CVE-2020-24659

NameCVE-2020-24659
DescriptionAn issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs969547

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnutls28 (PTS)stretch3.5.8-5+deb9u5vulnerable
stretch (security)3.5.8-5+deb9u1vulnerable
buster3.6.7-4+deb10u5vulnerable
buster (security)3.6.7-4+deb10u4vulnerable
bullseye, sid3.6.15-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnutls28source(unstable)3.6.15-1969547

Notes

[buster] - gnutls28 <no-dsa> (Minor issue)
https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-09-04
https://gitlab.com/gnutls/gnutls/-/issues/1071
https://gitlab.com/gnutls/gnutls/-/commit/29ee67c205855e848a0a26e6d0e4f65b6b943e0a

Search for package or bug name: Reporting problems