Low severity3.7NVD Advisory· Published Apr 30, 2026· Updated May 11, 2026
CVE-2026-3832
CVE-2026-3832
Description
A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls processes multi-record OCSP responses, a client with OCSP verification enabled may incorrectly accept a revoked server certificate, potentially leading to a compromise of trust.
Affected products
9- cpe:2.3:a:redhat:hardened_images:-:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- gitlab.com/gnutls/gnutls/-/issues/1801nvdExploitIssue TrackingVendor Advisory
- access.redhat.com/errata/RHSA-2026:13274nvdThird Party Advisory
- access.redhat.com/security/cve/CVE-2026-3832nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
News mentions
3- Patch Tuesday - May 2026Rapid7 Blog · May 13, 2026
- New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code ExecutionThe Hacker News · May 12, 2026
- Siemens SIMATICCISA Alerts