2.el8_4.6
Red Hat/Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
0:2.62.3-2.el8_6.6
Red Hat/Red Hat Enterprise Linux 8.6 Telecommunications Update Service
0:2.62.3-2.el8_6.6
... and 7 more
Published
Sep 26, 2025
Tracked Since
Feb 18, 2026