Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-1584

Источник: debian

Описание

Описание отсутствует

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnutls28fixed3.8.12-1package
gnutls28not-affectedtrixiepackage
gnutls28not-affectedbookwormpackage
gnutls28not-affectedbullseyepackage

Примечания

  • https://gitlab.com/gnutls/gnutls/-/issues/1790

  • Introduced with: https://gitlab.com/gnutls/gnutls/-/commit/33034a91c2c1f38bad19e747d3021885d54bfb44 (3.8.11)

  • Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/acf67a4a68bc6d9ab7b882469c67f6cf28db56a0 (3.8.12)

Связанные уязвимости

ubuntu
около 2 месяцев назад

A TLS 1.3 resumption attempt with an invalid PSK binder value in ClientHello could lead to a denial of service attack via crashing the server.

CVSS3: 7.5
redhat
около 2 месяцев назад

A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL pointer dereference, causing the server to crash and resulting in a remote Denial of Service (DoS) condition.