CVE-2025-32990
BaseFortify
Publication date: 2025-07-10
Last updated on: 2026-04-20
Assigner: Red Hat, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| redhat | enterprise_linux | 8.0 |
| gnu | gnutls | * |
| redhat | openshift_container_platform | 4.0 |
| redhat | enterprise_linux | 6.0 |
| redhat | enterprise_linux | 7.0 |
| redhat | enterprise_linux | 9.0 |
| redhat | enterprise_linux | 10.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a heap-buffer-overflow (off-by-one) flaw in the GnuTLS software's certtool utility. It occurs in the template parsing logic when reading certain settings from a template file, allowing an attacker to perform an out-of-bounds NULL pointer write. This causes memory corruption and can lead to a denial-of-service (DoS) that may crash the system.
How can this vulnerability impact me? :
The vulnerability can lead to memory corruption and denial-of-service (DoS) conditions, potentially crashing the affected system. This could disrupt services relying on GnuTLS certtool, causing availability issues.