Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-32049

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-03 Apr, 2025 | 13:36
Updated At-29 Jul, 2025 | 07:19
Rejected At-
Credits

Libsoup: denial of service attack to websocket server

A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:03 Apr, 2025 | 13:36
Updated At:29 Jul, 2025 | 07:19
Rejected At:
▼CVE Numbering Authority (CNA)
Libsoup: denial of service attack to websocket server

A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).

Affected Products
Collection URL
https://gitlab.gnome.org/GNOME/libsoup/
Package Name
libsoup
Default Status
unknown
Versions
Affected
  • From 0 through 3.6.4 (semver)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 10
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup3
CPEs
  • cpe:/o:redhat:enterprise_linux:10.0
Default Status
affected
Versions
Unaffected
  • From 0:3.6.5-3.el10_0.6 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 7 Extended Lifecycle Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/o:redhat:rhel_els:7
Default Status
affected
Versions
Unaffected
  • From 0:2.62.2-6.el7_9 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/o:redhat:enterprise_linux:8::baseos
  • cpe:/a:redhat:enterprise_linux:8::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.62.3-9.el8_10 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/o:redhat:enterprise_linux:8::baseos
  • cpe:/a:redhat:enterprise_linux:8::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.62.3-9.el8_10 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.2 Advanced Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/a:redhat:rhel_aus:8.2::appstream
  • cpe:/o:redhat:rhel_aus:8.2::baseos
Default Status
affected
Versions
Unaffected
  • From 0:2.62.3-1.el8_2.5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/a:redhat:rhel_aus:8.4::appstream
  • cpe:/o:redhat:rhel_aus:8.4::baseos
Default Status
affected
Versions
Unaffected
  • From 0:2.62.3-2.el8_4.5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/o:redhat:rhel_aus:8.6::baseos
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/o:redhat:rhel_tus:8.6::baseos
  • cpe:/a:redhat:rhel_aus:8.6::appstream
  • cpe:/o:redhat:rhel_e4s:8.6::baseos
  • cpe:/a:redhat:rhel_tus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.62.3-2.el8_6.5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Telecommunications Update Service
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/o:redhat:rhel_aus:8.6::baseos
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/o:redhat:rhel_tus:8.6::baseos
  • cpe:/a:redhat:rhel_aus:8.6::appstream
  • cpe:/o:redhat:rhel_e4s:8.6::baseos
  • cpe:/a:redhat:rhel_tus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.62.3-2.el8_6.5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/o:redhat:rhel_aus:8.6::baseos
  • cpe:/a:redhat:rhel_e4s:8.6::appstream
  • cpe:/o:redhat:rhel_tus:8.6::baseos
  • cpe:/a:redhat:rhel_aus:8.6::appstream
  • cpe:/o:redhat:rhel_e4s:8.6::baseos
  • cpe:/a:redhat:rhel_tus:8.6::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.62.3-2.el8_6.5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8.8 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/a:redhat:rhel_eus:8.8::appstream
  • cpe:/o:redhat:rhel_eus:8.8::baseos
Default Status
affected
Versions
Unaffected
  • From 0:2.62.3-3.el8_8.5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/a:redhat:enterprise_linux:9::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.72.0-10.el9_6.2 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/a:redhat:rhel_e4s:9.0::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.72.0-8.el9_0.5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.2 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/a:redhat:rhel_eus:9.2::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.72.0-8.el9_2.5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.4 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/a:redhat:rhel_eus:9.4::appstream
Default Status
affected
Versions
Unaffected
  • From 0:2.72.0-8.el9_4.5 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 6
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
libsoup
CPEs
  • cpe:/o:redhat:enterprise_linux:6
Default Status
unknown
Problem Types
TypeCWE IDDescription
CWECWE-770Allocation of Resources Without Limits or Throttling
Type: CWE
CWE ID: CWE-770
Description: Allocation of Resources Without Limits or Throttling
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Red Hat severity rating
value:
Moderate
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

No mitigation is currently available for this vulnerability.

Exploits

Credits

Timeline
EventDate
Reported to Red Hat.2025-04-03 01:16:46
Made public.2025-04-03 00:00:00
Event: Reported to Red Hat.
Date: 2025-04-03 01:16:46
Event: Made public.
Date: 2025-04-03 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2025:8126
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:8128
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:8132
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:8139
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:8140
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:8252
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:8480
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:8481
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:8482
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:8663
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2025:9179
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2025-32049
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2357066
issue-tracking
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8126
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8128
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8132
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8139
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8140
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8252
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8480
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8481
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8482
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8663
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9179
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2025-32049
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2357066
Resource:
issue-tracking
x_refsource_REDHAT
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:03 Apr, 2025 | 14:15
Updated At:17 Jun, 2025 | 12:15

A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-770Secondarysecalert@redhat.com
CWE ID: CWE-770
Type: Secondary
Source: secalert@redhat.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2025:8126secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:8128secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:8132secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:8139secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:8140secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:8252secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:8480secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:8481secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:8482secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:8663secalert@redhat.com
N/A
https://access.redhat.com/errata/RHSA-2025:9179secalert@redhat.com
N/A
https://access.redhat.com/security/cve/CVE-2025-32049secalert@redhat.com
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=2357066secalert@redhat.com
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8126
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8128
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8132
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8139
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8140
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8252
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8480
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8481
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8482
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:8663
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2025:9179
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://access.redhat.com/security/cve/CVE-2025-32049
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2357066
Source: secalert@redhat.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

546Records found

Details not found