Improper Handling of Case Sensitivity Affecting libsoup3-debugsource package, versions <0:3.6.5-3.el10_0.6


Severity

Recommended
high

Based on Rocky Linux security rating.

Threat Intelligence

EPSS
0.03% (7th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ROCKY10-LIBSOUP3DEBUGSOURCE-13294265
  • published5 Oct 2025
  • disclosed29 Apr 2025

Introduced: 29 Apr 2025

CVE-2025-4035  (opens in a new tab)
CWE-178  (opens in a new tab)

How to fix?

Upgrade Rocky-Linux:10 libsoup3-debugsource to version 0:3.6.5-3.el10_0.6 or higher.
This issue was patched in RLSA-2025:8128.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libsoup3-debugsource package and not the libsoup3-debugsource package as distributed by Rocky-Linux. See How to fix? for Rocky-Linux:10 relevant fixed versions and status.

A flaw was found in libsoup. When handling cookies, libsoup clients mistakenly allow cookies to be set for public suffix domains if the domain contains at least two components and includes an uppercase character. This bypasses public suffix protections and could allow a malicious website to set cookies for domains it does not own, potentially leading to integrity issues such as session fixation.

CVSS Base Scores

version 3.1