CVE-2026-42011

NameCVE-2026-42011
DescriptionA flaw was found in gnutls. This vulnerability occurs because permitted name constraints were incorrectly ignored when previous Certificate Authorities (CAs) only had excluded name constraints. A remote attacker could exploit this to bypass critical name constraint checks during certificate validation. This bypass could lead to the acceptance of invalid certificates, potentially enabling spoofing or man-in-the-middle attacks against affected systems.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6281-1
Debian Bugs1135319

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnutls28 (PTS)bullseye3.7.1-5+deb11u5vulnerable
bullseye (security)3.7.1-5+deb11u9vulnerable
bookworm3.7.9-2+deb12u6vulnerable
bookworm (security)3.7.9-2+deb12u7fixed
trixie3.8.9-3+deb13u3vulnerable
trixie (security)3.8.9-3+deb13u4fixed
forky, sid3.8.13-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnutls28sourcebookworm3.7.9-2+deb12u7DSA-6281-1
gnutls28sourcetrixie3.8.9-3+deb13u4DSA-6281-1
gnutls28source(unstable)3.8.13-11135319

Notes

https://www.gnutls.org/security-new.html#GNUTLS-SA-2026-04-29-6
https://gitlab.com/gnutls/gnutls/-/work_items/1824
Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/1dead2faec6320aaba321eb56f20d442df192b83 (3.8.13)

Search for package or bug name: Reporting problems