Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12105: Use After Free in GNOME libsoup

0
High
VulnerabilityCVE-2025-12105cvecve-2025-12105
Published: Thu Oct 23 2025 (10/23/2025, 09:14:14 UTC)
Source: CVE Database V5
Vendor/Project: GNOME
Product: libsoup

Description

A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affected application. Attackers could exploit this behavior remotely by triggering specific HTTP/2 read and cancel sequences, resulting in a denial-of-service condition.

AI-Powered Analysis

AILast updated: 12/26/2025, 05:36:15 UTC

Technical Analysis

CVE-2025-12105 is a use-after-free vulnerability discovered in the libsoup library, a core GNOME component widely used by GNOME and WebKit-based applications to handle HTTP/2 communications. The vulnerability stems from a flaw in the asynchronous message queue management where, under certain timing conditions during network operation aborts, an internal message queue item is freed twice due to missing state synchronization. This double-free leads to a use-after-free memory access, which can cause the affected application to crash. The vulnerability can be triggered remotely without authentication or user interaction by sending specifically crafted HTTP/2 read and cancel sequences that exploit the timing window. The impact is primarily denial-of-service (DoS), as the application crashes disrupt service availability. The CVSS v3.1 score is 7.5 (high severity) reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. No confidentiality or integrity impacts are noted. The vulnerability affects all versions of libsoup as no version-specific fixes are indicated yet. While no known exploits are currently reported in the wild, the widespread use of libsoup in GNOME desktop environments and WebKit-based browsers and applications makes this a significant threat. Attackers could leverage this flaw to disrupt services or cause application instability remotely, impacting user experience and potentially critical services relying on these libraries.

Potential Impact

For European organizations, the primary impact of CVE-2025-12105 is denial-of-service through application crashes in software that uses libsoup for HTTP/2 communication. This can affect desktop environments, browsers, and other applications built on GNOME or WebKit frameworks, potentially disrupting business operations, user productivity, and service availability. Critical infrastructure or public-facing services relying on these technologies could experience outages or degraded performance. Although no direct data breach or integrity compromise is involved, the loss of availability can have cascading effects, especially in sectors like finance, government, healthcare, and telecommunications where GNOME-based systems or WebKit browsers are prevalent. The remote, unauthenticated nature of the exploit increases the risk of widespread attacks, including automated scanning and exploitation attempts. Organizations with large deployments of Linux desktops or applications using libsoup should prioritize mitigation to maintain operational continuity.

Mitigation Recommendations

1. Monitor official GNOME and libsoup project channels for patches or updates addressing CVE-2025-12105 and apply them promptly once available. 2. In the interim, implement network-level controls to detect and block suspicious or malformed HTTP/2 traffic patterns that could trigger the vulnerability, such as unusual read and cancel sequences. 3. Employ application-level monitoring to detect abnormal crashes or instability in GNOME and WebKit-based applications, enabling rapid incident response. 4. Where feasible, consider disabling or restricting HTTP/2 support in affected applications until patches are applied, especially in high-risk environments. 5. Conduct internal audits to identify all systems and applications using libsoup to ensure comprehensive coverage of mitigation efforts. 6. Educate IT and security teams about the vulnerability to improve detection and response capabilities. 7. Use sandboxing or containerization to limit the impact of potential crashes on critical systems. 8. Maintain robust backup and recovery procedures to minimize downtime in case of denial-of-service incidents.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-10-23T08:25:39.401Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f9f347eae24e6f559392cb

Added to database: 10/23/2025, 9:20:07 AM

Last enriched: 12/26/2025, 5:36:15 AM

Last updated: 2/8/2026, 5:10:13 AM

Views: 214

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats