Description
A flaw was found in gnutls. This vulnerability occurs because permitted name constraints were incorrectly ignored when previous Certificate Authorities (CAs) only had excluded name constraints. A remote attacker could exploit this to bypass critical name constraint checks during certificate validation. This bypass could lead to the acceptance of invalid certificates, potentially enabling spoofing or man-in-the-middle attacks against affected systems.
Published: 2026-05-07
Score: 7.4 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw in GnuTLS occurs when a Certificate Authority provides only excluded name constraints; the library incorrectly ignores permitted constraints, allowing a remote attacker to bypass certificate validation. This defect permits the acceptance of forged certificates, potentially enabling spoofing or man‑in‑the‑middle attacks. The weakness falls under CWE‑295, which relates to improper certificate validation during transport layer security. The primary impact is a remote bypass of certificate constraints that can compromise the integrity of secure communications.

Affected Systems

All Red Hat distributions that ship the affected GnuTLS version are impacted, including Red Hat Enterprise Linux 10, 6 through 9, Red Hat Hardened Images, and OpenShift Container Platform 4. These products all incorporate the same underlying GnuTLS library that contains the defect.

Risk and Exploitability

The CVSS score of 7.4 indicates high severity. The EPSS score is not available, so the exploitation probability cannot be quantified, but the lack of a known exploit in the wild does not diminish the risk. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is remote, with an attacker delivering a crafted TLS client or server that presents an invalid certificate; if the validation logic is bypassed, the attacker can impersonate a legitimate server or intercept encrypted traffic.

Generated by OpenCVE AI on May 7, 2026 at 16:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply Red Hat’s security update that addresses the GnuTLS name‑constraint flaw (refer to the advisory at https://access.redhat.com/security/cve/CVE-2026-42011).
  • For containerized workloads such as OpenShift, rebuild or redeploy images using the patched GnuTLS base, or install the latest GnuTLS package manually through the cluster image registry.
  • If you cannot apply the patch immediately, add an application‑level check that explicitly validates certificate name constraints to mitigate the risk of future regressions.

Generated by OpenCVE AI on May 7, 2026 at 16:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 07 May 2026 14:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in gnutls. This vulnerability occurs because permitted name constraints were incorrectly ignored when previous Certificate Authorities (CAs) only had excluded name constraints. A remote attacker could exploit this to bypass critical name constraint checks during certificate validation. This bypass could lead to the acceptance of invalid certificates, potentially enabling spoofing or man-in-the-middle attacks against affected systems.
Title Gnutls: gnutls: security bypass due to incorrect name constraint handling
First Time appeared Redhat
Redhat enterprise Linux
Redhat hummingbird
Redhat openshift
Weaknesses CWE-295
CPEs cpe:/a:redhat:hummingbird:1
cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat hummingbird
Redhat openshift
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Redhat Enterprise Linux Hummingbird Openshift
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-05-07T14:55:17.287Z

Reserved: 2026-04-23T11:23:46.517Z

Link: CVE-2026-42011

cve-icon Vulnrichment

Updated: 2026-05-07T14:55:14.420Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-07T15:16:09.760

Modified: 2026-05-07T15:48:55.550

Link: CVE-2026-42011

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T17:00:12Z

Weaknesses