CVE-2025-32988

EUVD-2025-20928
A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.

This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
redhatCNA
6.5 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 10%
Affected Products (NVD)
VendorProductVersion
gnugnutls
𝑥
< 3.8.10
redhatopenshift_container_platform
4.0
redhatenterprise_linux
6.0
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
redhatenterprise_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnutls28
bookworm
3.7.9-2+deb12u5
fixed
bookworm (security)
3.7.9-2+deb12u6
fixed
bullseye
vulnerable
bullseye (security)
3.7.1-5+deb11u9
fixed
forky
3.8.12-2
fixed
sid
3.8.12-3
fixed
trixie
3.8.9-3+deb13u1
fixed
trixie (security)
3.8.9-3+deb13u2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gnutls28
bionic
Fixed 3.5.18-1ubuntu1.6+esm2
released
focal
Fixed 3.6.13-2ubuntu1.12+esm1
released
jammy
Fixed 3.7.3-4ubuntu1.7
released
noble
Fixed 3.8.3-1.1ubuntu3.4
released
oracular
ignored
plucky
Fixed 3.8.9-2ubuntu3.1
released
questing
Fixed 3.8.9-3ubuntu1
released
xenial
not-affected