CVE-2025-32990

6.5 MEDIUM

📋 TL;DR

This CVE describes a heap-buffer-overflow vulnerability in GnuTLS's certtool utility when parsing template files. An attacker can trigger memory corruption leading to denial-of-service (system crash). Systems using certtool with untrusted template files are affected.

💻 Affected Systems

Products:
  • GnuTLS
Versions: Specific versions not provided in CVE description; check Red Hat advisories for affected ranges.
Operating Systems: Linux distributions using GnuTLS (Red Hat, CentOS, Fedora, Debian, Ubuntu, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects certtool utility when processing template files; other GnuTLS components may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or potential remote code execution if memory corruption can be weaponized beyond DoS.

🟠

Likely Case

Denial-of-service through application crash when processing malicious template files.

🟢

If Mitigated

Limited to DoS impact with proper access controls and input validation.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to run certtool with a malicious template file; no public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific Red Hat advisories (RHSA-2025:16115, etc.) for patched versions.

Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:16115

Restart Required: No

Instructions:

1. Update GnuTLS package using your distribution's package manager. 2. For Red Hat systems: 'yum update gnutls' or 'dnf update gnutls'. 3. Verify update with version check.

🔧 Temporary Workarounds

Restrict certtool access

linux

Limit who can execute certtool and control template file sources.

chmod 750 /usr/bin/certtool
setfacl -m u:user:rx /usr/bin/certtool

Validate template files

all

Only use trusted, validated template files with certtool.

🧯 If You Can't Patch

  • Disable or remove certtool if not required.
  • Implement strict access controls and audit certtool usage.

🔍 How to Verify

Check if Vulnerable:

Check GnuTLS version against patched versions in Red Hat advisories.

Check Version:

certtool --version

Verify Fix Applied:

Confirm GnuTLS version is updated to patched release.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected certtool crashes
  • Memory error logs in system logs

SIEM Query:

source="system" AND ("certtool" AND ("segmentation fault" OR "memory corruption"))

🔗 References

📤 Share & Export