Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-9820

Опубликовано: 18 нояб. 2025
Источник: redhat
CVSS3: 4
EPSS Низкий

Описание

A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.

Отчет

The Red Hat Product Security team has assessed the severity of this vulnerability as Low, since exploitation requires local access or a malicious PKCS#11 token. While the impact is limited to denial of service or potential code execution in constrained scenarios, the vulnerability stems from a lack of proper bounds checking during token label handling in GnuTLS. Users should treat this as a security concern in environments where untrusted tokens may be introduced.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. Applying the upstream patch or vendor-supplied security update is the recommended resolution.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6gnutlsFix deferred
Red Hat Enterprise Linux 7gnutlsFix deferred
Red Hat Enterprise Linux 8gnutlsFix deferred
Red Hat OpenShift Container Platform 4rhcosFix deferred
Red Hat Enterprise Linux 10gnutlsFixedRHSA-2026:347702.03.2026
Red Hat Enterprise Linux 9gnutlsFixedRHSA-2026:418810.03.2026
Red Hat Enterprise Linux 9gnutlsFixedRHSA-2026:418810.03.2026
Red Hat Insights proxy 1.5insights-proxy/insights-proxy-container-rhel9FixedRHSA-2026:465516.03.2026
Red Hat Update Infrastructure 5rhui5/cds-rhel9FixedRHSA-2026:494318.03.2026
Red Hat Update Infrastructure 5rhui5/haproxy-rhel9FixedRHSA-2026:494318.03.2026

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2392528gnutls: Stack-based Buffer Overflow in gnutls_pkcs11_token_init() Function

EPSS

Процентиль: 3%
0.00014
Низкий

4 Medium

CVSS3

Связанные уязвимости

CVSS3: 4
ubuntu
2 месяца назад

A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.

CVSS3: 4
nvd
2 месяца назад

A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.

CVSS3: 4
debian
2 месяца назад

A flaw was found in the GnuTLS library, specifically in the gnutls_pkc ...

suse-cvrf
4 месяца назад

Security update for gnutls

suse-cvrf
4 месяца назад

Security update for gnutls

EPSS

Процентиль: 3%
0.00014
Низкий

4 Medium

CVSS3

Уязвимость CVE-2025-9820