CVE-2025-14831

Published Feb 9, 2026

Last updated 8 days ago

Overview

Description
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
Source
secalert@redhat.com
NVD status
Deferred

Risk scores

CVSS 3.1

Type
Secondary
Base score
5.3
Impact score
1.4
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Severity
MEDIUM

Weaknesses

secalert@redhat.com
CWE-407

Social media

Hype score
Not currently trending
  1. BREAKING: SUSE Linux Micro 6.2 releases gnutls update patching CVE-2025-14831 DoS and CVE-2025-9820 buffer overflow, admins urged to apply via YaST or zypper immediately. https://t.co/lcMx8nOZi7

    @threatcluster

    8 Apr 2026

    170 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. #Mageia 2026-0045 addresses a high-severity GnuTLS flaw (CVE-2025-14831). This isn't just a patch; it's a compliance and operational necessity. Read more: 👉 https://t.co/BgZ0aVmCFY #Security https://t.co/ICq0mxgtJ2

    @Cezar_H_Linux

    21 Feb 2026

    60 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Heads up, #Debian community! 🐧 A significant DoS vulnerability (CVE-2025-14831) in the #GnuTLS library has been patched. Read more: 👉 https://t.co/99oEmHPzRW #Security https://t.co/s0NgAZrKGy

    @Cezar_H_Linux

    18 Feb 2026

    47 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. GNUTLS-SA-2026-02-09-1、CVE-2026-1584 Severity High; invalid pointer access GNUTLS-SA-2026-02-09-2、CVE-2025-14831 Severity Medium; denial of service The GnuTLS Transport Layer Security Library https://t.co/KkxVAntDe6

    @autumn_good_35

    10 Feb 2026

    128 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. GnuTLS 3.8.12 fixes 2 CVEs https://t.co/9rzV3GhTDn CVE-2026-1584: NULL pointer dereference in PSK binder verification (TLS 1.3 resumption attempt with an invalid PSK binder value in ClientHello could lead to DoS) CVE-2025-14831: Name constraint processing performance issue

    @oss_security

    10 Feb 2026

    663 Impressions

    2 Retweets

    5 Likes

    1 Bookmark

    1 Reply

    0 Quotes

  6. CVE-2025-14831 Denial of Service Vulnerability in GnuTLS via Malicious C... https://t.co/Uqf1i9lcLH Don't wait vulnerability scanning results: https://t.co/oh1APvMMnd

    @VulmonFeeds

    9 Feb 2026

    48 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  7. CVE-2025-14831 A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafte… https://t.co/TayL7snrFO

    @CVEnew

    9 Feb 2026

    260 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  1. PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5. A local unprivileged user can install arbitrary RPM packages as root, including executing RPM scriptlets, without authentication. The vulnerability is a TOCTOU race condition on `transaction->cached_transaction_flags` combined with a silent state-machine guard that discards illegal backward transitions while leaving corrupted flags in place. Three bugs exist in `src/pk-transaction.c`: 1. Unconditional flag overwrite (line 4036): `InstallFiles()` writes caller-supplied flags to `transaction->cached_transaction_flags` without checking whether the transaction has already been authorized/started. A second call blindly overwrites the flags even while the transaction is RUNNING. 2. Silent state-transition rejection (lines 873–882): `pk_transaction_set_state()` silently discards backward state transitions (e.g. `RUNNING` → `WAITING_FOR_AUTH`) but the flag overwrite at step 1 already happened. The transaction continues running with corrupted flags. 3. Late flag read at execution time (lines 2273–2277): The scheduler's idle callback reads cached_transaction_flags at dispatch time, not at authorization time. If flags were overwritten between authorization and execution, the backend sees the attacker's flags.CVE-2026-41651