CVE-2025-32990
MediumVulnerability Description
A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Known Affected Software
7 configuration(s) from 2 vendor(s)
cpe:2.3:a:gnu:gnutls:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:intel64:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:arm64:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:intel64:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
CPUAPR2026
Oracle Critical Patch Update Advisory - April 2026
CPUJAN2026
Oracle Critical Patch Update Advisory - January 2026
CPUOCT2025
Oracle Critical Patch Update Advisory - October 2025
2025-Jul-CVE-2025-32990
CVE-2025-32990: Gnutls: vulnerability in gnutls certtool template parsing
CVE-2025-32990
CVE-2025-32990
References & Resources
-
https://access.redhat.com/errata/RHSA-2025:16115secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2025:16116secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2025:17181secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2025:17348secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2025:17361secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2025:17415secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2025:19088secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2025:22529secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2026:7477secalert@redhat.com
-
https://access.redhat.com/security/cve/CVE-2025-32990secalert@redhat.com Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2359620secalert@redhat.com Issue Tracking
-
https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.htmlsecalert@redhat.com
-
http://www.openwall.com/lists/oss-security/2025/07/11/3af854a3a-2127-422b-91ae-364da2661108
-
https://lists.debian.org/debian-lts-announce/2025/08/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108
Severity Details
Weakness Type (CWE)
Heap-based Buffer Overflow
- Description
- A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Variant
Key Information
- Published Date
- July 10, 2025
