CVE-2021-20232

CWE-416Use After Free8 documents8 sources
Severity
9.8CRITICAL
EPSS
0.8%
top 25.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 12
Latest updateMay 24

Description

A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDgnu/gnutls3.6.33.7.1
Debiangnutls28< 3.7.1-1+3
CVEListV5gnutlsgnutls 3.7.1

Also affects: Fedora 34, Enterprise Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-p947-gfm7-f4g7: A flaw was found in gnutls2022-05-24
OSV
CVE-2021-20232: A flaw was found in gnutls2021-03-12
CVEList
CVE-2021-20232: A flaw was found in gnutls2021-03-12

📋Vendor Advisories

4
Ubuntu
GnuTLS vulnerabilities2021-08-02
Red Hat
gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c2021-03-12
Microsoft
A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.2021-03-09
Debian
CVE-2021-20232: gnutls28 - A flaw was found in gnutls. A use after free issue in client_send_params in lib/...2021
CVE-2021-20232 (CRITICAL CVSS 9.8) | A flaw was found in gnutls | cvebase.io