A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
01 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
06 Nov 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Nov 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-07-10 10:15
Updated : 2025-12-01 22:15
NVD link : CVE-2025-32990
Mitre link : CVE-2025-32990
CVE.ORG link : CVE-2025-32990
JSON object : View
Products Affected
gnu
- gnutls
redhat
- enterprise_linux
- openshift_container_platform
CWE
CWE-122
Heap-based Buffer Overflow
