File _patchinfo of Package patchinfo.15330
<patchinfo incident="15330">
<issue tracker="bnc" id="1172506">VUL-0: CVE-2020-13777: gnutls: session resumption works without master key allowing MITM</issue>
<issue tracker="bnc" id="1172461">gnutls fails to verify certificate chains that contain an expired cross-signed intermediate in alternate chains</issue>
<issue tracker="cve" id="2020-13777"/>
<packager>vitezslav_cizek</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for gnutls</summary>
<description>This update for gnutls fixes the following issues:
- CVE-2020-13777: Fixed an insecure session ticket key construction which could
have made the TLS server to not bind the session ticket encryption key with a
value supplied by the application until the initial key rotation, allowing
an attacker to bypass authentication in TLS 1.3 and recover previous
conversations in TLS 1.2 (bsc#1172506).
- Fixed an improper handling of certificate chain with cross-signed intermediate
CA certificates (bsc#1172461).
</description>
</patchinfo>