{"id":"CVE-2025-14831","details":"A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).","modified":"2026-04-10T18:29:29.473338665Z","published":"2026-02-09T15:16:09.937Z","related":["ALSA-2026:3477","ALSA-2026:4188","ALSA-2026:5585","MGASA-2026-0045","SUSE-SU-2026:0829-1","SUSE-SU-2026:0862-1","SUSE-SU-2026:20654-1","SUSE-SU-2026:20708-1","SUSE-SU-2026:20962-1","SUSE-SU-2026:20968-1","SUSE-SU-2026:20984-1","openSUSE-SU-2026:10177-1","openSUSE-SU-2026:20446-1"],"references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-14831"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:3477"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:4188"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423177"},{"type":"REPORT","url":"https://gitlab.com/gnutls/gnutls/-/issues/1773"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14831.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}