CVE-2025-32990

A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
redhatCNA
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
VendorProductVersion
gnugnutls
-
redhatopenshift_container_platform
4.0
redhatenterprise_linux
6.0
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
redhatenterprise_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gnutls28
bullseye
vulnerable
bullseye (security)
3.7.1-5+deb11u8
fixed
bookworm
vulnerable
bookworm (security)
3.7.9-2+deb12u5
fixed
forky
3.8.9-3
fixed
trixie
3.8.9-3
fixed
sid
3.8.10-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gnutls28
plucky
Fixed 3.8.9-2ubuntu3.1
released
oracular
ignored
noble
Fixed 3.8.3-1.1ubuntu3.4
released
jammy
Fixed 3.7.3-4ubuntu1.7
released
focal
needed
bionic
needed
xenial
needed