Improper Certificate Validation Affecting gnutls package, versions <3.8.3-150600.4.9.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES156-GNUTLS-11382138
  • published2 Aug 2025
  • disclosed1 Aug 2025

Introduced: 1 Aug 2025

CVE-2025-32989  (opens in a new tab)
CWE-295  (opens in a new tab)

How to fix?

Upgrade SLES:15.6 gnutls to version 3.8.3-150600.4.9.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream gnutls package and not the gnutls package as distributed by SLES. See How to fix? for SLES:15.6 relevant fixed versions and status.

A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.

CVSS Base Scores

version 3.1