Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-32989

Опубликовано: 10 июл. 2025
Источник: ubuntu
Приоритет: medium
CVSS3: 5.3

Описание

A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.

РелизСтатусПримечание
devel

released

3.8.9-3ubuntu1
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
fips-preview/jammy

needs-triage

fips-updates/jammy

released

3.7.3-4ubuntu1.7+Fips1
fips-updates/noble

released

3.8.3-1.1ubuntu3.4+Fips1
jammy

released

3.7.3-4ubuntu1.7
noble

released

3.8.3-1.1ubuntu3.4
oracular

ignored

end of life, was needs-triage

Показывать по

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
7 месяцев назад

A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.

CVSS3: 5.3
nvd
7 месяцев назад

A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.

CVSS3: 5.3
msrc
7 месяцев назад

Gnutls: vulnerability in gnutls sct extension parsing

CVSS3: 5.3
debian
7 месяцев назад

A heap-buffer-overread vulnerability was found in GnuTLS in how it han ...

CVSS3: 5.3
github
7 месяцев назад

A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.

5.3 Medium

CVSS3