Impact
A NULL pointer dereference occurs in the GnuTLS function _gnutls_figure_common_ciphersuite(), which is invoked during TLS cipher suite negotiation. This flaw can cause the library to dereference a null pointer, leading to an application crash or termination of the TLS process. The resulting denial‑of‑service may interrupt any services that rely on GnuTLS for encrypted communication. The weakness is classified under CWE‑476.
Affected Systems
The vulnerable releases include Red Hat Ceph Storage 7, Red Hat Discovery 2, various releases of Red Hat Enterprise Linux from versions 6 through 10, the Extended Update Support streams for RHEL 9.2 and 9.4, Red Hat Insights Proxy 1.5, and Red Hat OpenShift Container Platform 4. The errata RHSA‑2025:16115 to RHSA‑2025:22529 provide the fixed packages for each affected product.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote, involving a TLS client that initiates a handshake and triggers the null‑pointer dereference. Exploitation would result in the TLS library crashing, leading to a denial‑of‑service of affected services.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN