rpm package
suse/gnutls&distro=SUSE Linux Enterprise Module for Basesystem 15 SP1
pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1
Vulnerabilities (4)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-24659 | — | < 3.6.7-6.34.1 | 3.6.7-6.34.1 | Sep 4, 2020 | An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path | ||
| CVE-2020-13777 | — | < 3.6.7-6.29.1 | 3.6.7-6.29.1 | Jun 4, 2020 | GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first | ||
| CVE-2020-11501 | — | < 3.6.7-6.14.1 | 3.6.7-6.14.1 | Apr 3, 2020 | GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negot | ||
| CVE-2018-16868 | — | < 3.6.7-6.11.1 | 3.6.7-6.11.1 | Dec 3, 2018 | A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in som |
- CVE-2020-24659Sep 4, 2020affected < 3.6.7-6.34.1fixed 3.6.7-6.34.1
An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path
- CVE-2020-13777Jun 4, 2020affected < 3.6.7-6.29.1fixed 3.6.7-6.29.1
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first
- CVE-2020-11501Apr 3, 2020affected < 3.6.7-6.14.1fixed 3.6.7-6.14.1
GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negot
- CVE-2018-16868Dec 3, 2018affected < 3.6.7-6.11.1fixed 3.6.7-6.11.1
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in som