<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for gnutls is now available for openEuler-20.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-2403</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-05-22</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-05-22</InitialReleaseDate>
		<CurrentReleaseDate>2026-05-22</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-05-22</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">gnutls security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for gnutls is now available for openEuler-20.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, and other required structures. The project strives to provide a secure communications back-end, simple to use and integrated with the rest of the base Linux libraries. A back-end designed to work and be secure out of the box, keeping the complexity of TLS and PKI out of application code.

Security Fix(es):

A flaw was found in gnutls. A remote attacker could exploit an issue in the Datagram Transport Layer Security (DTLS) packet reordering logic. The comparator function, responsible for ordering DTLS packets by sequence numbers, did not correctly handle packets with duplicate sequence numbers. This could lead to unstable packet ordering or undefined behavior, resulting in a denial of service.(CVE-2026-42009)

A flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched usernames containing a NUL character with truncated usernames. A remote attacker could exploit this by sending a specially crafted username, leading to an authentication bypass. This vulnerability allows an attacker to gain unauthorized access by circumventing the authentication process.(CVE-2026-42010)

(CVE-2026-42013)

(CVE-2026-42014)

(CVE-2026-42015)

(CVE-2026-5260)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for gnutls is now available for openEuler-20.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">gnutls</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2403</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-42009</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-42010</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-42013</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-42014</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-42015</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-5260</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-42009</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-42010</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-42013</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-42014</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-42015</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-5260</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="gnutls-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-3.6.14-22.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-debuginfo-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-debuginfo-3.6.14-22.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-debugsource-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-debugsource-3.6.14-22.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-devel-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-devel-3.6.14-22.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-utils-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-utils-3.6.14-22.oe2003sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="gnutls-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-3.6.14-22.oe2003sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="gnutls-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-3.6.14-22.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-debuginfo-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-debuginfo-3.6.14-22.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-debugsource-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-debugsource-3.6.14-22.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-devel-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-devel-3.6.14-22.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="gnutls-utils-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-utils-3.6.14-22.oe2003sp4.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="gnutls-help-3.6.14-22" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">gnutls-help-3.6.14-22.oe2003sp4.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in gnutls. A remote attacker could exploit an issue in the Datagram Transport Layer Security (DTLS) packet reordering logic. The comparator function, responsible for ordering DTLS packets by sequence numbers, did not correctly handle packets with duplicate sequence numbers. This could lead to unstable packet ordering or undefined behavior, resulting in a denial of service.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-42009</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>gnutls security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2403</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched usernames containing a NUL character with truncated usernames. A remote attacker could exploit this by sending a specially crafted username, leading to an authentication bypass. This vulnerability allows an attacker to gain unauthorized access by circumventing the authentication process.</Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-42010</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>gnutls security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2403</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"></Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-42013</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>gnutls security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2403</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"></Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-42014</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.0</BaseScore>
				<Vector>AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>gnutls security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2403</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"></Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-42015</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.1</BaseScore>
				<Vector>AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>gnutls security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2403</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"></Note>
		</Notes>
		<ReleaseDate>2026-05-22</ReleaseDate>
		<CVE>CVE-2026-5260</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.9</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>gnutls security update</Description>
				<DATE>2026-05-22</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2403</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>