Home

Description

A flaw was found in gnutls. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake. This can lead to a NULL pointer dereference, causing the server to crash and resulting in a remote Denial of Service (DoS) condition.

PUBLISHED Reserved 2026-01-29 | Published 2026-04-09 | Updated 2026-04-09 | Assigner redhat




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

NULL Pointer Dereference

Product status

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
unaffected

Default status
affected

Default status
unaffected

Timeline

2026-01-29:Reported to Red Hat.
2026-02-09:Made public.

References

access.redhat.com/security/cve/CVE-2026-1584 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2435258 (RHBZ#2435258) issue-tracking

cve.org (CVE-2026-1584)

nvd.nist.gov (CVE-2026-1584)

Download JSON