GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 0 bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gnutls | Gnu | 3.6.3 (including) | 3.6.13 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | gnutls-0:3.6.8-10.el8_2 | * |
Red Hat Enterprise Linux 8 | RedHat | gnutls-0:3.6.8-10.el8_2 | * |
Gnutls28 | Ubuntu | devel | * |
Gnutls28 | Ubuntu | eoan | * |
Gnutls28 | Ubuntu | trusty | * |
Gnutls28 | Ubuntu | upstream | * |