296,172
Total vulnerabilities in the database
GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.
Software | From | Fixed in |
---|---|---|
gnu / gnutls | 3.6.3 | 3.6.13 |
debian / debian_linux | 10.0 | 10.0.x |
opensuse / leap | 15.1 | 15.1.x |
canonical / ubuntu_linux | 19.10 | 19.10.x |
fedoraproject / fedora | 31 | 31.x |
fedoraproject / fedora | 32 | 32.x |