A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL pointer dereference, causing the server to crash and resulting in a remote Denial of Service (DoS) condition.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-1584 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2435258 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Apr 2026, 00:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://access.redhat.com/security/cve/CVE-2026-1584 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2435258 - Issue Tracking, Vendor Advisory | |
| CPE | cpe:2.3:a:gnu:gnutls:-:*:*:*:*:*:*:* cpe:2.3:a:redhat:hardened_images:-:*:*:*:*:*:*:* |
|
| First Time |
Redhat
Gnu gnutls Gnu Redhat hardened Images |
09 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-09 18:16
Updated : 2026-04-22 00:39
NVD link : CVE-2026-1584
Mitre link : CVE-2026-1584
CVE.ORG link : CVE-2026-1584
JSON object : View
Products Affected
gnu
- gnutls
redhat
- hardened_images
CWE
CWE-476
NULL Pointer Dereference
