{"schema_version":"1.7.2","id":"OESA-2021-1109","modified":"2021-04-07T11:02:45Z","published":"2021-04-07T11:02:45Z","upstream":["CVE-2021-20231","CVE-2021-20232"],"summary":"gnutls security update","details":"GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, and other required structures. The project strives to provide a secure communications back-end, simple to use and integrated with the rest of the base Linux libraries. A back-end designed to work and be secure out of the box, keeping the complexity of TLS and PKI out of application code.\r\n\r\nSecurity Fix(es):\r\n\r\nA flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.(CVE-2021-20231)\r\n\r\nA flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.(CVE-2021-20232)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls\u0026distro=openEuler-20.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.14-7.oe1"}]}],"ecosystem_specific":{"aarch64":["gnutls-debugsource-3.6.14-7.oe1.aarch64.rpm","gnutls-debuginfo-3.6.14-7.oe1.aarch64.rpm","gnutls-3.6.14-7.oe1.aarch64.rpm","gnutls-devel-3.6.14-7.oe1.aarch64.rpm","gnutls-devel-3.6.14-7.oe1.aarch64.rpm","gnutls-3.6.14-7.oe1.aarch64.rpm","gnutls-debuginfo-3.6.14-7.oe1.aarch64.rpm","gnutls-debugsource-3.6.14-7.oe1.aarch64.rpm"],"noarch":["gnutls-help-3.6.14-7.oe1.noarch.rpm","gnutls-help-3.6.14-7.oe1.noarch.rpm"],"src":["gnutls-3.6.14-7.oe1.src.rpm","gnutls-3.6.14-7.oe1.src.rpm"],"x86_64":["gnutls-3.6.14-7.oe1.x86_64.rpm","gnutls-debugsource-3.6.14-7.oe1.x86_64.rpm","gnutls-devel-3.6.14-7.oe1.x86_64.rpm","gnutls-debuginfo-3.6.14-7.oe1.x86_64.rpm","gnutls-devel-3.6.14-7.oe1.x86_64.rpm","gnutls-3.6.14-7.oe1.x86_64.rpm","gnutls-debuginfo-3.6.14-7.oe1.x86_64.rpm","gnutls-debugsource-3.6.14-7.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.14-7.oe1"}]}],"ecosystem_specific":{"aarch64":["gnutls-devel-3.6.14-7.oe1.aarch64.rpm","gnutls-3.6.14-7.oe1.aarch64.rpm","gnutls-debuginfo-3.6.14-7.oe1.aarch64.rpm","gnutls-debugsource-3.6.14-7.oe1.aarch64.rpm"],"noarch":["gnutls-help-3.6.14-7.oe1.noarch.rpm"],"src":["gnutls-3.6.14-7.oe1.src.rpm"],"x86_64":["gnutls-devel-3.6.14-7.oe1.x86_64.rpm","gnutls-3.6.14-7.oe1.x86_64.rpm","gnutls-debuginfo-3.6.14-7.oe1.x86_64.rpm","gnutls-debugsource-3.6.14-7.oe1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1109"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20231"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20232"}],"database_specific":{"severity":"Critical"}}