Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46420: Missing Release of Memory after Effective Lifetime

0
Medium
VulnerabilityCVE-2025-46420cvecve-2025-46420
Published: Thu Apr 24 2025 (04/24/2025, 12:58:01 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 8

Description

A flaw was found in libsoup. It is vulnerable to memory leaks in the soup_header_parse_quality_list() function when parsing a quality list that contains elements with all zeroes.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:07:02 UTC

Technical Analysis

CVE-2025-46420 identifies a memory leak vulnerability in the libsoup library, specifically within the soup_header_parse_quality_list() function. Libsoup is a widely used HTTP client/server library, integral to many Linux-based systems including Red Hat Enterprise Linux 8. The vulnerability arises when libsoup parses a quality list header containing elements that are all zeroes, failing to release allocated memory after the effective lifetime of these elements. This leads to a gradual memory leak, which can accumulate over time and degrade system performance or cause denial of service due to resource exhaustion. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. It requires no privileges and no authentication but does require user interaction, likely in the form of processing crafted HTTP headers. The attack vector is network-based, meaning an attacker can exploit this remotely by sending malicious HTTP requests to a vulnerable system. Although no exploits are currently known in the wild, the flaw could be leveraged in targeted denial of service attacks against systems relying on libsoup for HTTP communications. The vulnerability does not impact confidentiality or integrity but affects availability by exhausting memory resources. Red Hat Enterprise Linux 8 is explicitly mentioned as an affected product, and the vulnerability was published on April 24, 2025. No patches or exploit code are currently publicly available, but users should anticipate updates from Red Hat.

Potential Impact

The primary impact of CVE-2025-46420 is on system availability. The memory leak can cause gradual degradation of system performance and eventual denial of service if exploited repeatedly or at scale. This can disrupt critical services relying on HTTP communications through libsoup, including web servers, APIs, and other networked applications on Red Hat Enterprise Linux 8 systems. Organizations with high availability requirements may experience outages or degraded service quality. While the vulnerability does not compromise confidentiality or integrity, denial of service conditions can indirectly affect business continuity and operational reliability. Attackers can exploit this remotely without authentication, increasing the risk of widespread impact in exposed environments. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability remains a concern for security teams managing affected systems.

Mitigation Recommendations

To mitigate CVE-2025-46420, organizations should monitor Red Hat advisories for patches addressing this vulnerability and apply them promptly once available. In the interim, administrators can reduce exposure by limiting network access to services using libsoup, employing firewall rules to restrict incoming HTTP requests from untrusted sources. Implementing rate limiting or filtering on HTTP headers to detect and block suspicious quality list elements with all zeroes may help reduce exploit attempts. Regularly monitoring system memory usage and logs for unusual patterns can aid early detection of exploitation attempts. Additionally, consider isolating critical services using containerization or virtualization to limit the impact of potential denial of service. Security teams should also review and update incident response plans to address potential availability disruptions related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-24T01:37:42.412Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb077

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 2/27/2026, 2:07:02 PM

Last updated: 3/22/2026, 2:17:06 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses