Unrated severityNVD Advisory· Published Mar 12, 2021· Updated Dec 3, 2025
CVE-2021-20232
CVE-2021-20232
Description
A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.
Affected products
37- gnutls/gnutlsdescription
- osv-coords36 versionspkg:apk/chainguard/gnutlspkg:apk/chainguard/gnutls-c++pkg:apk/chainguard/gnutls-c%2B%2Bpkg:apk/chainguard/gnutls-devpkg:apk/chainguard/gnutls-docpkg:apk/chainguard/gnutls-utilspkg:apk/wolfi/gnutlspkg:apk/wolfi/gnutls-c++pkg:apk/wolfi/gnutls-c%2B%2Bpkg:apk/wolfi/gnutls-devpkg:apk/wolfi/gnutls-docpkg:apk/wolfi/gnutls-utilspkg:rpm/almalinux/gnutlspkg:rpm/almalinux/gnutls-c%2B%2Bpkg:rpm/almalinux/gnutls-danepkg:rpm/almalinux/gnutls-develpkg:rpm/almalinux/gnutls-utilspkg:rpm/almalinux/nettlepkg:rpm/almalinux/nettle-develpkg:rpm/opensuse/gnutls&distro=openSUSE%20Leap%2015.2pkg:rpm/opensuse/gnutls&distro=openSUSE%20Tumbleweedpkg:rpm/suse/gnutls&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Micro%205.0pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP2pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/gnutls&distro=SUSE%20Manager%20Proxy%204.0pkg:rpm/suse/gnutls&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.0pkg:rpm/suse/gnutls&distro=SUSE%20Manager%20Server%204.0
< 0+ 35 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 3.6.16-4.el8
- (no CPE)range: < 3.6.16-4.el8
- (no CPE)range: < 3.6.16-4.el8
- (no CPE)range: < 3.6.16-4.el8
- (no CPE)range: < 3.6.16-4.el8
- (no CPE)range: < 3.4.1-7.el8
- (no CPE)range: < 3.4.1-7.el8
- (no CPE)range: < 3.6.7-lp152.9.9.1
- (no CPE)range: < 3.7.2-1.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-14.10.2
- (no CPE)range: < 3.6.7-14.10.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
- (no CPE)range: < 3.6.7-6.40.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/mitrevendor-advisoryx_refsource_FEDORA
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_MISC
- lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3Emitremailing-listx_refsource_MLIST
- security.netapp.com/advisory/ntap-20210416-0005/mitrex_refsource_CONFIRM
- www.gnutls.org/security-new.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.