Description
A flaw was found in gnutls. This vulnerability occurs because permitted name constraints were incorrectly ignored when previous Certificate Authorities (CAs) only had excluded name constraints. A remote attacker could exploit this to bypass critical name constraint checks during certificate validation. This bypass could lead to the acceptance of invalid certificates, potentially enabling spoofing or man-in-the-middle attacks against affected systems.
Problem types
Improper Certificate Validation
Product status
Timeline
| 2026-05-06: | Reported to Red Hat. |
| 2026-04-29: | Made public. |
Credits
Red Hat would like to thank Haruto Kimura (Stella) for reporting this issue.
References
access.redhat.com/security/cve/CVE-2026-42011
bugzilla.redhat.com/show_bug.cgi?id=2467437 (RHBZ#2467437)