CVE-2026-42010

NameCVE-2026-42010
DescriptionA flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched usernames containing a NUL character with truncated usernames. A remote attacker could exploit this by sending a specially crafted username, leading to an authentication bypass. This vulnerability allows an attacker to gain unauthorized access by circumventing the authentication process.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6281-1
Debian Bugs1135319

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnutls28 (PTS)bullseye3.7.1-5+deb11u5vulnerable
bullseye (security)3.7.1-5+deb11u9vulnerable
bookworm3.7.9-2+deb12u6vulnerable
bookworm (security)3.7.9-2+deb12u7fixed
trixie3.8.9-3+deb13u3vulnerable
trixie (security)3.8.9-3+deb13u4fixed
forky, sid3.8.13-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnutls28sourcebookworm3.7.9-2+deb12u7DSA-6281-1
gnutls28sourcetrixie3.8.9-3+deb13u4DSA-6281-1
gnutls28source(unstable)3.8.13-11135319

Notes

https://www.gnutls.org/security-new.html#GNUTLS-SA-2026-04-29-4
https://gitlab.com/gnutls/gnutls/-/issues/1850
Fixed by: https://gitlab.com/gnutls/gnutls/-/commit/cb1833afd9b6309563211b1c0a7c291f52ca98d5 (3.8.13)

Search for package or bug name: Reporting problems