{
  "threat_severity" : "Moderate",
  "public_date" : "2026-02-09T14:26:34Z",
  "bugzilla" : {
    "description" : "gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification",
    "id" : "2423177",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2423177"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-407",
  "details" : [ "A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).", "A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs)." ],
  "statement" : "This vulnerability is rated Moderate for Red Hat. GnuTLS is susceptible to a denial of service attack due to excessive CPU and memory consumption. This occurs when processing specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs) during certificate verification.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2026-03-02T00:00:00Z",
    "advisory" : "RHSA-2026:3477",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "gnutls-0:3.8.10-3.el10_1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10.0 Extended Update Support",
    "release_date" : "2026-04-06T00:00:00Z",
    "advisory" : "RHSA-2026:6618",
    "cpe" : "cpe:/o:redhat:enterprise_linux_eus:10.0",
    "package" : "gnutls-0:3.8.9-9.el10_0.17"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5585",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "gnutls-0:3.6.16-8.el8_10.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5585",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "gnutls-0:3.6.16-8.el8_10.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2026-03-10T00:00:00Z",
    "advisory" : "RHSA-2026:4188",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "gnutls-0:3.8.3-10.el9_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2026-03-10T00:00:00Z",
    "advisory" : "RHSA-2026:4188",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "gnutls-0:3.8.3-10.el9_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6737",
    "cpe" : "cpe:/a:redhat:rhel_e4s:9.2",
    "package" : "gnutls-0:3.7.6-21.el9_2.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.4 Extended Update Support",
    "release_date" : "2026-04-07T00:00:00Z",
    "advisory" : "RHSA-2026:6738",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.4",
    "package" : "gnutls-0:3.8.3-4.el9_4.5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9.6 Extended Update Support",
    "release_date" : "2026-04-06T00:00:00Z",
    "advisory" : "RHSA-2026:6630",
    "cpe" : "cpe:/a:redhat:rhel_eus:9.6",
    "package" : "gnutls-0:3.8.3-6.el9_6.3"
  }, {
    "product_name" : "Red Hat Ceph Storage 8",
    "release_date" : "2026-03-24T00:00:00Z",
    "advisory" : "RHSA-2026:5606",
    "cpe" : "cpe:/a:redhat:ceph_storage:8::el9",
    "package" : "rhceph/rhceph-8-rhel9:sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414"
  }, {
    "product_name" : "Red Hat Insights proxy 1.5",
    "release_date" : "2026-03-16T00:00:00Z",
    "advisory" : "RHSA-2026:4655",
    "cpe" : "cpe:/a:redhat:insights_proxy:1.5::el9",
    "package" : "insights-proxy/insights-proxy-container-rhel9:sha256:325c34e2506d715975171557d40afb449c79cf6e0c41b35760977d5cafb827b8"
  }, {
    "product_name" : "Red Hat Update Infrastructure 5",
    "release_date" : "2026-03-18T00:00:00Z",
    "advisory" : "RHSA-2026:4943",
    "cpe" : "cpe:/a:redhat:rhui:5::el9",
    "package" : "rhui5/cds-rhel9:sha256:200c27e9b396276bd505c6b41127ac5eb1d94d620172cb818ae733f2a21ac524"
  }, {
    "product_name" : "Red Hat Update Infrastructure 5",
    "release_date" : "2026-03-18T00:00:00Z",
    "advisory" : "RHSA-2026:4943",
    "cpe" : "cpe:/a:redhat:rhui:5::el9",
    "package" : "rhui5/haproxy-rhel9:sha256:d98fd3fe5f5f9acd0efae7db19b61b864be1eb2fbe2586a1b6be2429fa2cc7a3"
  }, {
    "product_name" : "Red Hat Update Infrastructure 5",
    "release_date" : "2026-03-18T00:00:00Z",
    "advisory" : "RHSA-2026:4943",
    "cpe" : "cpe:/a:redhat:rhui:5::el9",
    "package" : "rhui5/installer-rhel9:sha256:2c50c87906a1abebf427a70f401c409f1258cb55d2096f517db870ec991cfd7f"
  }, {
    "product_name" : "Red Hat Update Infrastructure 5",
    "release_date" : "2026-03-18T00:00:00Z",
    "advisory" : "RHSA-2026:4943",
    "cpe" : "cpe:/a:redhat:rhui:5::el9",
    "package" : "rhui5/rhua-rhel9:sha256:5f1fbf66fb349a7baf066a1216d39989c3b89f18ec5108b96d9643baf4856778"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Will not fix",
    "package_name" : "gnutls",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Will not fix",
    "package_name" : "gnutls",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Hardened Images 1",
    "fix_state" : "Affected",
    "package_name" : "gnutls",
    "cpe" : "cpe:/a:redhat:hummingbird:1"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Fix deferred",
    "package_name" : "rhcos",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-14831\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-14831\nhttps://gitlab.com/gnutls/gnutls/-/issues/1773" ],
  "name" : "CVE-2025-14831",
  "csaw" : false
}