Description
A flaw was found in gnutls. A remote attacker could exploit an issue in the Datagram Transport Layer Security (DTLS) packet reordering logic. The comparator function, responsible for ordering DTLS packets by sequence numbers, did not correctly handle packets with duplicate sequence numbers. This could lead to unstable packet ordering or undefined behavior, resulting in a denial of service.
Published: 2026-05-18
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw was discovered in the GnuTLS Datagram Transport Layer Security (DTLS) implementation. The comparator that orders packets by sequence number fails to handle duplicate sequence numbers, which can cause unstable ordering or undefined behavior. When an attacker sends crafted DTLS packets with repeated sequence numbers, the affected service may crash or become otherwise unusable, resulting in a denial of service. The weakness is identified as CWE-475, indicating an improper comparison of data values.

Affected Systems

The vulnerability affects Red Hat Enterprise Linux 10, 9, 8, 7, and 6, including Red Hat Hardened Images, as well as Red Hat OpenShift Container Platform 4. All of these include the GnuTLS library containing the faulty comparator logic.

Risk and Exploitability

The CVSS score of 7.5 reflects a high severity impact for remote attackers. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that it is not currently known to be exploited in the wild. The likely attack vector is remote over a network where the vulnerable system receives DTLS traffic. No authentication or privileged access is required; any host that sends malicious DTLS packets can trigger the denial of service. Because the flaw manifests as a crash or hang, the primary impact is a single‑point disruption of services that rely on DTLS, which can cascade in a clustered or high‑availability environment.

Generated by OpenCVE AI on May 18, 2026 at 14:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the GnuTLS package to the latest patched version provided by the vendor and reload the affected services.
  • Restart or reload the impacted services once the package update is applied to ensure the new library is in use.
  • As a temporary measure, block or quarantine DTLS traffic on the affected hosts with firewall rules, or disable DTLS in application configuration until the patch is applied.

Generated by OpenCVE AI on May 18, 2026 at 14:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 13:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in gnutls. A remote attacker could exploit an issue in the Datagram Transport Layer Security (DTLS) packet reordering logic. The comparator function, responsible for ordering DTLS packets by sequence numbers, did not correctly handle packets with duplicate sequence numbers. This could lead to unstable packet ordering or undefined behavior, resulting in a denial of service.
Title Gnutls: gnutls: denial of service via dtls packet reordering vulnerability
First Time appeared Redhat
Redhat enterprise Linux
Redhat hummingbird
Redhat openshift
Weaknesses CWE-475
CPEs cpe:/a:redhat:hummingbird:1
cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat hummingbird
Redhat openshift
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Redhat Enterprise Linux Hummingbird Openshift
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-05-18T12:44:45.229Z

Reserved: 2026-04-23T11:23:46.516Z

Link: CVE-2026-42009

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-18T13:16:32.707

Modified: 2026-05-18T13:16:32.707

Link: CVE-2026-42009

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T14:45:16Z

Weaknesses