Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options don’t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to a widespread installation base, or stability. It is strongly recommended to apply vendor-supplied patches once available.
Fri, 26 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 26 Sep 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 26 Sep 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in the cookie date handling logic of the libsoup HTTP library, widely used by GNOME and other applications for web communication. When processing cookies with specially crafted expiration dates, the library may perform an out-of-bounds memory read. This flaw could result in unintended disclosure of memory contents, potentially exposing sensitive information from the process using libsoup. | |
Title | Libsoup: out-of-bounds read in cookie date handling of libsoup http library | |
First Time appeared |
Redhat
Redhat enterprise Linux |
|
Weaknesses | CWE-125 | |
CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-26T15:36:39.595Z
Reserved: 2025-09-26T07:16:40.923Z
Link: CVE-2025-11021

Updated: 2025-09-26T15:36:35.222Z

Status : Awaiting Analysis
Published: 2025-09-26T09:15:31.370
Modified: 2025-09-26T14:32:19.853
Link: CVE-2025-11021


No data.