Bug#1102067: libsoup3: CVE-2025-32049: denial of service via memory exhaustion with large fragmented WebSocket messages
Simon McVittie
smcv at debian.org
Fri Jul 11 22:38:55 BST 2025
Control: retitle -1 libsoup3: CVE-2025-32049: denial of service via memory exhaustion with large fragmented WebSocket messages
Control: found -1 3.0.4-1
On Fri, 04 Apr 2025 at 15:00:10 +0200, Salvatore Bonaccorso wrote:
>The following vulnerability was published for libsoup3.
>
>CVE-2025-32049[0]:
>| A flaw was found in libsoup. The SoupWebsocketConnection may accept
>| a large WebSocket message, which may cause libsoup to allocate
>| memory and lead to a denial of service (DoS).
I suspect that all versions are vulnerable to this, so I'm marking this
as found in the oldest upload of libsoup3 to Debian.
A mitigation has been proposed upstream but it takes the form of an
arbitrary limit, and the default is "no limit" due to compatibility
concerns: upstream wrote "We're not sure about the compatibility
implications of having a default size limit for clients". As a result,
applications that use libsoup will still be vulnerable to this (if they
use WebSockets) even after the proposed mitigation is merged, unless
they explicitly set a limit.
The merge request is also not suitable for merge because it contains
conflicts vs. subsequent upstream changes.
I suspect that upstream is not intending to fix this in 3.6.x at all,
only in 3.7.x via the addition of new API. I don't think we should rush
to address this in trixie, and definitely not in bookworm. The LTS team
seem to have come to a similar conclusion: they tried to backport the
proposed mitigation, but then reverted that change.
smcv
(a GNOME team member but not a libsoup expert)
More information about the pkg-gnome-maintainers
mailing list