UBUNTU-CVE-2025-9820

Source
https://ubuntu.com/security/CVE-2025-9820
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-9820.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2025-9820
Upstream
Downstream
Related
Published
2026-01-26T20:16:00Z
Modified
2026-02-26T23:39:14.209734Z
Severity
  • 4.0 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

A flaw was found in the GnuTLS library, specifically in the gnutlspkcs11token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.

References

Affected packages

Ubuntu:22.04:LTS
gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.7.3-4ubuntu1.8?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7.3-4ubuntu1.8

Affected versions

3.*
3.7.1-5ubuntu1
3.7.2-2ubuntu1
3.7.2-4ubuntu1
3.7.2-5ubuntu1
3.7.3-4ubuntu1
3.7.3-4ubuntu1.1
3.7.3-4ubuntu1.2
3.7.3-4ubuntu1.3
3.7.3-4ubuntu1.4
3.7.3-4ubuntu1.5
3.7.3-4ubuntu1.6
3.7.3-4ubuntu1.7

Ecosystem specific

{
    "availability": "No subscription required",
    "priority_reason": "GnuTLS developers have rated this to be low severity",
    "binaries": [
        {
            "binary_version": "3.7.3-4ubuntu1.8",
            "binary_name": "gnutls-bin"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8",
            "binary_name": "guile-gnutls"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8",
            "binary_name": "libgnutls-dane0"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8",
            "binary_name": "libgnutls-openssl27"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8",
            "binary_name": "libgnutls28-dev"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8",
            "binary_name": "libgnutls30"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8",
            "binary_name": "libgnutlsxx28"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-9820.json"
Ubuntu:24.04:LTS
gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.8.3-1.1ubuntu3.5?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8.3-1.1ubuntu3.5

Affected versions

3.*
3.8.1-4ubuntu1
3.8.1-4ubuntu6
3.8.1-4ubuntu7
3.8.3-1ubuntu1
3.8.3-1.1ubuntu2
3.8.3-1.1ubuntu3
3.8.3-1.1ubuntu3.1
3.8.3-1.1ubuntu3.2
3.8.3-1.1ubuntu3.3
3.8.3-1.1ubuntu3.4

Ecosystem specific

{
    "availability": "No subscription required",
    "priority_reason": "GnuTLS developers have rated this to be low severity",
    "binaries": [
        {
            "binary_version": "3.8.3-1.1ubuntu3.5",
            "binary_name": "gnutls-bin"
        },
        {
            "binary_version": "3.8.3-1.1ubuntu3.5",
            "binary_name": "libgnutls-dane0t64"
        },
        {
            "binary_version": "3.8.3-1.1ubuntu3.5",
            "binary_name": "libgnutls-openssl27t64"
        },
        {
            "binary_version": "3.8.3-1.1ubuntu3.5",
            "binary_name": "libgnutls28-dev"
        },
        {
            "binary_version": "3.8.3-1.1ubuntu3.5",
            "binary_name": "libgnutls30t64"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-9820.json"
Ubuntu:25.10
gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.8.9-3ubuntu2.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.8.9-3ubuntu2.1

Affected versions

3.*
3.8.9-2ubuntu3
3.8.9-3ubuntu1
3.8.9-3ubuntu2

Ecosystem specific

{
    "availability": "No subscription required",
    "priority_reason": "GnuTLS developers have rated this to be low severity",
    "binaries": [
        {
            "binary_version": "3.8.9-3ubuntu2.1",
            "binary_name": "gnutls-bin"
        },
        {
            "binary_version": "3.8.9-3ubuntu2.1",
            "binary_name": "libgnutls-dane0t64"
        },
        {
            "binary_version": "3.8.9-3ubuntu2.1",
            "binary_name": "libgnutls-openssl27t64"
        },
        {
            "binary_version": "3.8.9-3ubuntu2.1",
            "binary_name": "libgnutls28-dev"
        },
        {
            "binary_version": "3.8.9-3ubuntu2.1",
            "binary_name": "libgnutls30t64"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-9820.json"
Ubuntu:Pro:16.04:LTS
gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.4.10-4ubuntu1.9+esm2?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.3.15-5ubuntu2
3.3.18-1ubuntu1
3.3.20-1ubuntu1
3.4.9-2ubuntu1
3.4.10-4ubuntu1
3.4.10-4ubuntu1.1
3.4.10-4ubuntu1.2
3.4.10-4ubuntu1.3
3.4.10-4ubuntu1.4
3.4.10-4ubuntu1.5
3.4.10-4ubuntu1.6
3.4.10-4ubuntu1.7
3.4.10-4ubuntu1.8
3.4.10-4ubuntu1.9
3.4.10-4ubuntu1.9+esm1
3.4.10-4ubuntu1.9+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.4.10-4ubuntu1.9+esm2",
            "binary_name": "gnutls-bin"
        },
        {
            "binary_version": "3.4.10-4ubuntu1.9+esm2",
            "binary_name": "guile-gnutls"
        },
        {
            "binary_version": "3.4.10-4ubuntu1.9+esm2",
            "binary_name": "libgnutls-dev"
        },
        {
            "binary_version": "3.4.10-4ubuntu1.9+esm2",
            "binary_name": "libgnutls-openssl27"
        },
        {
            "binary_version": "3.4.10-4ubuntu1.9+esm2",
            "binary_name": "libgnutls28-dev"
        },
        {
            "binary_version": "3.4.10-4ubuntu1.9+esm2",
            "binary_name": "libgnutls30"
        },
        {
            "binary_version": "3.4.10-4ubuntu1.9+esm2",
            "binary_name": "libgnutlsxx28"
        }
    ],
    "priority_reason": "GnuTLS developers have rated this to be low severity"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-9820.json"
Ubuntu:Pro:18.04:LTS
gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.5.18-1ubuntu1.6+esm2?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.5.8-6ubuntu3
3.5.17-1ubuntu1
3.5.17-1ubuntu3
3.5.18-1ubuntu1
3.5.18-1ubuntu1.1
3.5.18-1ubuntu1.2
3.5.18-1ubuntu1.3
3.5.18-1ubuntu1.4
3.5.18-1ubuntu1.5
3.5.18-1ubuntu1.6
3.5.18-1ubuntu1.6+esm1
3.5.18-1ubuntu1.6+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.5.18-1ubuntu1.6+esm2",
            "binary_name": "gnutls-bin"
        },
        {
            "binary_version": "3.5.18-1ubuntu1.6+esm2",
            "binary_name": "libgnutls-dane0"
        },
        {
            "binary_version": "3.5.18-1ubuntu1.6+esm2",
            "binary_name": "libgnutls-openssl27"
        },
        {
            "binary_version": "3.5.18-1ubuntu1.6+esm2",
            "binary_name": "libgnutls28-dev"
        },
        {
            "binary_version": "3.5.18-1ubuntu1.6+esm2",
            "binary_name": "libgnutls30"
        },
        {
            "binary_version": "3.5.18-1ubuntu1.6+esm2",
            "binary_name": "libgnutlsxx28"
        }
    ],
    "priority_reason": "GnuTLS developers have rated this to be low severity"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-9820.json"
Ubuntu:Pro:20.04:LTS
gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.6.13-2ubuntu1.12+esm1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.6.9-5ubuntu1
3.6.9-5ubuntu2
3.6.10-5
3.6.11.1-2
3.6.11.1-2ubuntu2
3.6.13-2ubuntu1
3.6.13-2ubuntu1.1
3.6.13-2ubuntu1.2
3.6.13-2ubuntu1.3
3.6.13-2ubuntu1.6
3.6.13-2ubuntu1.7
3.6.13-2ubuntu1.8
3.6.13-2ubuntu1.9
3.6.13-2ubuntu1.10
3.6.13-2ubuntu1.11
3.6.13-2ubuntu1.12
3.6.13-2ubuntu1.12+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.6.13-2ubuntu1.12+esm1",
            "binary_name": "gnutls-bin"
        },
        {
            "binary_version": "3.6.13-2ubuntu1.12+esm1",
            "binary_name": "guile-gnutls"
        },
        {
            "binary_version": "3.6.13-2ubuntu1.12+esm1",
            "binary_name": "libgnutls-dane0"
        },
        {
            "binary_version": "3.6.13-2ubuntu1.12+esm1",
            "binary_name": "libgnutls-openssl27"
        },
        {
            "binary_version": "3.6.13-2ubuntu1.12+esm1",
            "binary_name": "libgnutls28-dev"
        },
        {
            "binary_version": "3.6.13-2ubuntu1.12+esm1",
            "binary_name": "libgnutls30"
        },
        {
            "binary_version": "3.6.13-2ubuntu1.12+esm1",
            "binary_name": "libgnutlsxx28"
        }
    ],
    "priority_reason": "GnuTLS developers have rated this to be low severity"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-9820.json"
Ubuntu:Pro:FIPS-preview:22.04:LTS
gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.7.3-4ubuntu1.2+Fips1.1?arch=source&distro=fips-preview/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.7.3-4ubuntu1.2+Fips1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.7.3-4ubuntu1.2+Fips1.1",
            "binary_name": "gnutls-bin"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.2+Fips1.1",
            "binary_name": "guile-gnutls"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.2+Fips1.1",
            "binary_name": "libgnutls-dane0"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.2+Fips1.1",
            "binary_name": "libgnutls-openssl27"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.2+Fips1.1",
            "binary_name": "libgnutls28-dev"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.2+Fips1.1",
            "binary_name": "libgnutls30"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.2+Fips1.1",
            "binary_name": "libgnutlsxx28"
        }
    ],
    "priority_reason": "GnuTLS developers have rated this to be low severity"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-9820.json"
Ubuntu:Pro:FIPS-updates:22.04:LTS
gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.7.3-4ubuntu1.8+Fips1.1?arch=source&distro=fips-updates/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.7.3-4ubuntu1.2+Fips1.1
3.7.3-4ubuntu1.3+Fips1.1
3.7.3-4ubuntu1.4+Fips1
3.7.3-4ubuntu1.5+Fips1
3.7.3-4ubuntu1.6+Fips1
3.7.3-4ubuntu1.7+Fips1
3.7.3-4ubuntu1.7+Fips1.1
3.7.3-4ubuntu1.8+Fips1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.7.3-4ubuntu1.8+Fips1.1",
            "binary_name": "gnutls-bin"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8+Fips1.1",
            "binary_name": "guile-gnutls"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8+Fips1.1",
            "binary_name": "libgnutls-dane0"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8+Fips1.1",
            "binary_name": "libgnutls-openssl27"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8+Fips1.1",
            "binary_name": "libgnutls28-dev"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8+Fips1.1",
            "binary_name": "libgnutls30"
        },
        {
            "binary_version": "3.7.3-4ubuntu1.8+Fips1.1",
            "binary_name": "libgnutlsxx28"
        }
    ],
    "priority_reason": "GnuTLS developers have rated this to be low severity"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-9820.json"
Ubuntu:Pro:FIPS-updates:24.04:LTS
gnutls28

Package

Name
gnutls28
Purl
pkg:deb/ubuntu/gnutls28@3.8.3-1.1ubuntu3.5+Fips1.1?arch=source&distro=fips-updates/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.8.3-1.1ubuntu3.1+Fips1
3.8.3-1.1ubuntu3.4+Fips1
3.8.3-1.1ubuntu3.4+Fips1.1
3.8.3-1.1ubuntu3.5+Fips1.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.8.3-1.1ubuntu3.5+Fips1.1",
            "binary_name": "gnutls-bin"
        },
        {
            "binary_version": "3.8.3-1.1ubuntu3.5+Fips1.1",
            "binary_name": "libgnutls-dane0t64"
        },
        {
            "binary_version": "3.8.3-1.1ubuntu3.5+Fips1.1",
            "binary_name": "libgnutls-openssl27t64"
        },
        {
            "binary_version": "3.8.3-1.1ubuntu3.5+Fips1.1",
            "binary_name": "libgnutls28-dev"
        },
        {
            "binary_version": "3.8.3-1.1ubuntu3.5+Fips1.1",
            "binary_name": "libgnutls30t64"
        }
    ],
    "priority_reason": "GnuTLS developers have rated this to be low severity"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-9820.json"