Impact
A double‑free condition exists in GnuTLS when exporting Subject Alternative Name entries that contain an otherName. If the OID of the type‑id is malformed, the library deletes an ASN.1 node it does not own and later frees the same structure again, leading to memory corruption or a crash. The vulnerability is triggered through public GnuTLS APIs and can result in denial of service or corruption of application memory.
Affected Systems
Red Hat Ceph Storage 7, Red Hat Discovery 2, Red Hat Enterprise Linux 6, 7, 8, 9, the 9.2 Update Services for SAP Solutions, the 9.4 Extended Update Support, Red Hat Hardened Images, insights proxy 1.5, and Red Hat OpenShift Container Platform 4. Red Hat Enterprise Linux 10 is also listed via a CPE but the version impact is not specified beyond the CPE.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate risk, while an EPSS score of less than 1% suggests a very low likelihood of exploitation at present. Based on the description, the vulnerability can be triggered via public GnuTLS APIs that export SAN entries containing an otherName with an invalid or malformed OID, causing a double‑free that can lead to memory corruption or a crash. The attack vector is not explicitly defined in the description; it could involve any application that processes such SAN data, but local versus remote execution is not confirmed. The vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN