Description
A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
References (15)
Core 15
Core References
Vendor Advisory vendor-advisory
x_refsource_redhat
RHSA-2026:5585
https://access.redhat.com/errata/RHSA-2026:5585
Various Sources
https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18
Issue Tracking
https://gitlab.com/gnutls/gnutls/-/issues/1732
Vendor Advisory vendor-advisory
x_refsource_redhat
RHSA-2026:13812
https://access.redhat.com/errata/RHSA-2026:13812
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2026:3477
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2026:4188
Vendor Advisory vendor-advisory
x_refsource_redhat
RHSA-2026:4655
https://access.redhat.com/errata/RHSA-2026:4655
Vendor Advisory vendor-advisory
x_refsource_redhat
RHSA-2026:4943
https://access.redhat.com/errata/RHSA-2026:4943
Vendor Advisory vendor-advisory
x_refsource_redhat
RHSA-2026:5606
https://access.redhat.com/errata/RHSA-2026:5606
Vendor Advisory vendor-advisory
x_refsource_redhat
RHSA-2026:7329
https://access.redhat.com/errata/RHSA-2026:7329
Vendor Advisory vendor-advisory
x_refsource_redhat
RHSA-2026:7477
https://access.redhat.com/errata/RHSA-2026:7477
Vendor Advisory vdb-entry
x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2025-9820
Issue Tracking issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2392528
Scores
CVSS v3
4.0
EPSS
0.0001
EPSS Percentile
0.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-121
Status
published
Products (34)
Red Hat/Red Hat Ceph Storage 8
1774002867
Red Hat/Red Hat Ceph Storage 8
sha256:1160569002c25d3d349bbe41b57eeffade438853d3419edca01813227440f414
Red Hat/Red Hat Ceph Storage 8
sha256:a0f0f9770911d6a0fc522f304942765059643193e95c9f6e505462f98a979db1
Red Hat/Red Hat Discovery 2
1775668717
Red Hat/Red Hat Discovery 2
1775675922
Red Hat/Red Hat Discovery 2
sha256:040dadd657afdb9f0914f896a4962fd3dbf40b70c8037e4d72b6801b766c9b7d
Red Hat/Red Hat Discovery 2
sha256:062310de4b34e278f8c7e4634def673a77d1228d493541ef1264ba4cb83b68eb
Red Hat/Red Hat Enterprise Linux 10
0:3.8.10-3.el10_1
Red Hat/Red Hat Enterprise Linux 6
Red Hat/Red Hat Enterprise Linux 7
... and 24 more
Published
Jan 26, 2026
Tracked Since
Feb 18, 2026