Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0215

NIXPKGS-2026-0215
published on
Permalink CVE-2025-14831
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    4 packages
    • python312Packages.python3-gnutls
    • python313Packages.python3-gnutls
    • python314Packages.python3-gnutls
    • guile-gnutls
  • @LeSuisse deleted
    3 maintainers
    • @vcunat
    • @foo-dogsquared
    • @charlieshanley
    maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Gnutls: gnutls: denial of service via excessive resource consumption during certificate verification

A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).

References

Affected products

rhcos
gnutls

Matching in nixpkgs

Ignored packages (4)

Package maintainers

Ignored maintainers (1)
Upstream patch: https://gitlab.com/gnutls/gnutls/-/commit/d6054f0016db05fb5c82177ddbd0a4e8331059a1

Fixed in 3.8.12
https://gitlab.com/gnutls/gnutls/-/blob/3.8.12/NEWS?ref_type=tags