MGASA-2020-0379

Source
https://advisories.mageia.org/MGASA-2020-0379.html
Import Source
https://advisories.mageia.org/MGASA-2020-0379.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0379
Related
Published
2020-09-30T10:01:40Z
Modified
2020-09-30T09:28:22Z
Summary
Updated gnutls packages fix security vulnerability
Details

An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a norenegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutlsdeinit function is called after detecting a handshake failure (CVE-2020-24659).

References
Credits

Affected packages

Mageia:7 / gnutls

Package

Name
gnutls
Purl
pkg:rpm/mageia/gnutls?arch=source&distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.15-1.mga7

Ecosystem specific

{
    "section": "core"
}