CVE-2025-32988

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-32988
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-32988.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-32988
Downstream
Published
2025-07-10T08:15:24Z
Modified
2025-08-09T18:23:58.783106Z
Summary
[none]
Details

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1deletestructure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.

This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.

References

Affected packages

Debian:11 / gnutls28

Package

Name
gnutls28
Purl
pkg:deb/debian/gnutls28?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7.1-5+deb11u8

Affected versions

3.*

3.7.1-5
3.7.1-5+deb11u1
3.7.1-5+deb11u2
3.7.1-5+deb11u3
3.7.1-5+deb11u4
3.7.1-5+deb11u5
3.7.1-5+deb11u6
3.7.1-5+deb11u7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / gnutls28

Package

Name
gnutls28
Purl
pkg:deb/debian/gnutls28?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7.9-2+deb12u5

Affected versions

3.*

3.7.9-2
3.7.9-2+deb12u1
3.7.9-2+deb12u2
3.7.9-2+deb12u3
3.7.9-2+deb12u4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / gnutls28

Package

Name
gnutls28
Purl
pkg:deb/debian/gnutls28?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8.9-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}