Debian dsa-6281 : gnutls-bin - security update

critical Nessus Plugin ID 315514

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 12 / 13 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-6281 advisory.

- ------------------------------------------------------------------------- Debian Security Advisory DSA-6281-1 [email protected] https://www.debian.org/security/ Salvatore Bonaccorso May 19, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : gnutls28 CVE ID : CVE-2026-3832 CVE-2026-3833 CVE-2026-5260 CVE-2026-5419 CVE-2026-33845 CVE-2026-33846 CVE-2026-42009 CVE-2026-42010 CVE-2026-42011 CVE-2026-42012 CVE-2026-42013 CVE-2026-42014 CVE-2026-42015 Debian Bug : 1135319

Multiple security vulnerabilities have been discovered in GnuTLS, a library implementing the TLS and SSL protocols, which may result in execution of arbitrary code, denial of service, information leak, certificate misuse, name constraint bypass, authentication bypass, revocation bypass or timing side-channel attacks.

For the oldstable distribution (bookworm), these problems have been fixed in version 3.7.9-2+deb12u7.

For the stable distribution (trixie), these problems have been fixed in version 3.8.9-3+deb13u4.

We recommend that you upgrade your gnutls28 packages.

For the detailed security status of gnutls28 please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/gnutls28

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: [email protected]

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the gnutls-bin packages.

See Also

https://security-tracker.debian.org/tracker/source-package/gnutls28

https://security-tracker.debian.org/tracker/CVE-2026-33845

https://security-tracker.debian.org/tracker/CVE-2026-33846

https://security-tracker.debian.org/tracker/CVE-2026-3832

https://security-tracker.debian.org/tracker/CVE-2026-3833

https://security-tracker.debian.org/tracker/CVE-2026-42009

https://security-tracker.debian.org/tracker/CVE-2026-42010

https://security-tracker.debian.org/tracker/CVE-2026-42011

https://security-tracker.debian.org/tracker/CVE-2026-42012

https://security-tracker.debian.org/tracker/CVE-2026-42013

https://security-tracker.debian.org/tracker/CVE-2026-42014

https://security-tracker.debian.org/tracker/CVE-2026-42015

https://security-tracker.debian.org/tracker/CVE-2026-5260

https://security-tracker.debian.org/tracker/CVE-2026-5419

https://packages.debian.org/source/bookworm/gnutls28

https://packages.debian.org/source/trixie/gnutls28

Plugin Details

Severity: Critical

ID: 315514

File Name: debian_DSA-6281.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/19/2026

Updated: 5/19/2026

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-42010

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:libgnutlsxx30, p-cpe:/a:debian:debian_linux:libgnutls30, p-cpe:/a:debian:debian_linux:libgnutls-dane0t64, p-cpe:/a:debian:debian_linux:gnutls-doc, p-cpe:/a:debian:debian_linux:libgnutls28-dev, p-cpe:/a:debian:debian_linux:libgnutls-openssl27, p-cpe:/a:debian:debian_linux:guile-gnutls, p-cpe:/a:debian:debian_linux:libgnutls-openssl27t64, p-cpe:/a:debian:debian_linux:libgnutls-dane0, p-cpe:/a:debian:debian_linux:libgnutls30t64, p-cpe:/a:debian:debian_linux:gnutls-bin, cpe:/o:debian:debian_linux:12.0, cpe:/o:debian:debian_linux:13.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/19/2026

Vulnerability Publication Date: 4/30/2026

Reference Information

CVE: CVE-2026-33845, CVE-2026-33846, CVE-2026-3832, CVE-2026-3833, CVE-2026-42009, CVE-2026-42010, CVE-2026-42011, CVE-2026-42012, CVE-2026-42013, CVE-2026-42014, CVE-2026-42015, CVE-2026-5260, CVE-2026-5419