|Description||An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
More Information: https://security-tracker.debian.org/tracker/CVE-2020-24659
Feature Version: 3.6.7-4+deb10u5
Fixed By Version:
|Container Layer Hash||sha256:bf59529304463f62efa7179fa1a32718a611528cc4ce9f30c0d1bbc6724ec3fb|
|Assessment||Unassessed by unknown on|
|There are no comments for this vulnerability.|