CVE-2025-12105Use After Free in Libsoup

CWE-416Use After Free8 documents8 sources
Severity
7.5HIGHNVD
EPSS
0.1%
top 79.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 23
Latest updateDec 15

Description

A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affected application. Attackers could exploit this behavior remotely by triggering specific HTTP/2 read and

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

CVEListV5gnome/libsoup3.6.5

🔴Vulnerability Details

3
CVEList
Libsoup: heap use-after-free in libsoup message queue handling during http/2 read completion2025-10-23
OSV
CVE-2025-12105: A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2025-10-23
GHSA
GHSA-gppq-jw9r-4v4j: A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2025-10-23

📋Vendor Advisories

4
Ubuntu
libsoup vulnerability2025-12-15
Red Hat
libsoup: Heap Use-After-Free in libsoup message queue handling during HTTP/2 read completion2025-10-23
Microsoft
Libsoup: heap use-after-free in libsoup message queue handling during http/2 read completion2025-10-14
Debian
CVE-2025-12105: libsoup2.4 - A flaw was found in the asynchronous message queue handling of the libsoup libra...2025