CVE-2025-32990

A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:gnutls:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

15 Aug 2025, 19:32

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gnutls:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
First Time Gnu gnutls
Redhat
Redhat enterprise Linux
Gnu
Redhat openshift Container Platform
References () https://access.redhat.com/security/cve/CVE-2025-32990 - () https://access.redhat.com/security/cve/CVE-2025-32990 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2359620 - () https://bugzilla.redhat.com/show_bug.cgi?id=2359620 - Issue Tracking

10 Jul 2025, 13:17

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 10:15

Updated : 2025-08-15 19:32


NVD link : CVE-2025-32990

Mitre link : CVE-2025-32990

CVE.ORG link : CVE-2025-32990


JSON object : View

Products Affected

gnu

  • gnutls

redhat

  • enterprise_linux
  • openshift_container_platform
CWE
CWE-122

Heap-based Buffer Overflow