A heap-buffer-overflow (off-by-one) vulnerability exists in the template parsing logic within the certtool utility of GnuTLS. The vulnerability specifically occurs when parsing certain multiline configuration options from a user-supplied template file, allowing an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and potential denial-of-service (DoS).
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:16115 https://access.redhat.com/errata/RHSA-2025:16115
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:16116 https://access.redhat.com/errata/RHSA-2025:16116
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:17348 https://access.redhat.com/errata/RHSA-2025:17348
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:17361 https://access.redhat.com/errata/RHSA-2025:17361
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:17415 https://access.redhat.com/errata/RHSA-2025:17415