USN-7635-1

Source
https://ubuntu.com/security/notices/USN-7635-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7635-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7635-1
Upstream
Related
Published
2025-07-14T12:23:41Z
Modified
2026-04-24T10:03:26.589842Z
Summary
gnutls28 vulnerabilities
Details

It was discovered that GnuTLS incorrectly handled exporting Subject Alternative Name (SAN) entries containing an otherName. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-32988)

It was discovered that GnuTLS incorrectly handled parsing the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2025-32989)

It was discovered that the GnuTLS certtool utility incorrectly handled parsing certain template files. An attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-32990)

Stefan Bühler discovered that GnuTLS incorrectly handled parsing certain template files. An attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. (CVE-2025-6395)

References

Affected packages

Ubuntu:22.04:LTS / gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.7.3-4ubuntu1.7?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7.3-4ubuntu1.7

Affected versions

3.*
3.7.1-5ubuntu1
3.7.2-2ubuntu1
3.7.2-4ubuntu1
3.7.2-5ubuntu1
3.7.3-4ubuntu1
3.7.3-4ubuntu1.1
3.7.3-4ubuntu1.2
3.7.3-4ubuntu1.3
3.7.3-4ubuntu1.4
3.7.3-4ubuntu1.5
3.7.3-4ubuntu1.6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "gnutls-bin",
            "binary_version": "3.7.3-4ubuntu1.7"
        },
        {
            "binary_name": "guile-gnutls",
            "binary_version": "3.7.3-4ubuntu1.7"
        },
        {
            "binary_name": "libgnutls-dane0",
            "binary_version": "3.7.3-4ubuntu1.7"
        },
        {
            "binary_name": "libgnutls-openssl27",
            "binary_version": "3.7.3-4ubuntu1.7"
        },
        {
            "binary_name": "libgnutls30",
            "binary_version": "3.7.3-4ubuntu1.7"
        },
        {
            "binary_name": "libgnutlsxx28",
            "binary_version": "3.7.3-4ubuntu1.7"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7635-1.json"

Ubuntu:24.04:LTS / gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.8.3-1.1ubuntu3.4?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8.3-1.1ubuntu3.4

Affected versions

3.*
3.8.1-4ubuntu1
3.8.1-4ubuntu6
3.8.1-4ubuntu7
3.8.3-1ubuntu1
3.8.3-1.1ubuntu2
3.8.3-1.1ubuntu3
3.8.3-1.1ubuntu3.1
3.8.3-1.1ubuntu3.2
3.8.3-1.1ubuntu3.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "gnutls-bin",
            "binary_version": "3.8.3-1.1ubuntu3.4"
        },
        {
            "binary_name": "libgnutls-dane0t64",
            "binary_version": "3.8.3-1.1ubuntu3.4"
        },
        {
            "binary_name": "libgnutls-openssl27t64",
            "binary_version": "3.8.3-1.1ubuntu3.4"
        },
        {
            "binary_name": "libgnutls30t64",
            "binary_version": "3.8.3-1.1ubuntu3.4"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7635-1.json"