CVE-2025-32988

| EUVD-2025-20928 MEDIUM
2025-07-10 [email protected]
6.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
EUVD ID Assigned
Mar 16, 2026 - 06:52 euvd
EUVD-2025-20928
Analysis Generated
Mar 16, 2026 - 06:52 vuln.today
CVE Published
Jul 10, 2025 - 08:15 nvd
MEDIUM 6.5

DescriptionNVD

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.

This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.

AnalysisAI

A flaw was found in GnuTLS.

Technical ContextAI

A denial of service vulnerability allows an attacker to disrupt the normal functioning of a system, making it unavailable to legitimate users. This vulnerability is classified as Double Free (CWE-415).

RemediationAI

Implement rate limiting and input validation. Use timeout mechanisms for resource-intensive operations. Deploy DDoS protection where applicable.

Vendor StatusVendor

Ubuntu

Priority: Medium
gnutls28
Release Status Version
upstream released 3.8.9-3
jammy released 3.7.3-4ubuntu1.7
noble released 3.8.3-1.1ubuntu3.4
plucky released 3.8.9-2ubuntu3.1
oracular ignored end of life, was needs-triage
xenial not-affected code not present
bionic released 3.5.18-1ubuntu1.6+esm2
focal released 3.6.13-2ubuntu1.12+esm1
questing released 3.8.9-3ubuntu1

Debian

gnutls28
Release Status Fixed Version Urgency
bullseye fixed 3.7.1-5+deb11u8 -
bullseye (security) fixed 3.7.1-5+deb11u9 -
bookworm fixed 3.7.9-2+deb12u5 -
bookworm (security) fixed 3.7.9-2+deb12u6 -
trixie (security), trixie fixed 3.8.9-3+deb13u2 -
forky, sid fixed 3.8.12-3 -
(unstable) fixed 3.8.9-3 -

Share

CVE-2025-32988 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy