Bug 1168345 (CVE-2020-11501) - VUL-0: CVE-2020-11501: gnutls: DTLS client hello contains a random value of all zeroes
Summary: VUL-0: CVE-2020-11501: gnutls: DTLS client hello contains a random value of a...
Status: RESOLVED FIXED
Alias: CVE-2020-11501
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P2 - High : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/256260/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-11501:7.4:(AV...
Keywords:
Depends on:
Blocks:
 
Reported: 2020-04-01 14:36 UTC by Wolfgang Frisch
Modified: 2024-04-08 13:51 UTC (History)
5 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2020-04-01 14:36:51 UTC
An issue was discovered in GnuTLS 3.6.3 through 3.6.12.
The DTLS Client Hello handshake contains a random value of 0.

Upstream bug report:
https://gitlab.com/gnutls/gnutls/-/issues/960

Faulty commit that introduced the bug:
https://gitlab.com/gnutls/gnutls/-/commit/bcf4de0371efbdf0846388e2df0cb14b5db09954

Upstream fix:
https://gitlab.com/gnutls/gnutls/-/commit/c01011c2d8533dbbbe754e49e256c109cb848d0d
Comment 7 Swamp Workflow Management 2020-04-08 10:16:18 UTC
SUSE-SU-2020:0948-1: An update that solves one vulnerability and has three fixes is now available.

Category: security (moderate)
Bug References: 1152692,1155327,1166881,1168345
CVE References: CVE-2020-11501
Sources used:
SUSE Linux Enterprise Server for SAP 15 (src):    gmp-6.1.2-4.3.1, gnutls-3.6.7-6.14.1, libnettle-3.4.1-4.12.1
SUSE Linux Enterprise Server 15-LTSS (src):    gmp-6.1.2-4.3.1, gnutls-3.6.7-6.14.1, libnettle-3.4.1-4.12.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP2 (src):    gnutls-3.6.7-6.14.1, libnettle-3.4.1-4.12.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    gnutls-3.6.7-6.14.1, libnettle-3.4.1-4.12.1
SUSE Linux Enterprise Module for Development Tools 15-SP2 (src):    gmp-6.1.2-4.3.1
SUSE Linux Enterprise Module for Development Tools 15-SP1 (src):    gmp-6.1.2-4.3.1
SUSE Linux Enterprise Module for Basesystem 15-SP2 (src):    gmp-6.1.2-4.3.1, gnutls-3.6.7-6.14.1, libnettle-3.4.1-4.12.1
SUSE Linux Enterprise Module for Basesystem 15-SP1 (src):    gmp-6.1.2-4.3.1, gnutls-3.6.7-6.14.1, libnettle-3.4.1-4.12.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    gmp-6.1.2-4.3.1, gnutls-3.6.7-6.14.1, libnettle-3.4.1-4.12.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    gmp-6.1.2-4.3.1, gnutls-3.6.7-6.14.1, libnettle-3.4.1-4.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Swamp Workflow Management 2020-04-11 16:16:31 UTC
openSUSE-SU-2020:0501-1: An update that solves one vulnerability and has three fixes is now available.

Category: security (moderate)
Bug References: 1152692,1155327,1166881,1168345
CVE References: CVE-2020-11501
Sources used:
openSUSE Leap 15.1 (src):    gmp-6.1.2-lp151.4.3.1, gnutls-3.6.7-lp151.2.6.1, libnettle-3.4.1-lp151.2.3.2
Comment 9 Alexandros Toptsoglou 2020-04-24 15:26:35 UTC
Done
Comment 14 Swamp Workflow Management 2022-07-13 19:18:56 UTC
SUSE-SU-2020:0948-2: An update that solves one vulnerability, contains one feature and has three fixes is now available.

Category: security (moderate)
Bug References: 1152692,1155327,1166881,1168345
CVE References: CVE-2020-11501
JIRA References: SLE-9518
Sources used:
SUSE Linux Enterprise Module for Certifications 15-SP3 (src):    gmp-6.1.2-4.3.1, libnettle-3.4.1-4.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.