CVE-2025-32989

Publication date 10 July 2025

Last updated 14 July 2025


Ubuntu priority

Cvss 3 Severity Score

5.3 · Medium

Score breakdown

A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.

Status

Package Ubuntu Release Status
gnutls28 25.04 plucky
Fixed 3.8.9-2ubuntu3.1
24.10 oracular Ignored end of life, was needs-triage
24.04 LTS noble
Fixed 3.8.3-1.1ubuntu3.4
22.04 LTS jammy
Fixed 3.7.3-4ubuntu1.7
20.04 LTS focal
Needs evaluation
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
gnutls28

Severity score breakdown

Parameter Value
Base score 5.3 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N