A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2025-32989 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2359621 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
15 Aug 2025, 19:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2025-32989 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2359621 - Issue Tracking | |
First Time |
Redhat enterprise Linux
Gnu Redhat Gnu gnutls Redhat openshift Container Platform |
|
CPE | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:gnu:gnutls:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* |
10 Jul 2025, 13:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Jul 2025, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-10 08:15
Updated : 2025-08-15 19:35
NVD link : CVE-2025-32989
Mitre link : CVE-2025-32989
CVE.ORG link : CVE-2025-32989
JSON object : View
Products Affected
redhat
- enterprise_linux
- openshift_container_platform
gnu
- gnutls
CWE
CWE-295
Improper Certificate Validation