CVE-2025-4945

EUVD-2025-16034
A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in undefined behavior, allowing an attacker to bypass cookie expiration logic, causing persistent or unintended cookie behavior. The issue stems from improper validation of large integer inputs during date arithmetic operations within the cookie parsing routines.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
redhatCNA
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 47%
Debian logo
Debian Releases
Debian Product
Codename
libsoup2.4
bookworm
no-dsa
bullseye
vulnerable
bullseye (security)
2.72.0-2+deb11u3
fixed
trixie
no-dsa
libsoup3
bookworm
no-dsa
forky
3.6.6-1
fixed
sid
3.6.6-1
fixed
trixie
3.6.5-3
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libsoup2.4
bionic
Fixed 2.62.1-1ubuntu0.4+esm6
released
focal
Fixed 2.70.0-1ubuntu0.5+esm1
released
jammy
Fixed 2.74.2-3ubuntu0.6
released
noble
Fixed 2.74.3-6ubuntu1.6
released
oracular
ignored
plucky
Fixed 2.74.3-10ubuntu0.4
released
questing
Fixed 2.74.3-10.1ubuntu4
released
xenial
Fixed 2.52.2-1ubuntu0.3+esm5
released
libsoup3
focal
dne
jammy
Fixed 3.0.7-0ubuntu1+esm5
released
noble
Fixed 3.4.4-5ubuntu0.5
released
oracular
ignored
plucky
Fixed 3.6.5-1ubuntu0.2
released
questing
Fixed 3.6.5-3
released