<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for gnutls is now available for openEuler-22.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-2008</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-08-15</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-08-15</InitialReleaseDate>
		<CurrentReleaseDate>2025-08-15</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-08-15</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">gnutls security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for gnutls is now available for openEuler-22.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, and other required structures. The project strives to provide a secure communications back-end, simple to use and integrated with the rest of the base Linux libraries. A back-end designed to work and be secure out of the box, keeping the complexity of TLS and PKI out of application code.

Security Fix(es):

A vulnerability, which was classified as critical, was found in GnuTLS (Network Encryption Software) (affected version unknown).CWE is classifying the issue as CWE-415. The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.This is going to have an impact on confidentiality, integrity, and availability.There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.(CVE-2025-32988)

GnuTLS is a free secure communication library for implementing SSL, TLS and DTLS protocols.
 There is a security vulnerability in GnuTLS that originates from a heap buffer overflow in the certtool tool template parsing logic, which can lead to memory corruption and denial of service.(CVE-2025-32990)

A vulnerability, which was classified as problematic, was found in GnuTLS (Network Encryption Software) (affected version unknown).CWE is classifying the issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.This is going to have an impact on availability.There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-21000).(CVE-2025-6395)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for gnutls is now available for openEuler-22.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">gnutls</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2008</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-32988</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-32990</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-6395</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-32988</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-32990</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-6395</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="gnutls-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-3.7.2-17.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-debuginfo-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-debuginfo-3.7.2-17.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-debugsource-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-debugsource-3.7.2-17.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-devel-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-devel-3.7.2-17.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-utils-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-utils-3.7.2-17.oe2203sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="gnutls-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-3.7.2-17.oe2203sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="gnutls-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-3.7.2-17.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-debuginfo-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-debuginfo-3.7.2-17.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-debugsource-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-debugsource-3.7.2-17.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-devel-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-devel-3.7.2-17.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-utils-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-utils-3.7.2-17.oe2203sp4.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="gnutls-help-3.7.2-17" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">gnutls-help-3.7.2-17.oe2203sp4.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability, which was classified as critical, was found in GnuTLS (Network Encryption Software) (affected version unknown).CWE is classifying the issue as CWE-415. The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.This is going to have an impact on confidentiality, integrity, and availability.There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.</Note>
		</Notes>
		<ReleaseDate>2025-08-15</ReleaseDate>
		<CVE>CVE-2025-32988</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>gnutls security update</Description>
				<DATE>2025-08-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2008</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GnuTLS is a free secure communication library for implementing SSL, TLS and DTLS protocols.
 There is a security vulnerability in GnuTLS that originates from a heap buffer overflow in the certtool tool template parsing logic, which can lead to memory corruption and denial of service.</Note>
		</Notes>
		<ReleaseDate>2025-08-15</ReleaseDate>
		<CVE>CVE-2025-32990</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>gnutls security update</Description>
				<DATE>2025-08-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2008</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability, which was classified as problematic, was found in GnuTLS (Network Encryption Software) (affected version unknown).CWE is classifying the issue as CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.This is going to have an impact on availability.There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-21000).</Note>
		</Notes>
		<ReleaseDate>2025-08-15</ReleaseDate>
		<CVE>CVE-2025-6395</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>gnutls security update</Description>
				<DATE>2025-08-15</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2008</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>