vulnerability
SUSE: CVE-2020-11501: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | Apr 3, 2020 | Apr 9, 2020 | Oct 22, 2021 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Apr 3, 2020
Added
Apr 9, 2020
Modified
Oct 22, 2021
Description
GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.
Solutions
suse-upgrade-gmp-develsuse-upgrade-gmp-devel-32bitsuse-upgrade-gnutlssuse-upgrade-gnutls-guilesuse-upgrade-libgmp10suse-upgrade-libgmp10-32bitsuse-upgrade-libgmpxx4suse-upgrade-libgmpxx4-32bitsuse-upgrade-libgnutls-dane-develsuse-upgrade-libgnutls-dane0suse-upgrade-libgnutls-develsuse-upgrade-libgnutls-devel-32bitsuse-upgrade-libgnutls30suse-upgrade-libgnutls30-32bitsuse-upgrade-libgnutls30-hmacsuse-upgrade-libgnutls30-hmac-32bitsuse-upgrade-libgnutlsxx-develsuse-upgrade-libgnutlsxx28suse-upgrade-libhogweed4suse-upgrade-libhogweed4-32bitsuse-upgrade-libnettle-develsuse-upgrade-libnettle-devel-32bitsuse-upgrade-libnettle6suse-upgrade-libnettle6-32bitsuse-upgrade-nettle
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.