Name | CVE-2025-5399 |
Description | Due to a mistake in libcurl's WebSocket code, a malicious server can send a particularly crafted packet which makes libcurl get trapped in an endless busy-loop. There is no other way for the application to escape or exit this loop other than killing the thread/process. This might be used to DoS libcurl-using application. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
curl (PTS) | bullseye | 7.74.0-1.3+deb11u13 | fixed |
| bullseye (security) | 7.74.0-1.3+deb11u15 | fixed |
| bookworm | 7.88.1-10+deb12u12 | fixed |
| bookworm (security) | 7.88.1-10+deb12u5 | fixed |
| trixie | 8.14.1-1 | fixed |
| sid | 8.14.1-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
curl | source | bullseye | (not affected) | | | |
curl | source | bookworm | (not affected) | | | |
curl | source | (unstable) | 8.14.1-1 | | | |
Notes
[bookworm] - curl <not-affected> (Vulnerable code not present)
[bullseye] - curl <not-affected> (Vulnerable code not present)
https://curl.se/docs/CVE-2025-5399.html
Introduced by: https://github.com/curl/curl/commit/3588df9478d7c27046b34cdb510728a26bedabc7 (curl-8_13_0)
Fixed by: https://github.com/curl/curl/commit/d1145df24de8f80e6b167fbc4f28b86bcd0c6832 (curl-8_14_1)