Skip to content
CVSS 7.5 · HIGH

CVE-2026-33845

A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read. This issue is remotely exploitable and may cause information disclosure or denial of service.

View on NVD

Analysis

GnuTLS is vulnerable to a remote integer underflow during DTLS handshake parsing, which can lead to information disclosure or a denial of service. Since GnuTLS is a core component of RHEL, OpenShift, and many Linux-based applications, users should update their packages immediately to secure their encrypted communications.

Severity

Score: 7.5(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: NONE
I: NONE
A: HIGH
Weakness (CWE): CWE-191

EPSS

Probability of exploitation (next 30 days): 0.0005 (0.0%)
Percentile: 14.0%
EPSS: 2026-05-06

Affects

gnu:gnutlsredhat:openshift_container_platformredhat:enterprise_linux

Technical description

A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read. This issue is remotely exploitable and may cause information disclosure or denial of service.

Published: 4/30/2026, 6:16:28 PM
Last modified: 5/5/2026, 3:03:19 AM

References

HomeEventsBlogResourcesTeam