{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T03:03:07.727","vulnerabilities":[{"cve":{"id":"CVE-2025-32989","sourceIdentifier":"secalert@redhat.com","published":"2025-07-10T08:15:24.430","lastModified":"2026-04-20T22:16:21.790","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly."},{"lang":"es","value":"Se detectó una vulnerabilidad de sobrelectura del búfer de montón en GnuTLS en la gestión de la extensión de marca de tiempo del certificado firmado (SCT) de Transparencia de Certificado (CT) durante el análisis de certificados X.509. Esta falla permite a un usuario malintencionado crear un certificado con una extensión SCT mal formada (OID 1.3.6.1.4.1.11129.2.4.2) que contiene datos confidenciales. Este problema provoca la exposición de información confidencial cuando GnuTLS verifica certificados de ciertos sitios web cuando la SCT no se verifica correctamente."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnutls:-:*:*:*:*:*:*:*","matchCriteriaId":"33A22858-21E1-479F-A9C4-AD2EFD059B93"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*","matchCriteriaId":"932D137F-528B-4526-9A89-CD59FA1AB0FE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"142AD0DD-4CF3-4D74-9442-459CE3347E3A"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","matchCriteriaId":"F4CFF558-3C47-480D-A2F0-BABF26042943"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*","matchCriteriaId":"7F6FB57C-2BC7-487C-96DD-132683AEB35D"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"D65C2163-CFC2-4ABB-8F4E-CB09CEBD006C"}]}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2025:16115","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:16116","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:17181","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:17348","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:17361","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:19088","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:22529","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2026:7477","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/security/cve/CVE-2025-32989","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359621","source":"secalert@redhat.com","tags":["Issue Tracking"]},{"url":"https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html","source":"secalert@redhat.com"},{"url":"http://www.openwall.com/lists/oss-security/2025/07/11/3","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}