Bug 2405139 (CVE-2025-11678) - CVE-2025-11678 libwebsockets: Stack-based Buffer Overflow in libwebsockets
Summary: CVE-2025-11678 libwebsockets: Stack-based Buffer Overflow in libwebsockets
Keywords:
Status: NEW
Alias: CVE-2025-11678
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2405568 2405566 2405569 2405570 2405571
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-20 17:24 UTC by OSIDB Bzimport
Modified: 2025-12-09 18:17 UTC (History)
11 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:22969 0 None None None 2025-12-09 18:17:31 UTC

Description OSIDB Bzimport 2025-10-20 17:24:09 UTC
Stack-based Buffer Overflow in lws_adns_parse_label in warmcat libwebsockets allows, when the LWS_WITH_SYS_ASYNC_DNS flag is enabled during compilation, to overflow the label_stack, when the attacker is able to sniff a DNS request in order to craft a response with a matching id containing a label longer than the maximum.

Comment 2 errata-xmlrpc 2025-12-09 18:17:30 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 17.1 for RHEL 9

Via RHSA-2025:22969 https://access.redhat.com/errata/RHSA-2025:22969


Note You need to log in before you can comment on or make changes to this bug.