Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12105: Use After Free in Red Hat Red Hat Enterprise Linux 10

0
High
VulnerabilityCVE-2025-12105cvecve-2025-12105
Published: Thu Oct 23 2025 (10/23/2025, 09:14:14 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affected application. Attackers could exploit this behavior remotely by triggering specific HTTP/2 read and cancel sequences, resulting in a denial-of-service condition.

AI-Powered Analysis

AILast updated: 10/23/2025, 09:27:29 UTC

Technical Analysis

CVE-2025-12105 is a high-severity use-after-free vulnerability discovered in the libsoup library, which is extensively utilized by GNOME and WebKit-based applications to manage HTTP/2 communications on Red Hat Enterprise Linux 10. The vulnerability stems from a race condition in the asynchronous message queue handling mechanism. Specifically, when network operations are aborted at precise timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This double-free leads to a use-after-free memory access, which can cause the affected application to crash, resulting in a denial-of-service (DoS) condition. The vulnerability can be exploited remotely by an attacker who crafts specific HTTP/2 read and cancel sequences to trigger the flaw without requiring any authentication or user interaction. Although the vulnerability does not compromise confidentiality or integrity, it severely impacts availability by crashing critical applications that rely on libsoup for HTTP/2 communication. The CVSS v3.1 base score is 7.5, reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. Currently, there are no known exploits in the wild, but the widespread use of libsoup in GNOME and WebKit-based applications on Red Hat Enterprise Linux 10 makes this a significant threat. The lack of available patches at the time of disclosure necessitates immediate attention from system administrators to monitor and prepare for updates.

Potential Impact

For European organizations, the primary impact of CVE-2025-12105 is the potential for denial-of-service attacks against systems running Red Hat Enterprise Linux 10 with GNOME or WebKit-based applications that utilize the libsoup library for HTTP/2 communications. This can disrupt critical services, especially in environments where these applications handle web communications or internal APIs. The availability impact could affect enterprise servers, cloud infrastructure, and desktop environments used in business operations, leading to downtime and potential operational losses. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely; however, service interruptions could degrade user trust and business continuity. Organizations in sectors such as finance, government, telecommunications, and technology, which heavily rely on Red Hat Enterprise Linux and open-source stacks, may experience higher risk. The remote exploitability without authentication increases the threat surface, particularly for publicly exposed services. The absence of known exploits currently provides a window for proactive mitigation, but the potential for future exploitation remains significant.

Mitigation Recommendations

1. Apply official patches from Red Hat as soon as they become available to address the use-after-free flaw in libsoup. 2. Until patches are deployed, restrict network exposure of services using libsoup, especially those handling HTTP/2 traffic, by implementing firewall rules or network segmentation. 3. Monitor network traffic for unusual HTTP/2 read and cancel sequences that could indicate exploitation attempts. 4. Employ application-level monitoring and logging to detect crashes or abnormal behavior in GNOME and WebKit-based applications. 5. Consider temporarily disabling or limiting HTTP/2 support in affected applications if feasible, to reduce the attack surface. 6. Conduct thorough testing of updated applications in staging environments to ensure stability post-patch. 7. Educate system administrators and security teams about the vulnerability specifics to enhance detection and response capabilities. 8. Maintain up-to-date inventories of systems running Red Hat Enterprise Linux 10 and dependent applications to prioritize remediation efforts. 9. Collaborate with Red Hat support channels for guidance and early access to fixes or workarounds. 10. Integrate this vulnerability into existing vulnerability management and incident response workflows for continuous risk assessment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-10-23T08:25:39.401Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f9f347eae24e6f559392cb

Added to database: 10/23/2025, 9:20:07 AM

Last enriched: 10/23/2025, 9:27:29 AM

Last updated: 10/23/2025, 10:29:57 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats