It was discovered that GnuTLS incorrectly handled exporting Subject Alternative Name (SAN) entries containing an otherName. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-32988)
It was discovered that GnuTLS incorrectly handled parsing the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly obtain sensitive information. (CVE-2025-32989)
It was discovered that the GnuTLS certtool utility incorrectly handled parsing certain template files. An attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2025-32990)
Stefan Bühler discovered that GnuTLS incorrectly handled parsing certain template files. An attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. (CVE-2025-6395)
{
"binaries": [
{
"binary_name": "gnutls-bin",
"binary_version": "3.7.3-4ubuntu1.7"
},
{
"binary_name": "guile-gnutls",
"binary_version": "3.7.3-4ubuntu1.7"
},
{
"binary_name": "libgnutls-dane0",
"binary_version": "3.7.3-4ubuntu1.7"
},
{
"binary_name": "libgnutls-openssl27",
"binary_version": "3.7.3-4ubuntu1.7"
},
{
"binary_name": "libgnutls30",
"binary_version": "3.7.3-4ubuntu1.7"
},
{
"binary_name": "libgnutlsxx28",
"binary_version": "3.7.3-4ubuntu1.7"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "gnutls-bin",
"binary_version": "3.8.3-1.1ubuntu3.4"
},
{
"binary_name": "libgnutls-dane0t64",
"binary_version": "3.8.3-1.1ubuntu3.4"
},
{
"binary_name": "libgnutls-openssl27t64",
"binary_version": "3.8.3-1.1ubuntu3.4"
},
{
"binary_name": "libgnutls30t64",
"binary_version": "3.8.3-1.1ubuntu3.4"
}
],
"availability": "No subscription required"
}