CVE-2026-33845

NameCVE-2026-33845
DescriptionA flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read. This issue is remotely exploitable and may cause information disclosure or denial of service.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6281-1
Debian Bugs1135319

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnutls28 (PTS)bullseye3.7.1-5+deb11u5vulnerable
bullseye (security)3.7.1-5+deb11u9vulnerable
bookworm3.7.9-2+deb12u6vulnerable
bookworm (security)3.7.9-2+deb12u7fixed
trixie3.8.9-3+deb13u3vulnerable
trixie (security)3.8.9-3+deb13u4fixed
forky, sid3.8.13-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnutls28sourcebookworm3.7.9-2+deb12u7DSA-6281-1
gnutls28sourcetrixie3.8.9-3+deb13u4DSA-6281-1
gnutls28source(unstable)3.8.13-11135319

Notes

https://www.gnutls.org/security-new.html#GNUTLS-SA-2026-04-29-3
https://gitlab.com/gnutls/gnutls/-/issues/1811
Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/e5b72c53c7d789d19d1d1cd10b275e87d0415413 (3.8.13)

Search for package or bug name: Reporting problems