First published: Fri Sep 04 2020(Updated: )
An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GnuTLS | <3.6.15 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
Canonical Ubuntu Linux | =20.04 | |
IBM Cloud Pak for Security (CP4S) | <=1.5.0.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.5.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.6.0.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.6.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
debian/gnutls28 | 3.7.1-5+deb11u5 3.7.1-5+deb11u6 3.7.9-2+deb12u3 3.8.6-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24659 is a vulnerability in GnuTLS that can be exploited to cause a denial of service.
CVE-2020-24659 has a severity rating of 7.5 (high).
The affected software for CVE-2020-24659 includes GnuTLS versions up to and including 3.6.15, Ubuntu gnutls28 version 3.6.13-2ubuntu1.3, Fedora 32 and 33, openSUSE Leap 15.1 and 15.2, and Canonical Ubuntu Linux 20.04 LTS.
To fix CVE-2020-24659, update GnuTLS to version 3.6.15-1 or later.
You can find more information about CVE-2020-24659 at the following references: [1], [2], [3].