A heap-buffer-overread vulnerability exists in GnuTLS (confirmed in version 3.8.9) due to unsafe handling of the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. The vulnerability can be triggered by a malicious peer presenting a crafted certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2). This overread may lead to disclosure of heap memory contents to attackers if the SCT log_id is logged, exported, or otherwise exposed by the application consuming the GnuTLS client library.
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:16115 https://access.redhat.com/errata/RHSA-2025:16115
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:16116 https://access.redhat.com/errata/RHSA-2025:16116
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:17348 https://access.redhat.com/errata/RHSA-2025:17348
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2025:17361 https://access.redhat.com/errata/RHSA-2025:17361