A double-free vulnerability exists in GnuTLS (confirmed in version 3.8.9) due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:16115 https://access.redhat.com/errata/RHSA-2025:16115
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:16116 https://access.redhat.com/errata/RHSA-2025:16116
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:17348 https://access.redhat.com/errata/RHSA-2025:17348
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:17361 https://access.redhat.com/errata/RHSA-2025:17361
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:17415 https://access.redhat.com/errata/RHSA-2025:17415