CVE-2021-20232 - log back

CVE-2021-20232 edited at 11 Mar 2021 08:11:16
Severity
- Unknown
+ Low
Remote
- Unknown
+ Remote
Type
- Unknown
+ Arbitrary code execution
Description
+ A security issue was found in GnuTLS before version 3.7.1. It was found that the client sending a "pre_share_key" extension may result in dereferencing a pointer no longer valid after realloc(). This only happens in TLS 1.3 and only when the client sends a large Client Hello message, e.g., when HRR is sent in a resumed session previously negotiated large FFDHE parameters, because the initial allocation of the buffer is large enough without having to call realloc().
References
+ https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
+ https://gitlab.com/gnutls/gnutls/-/issues/1151
+ https://gitlab.com/gnutls/gnutls/-/merge_requests/1399
+ https://gitlab.com/gnutls/gnutls/-/commit/75a937d97f4fefc6f9b08e3791f151445f551cb3
CVE-2021-20232 created at 11 Mar 2021 08:04:50