Source: libsoup3
Version: 3.6.6-1
Severity: important
Tags: security upstream
Forwarded: https://gitlab.gnome.org/GNOME/libsoup/-/issues/502
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libsoup3.

CVE-2026-5119[0]:
| A flaw was found in libsoup. When establishing HTTPS tunnels through
| a configured HTTP proxy, sensitive session cookies are transmitted
| in cleartext within the initial HTTP CONNECT request. A network-
| positioned attacker or a malicious HTTP proxy can intercept these
| cookies, leading to potential session hijacking or user
| impersonation.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-5119
    https://www.cve.org/CVERecord?id=CVE-2026-5119
[1] https://gitlab.gnome.org/GNOME/libsoup/-/issues/502

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to