Related Vulnerabilities: CVE-2021-20231  

A security issue was found in GnuTLS before version 3.7.1. It was found that the client sending a "key_share" extension may result in dereferencing a pointer no longer valid after realloc(). This only happens in TLS 1.3 and only when the client sends a large Client Hello message, e.g., when HRR is sent in a resumed session previously negotiated large FFDHE parameters, because the initial allocation of the buffer is large enough without having to call realloc().

Severity Low

Remote Yes

Type Arbitrary code execution

Description

A security issue was found in GnuTLS before version 3.7.1. It was found that the client sending a "key_share" extension may result in dereferencing a pointer no longer valid after realloc(). This only happens in TLS 1.3 and only when the client sends a large Client Hello message, e.g., when HRR is sent in a resumed session previously negotiated large FFDHE parameters, because the initial allocation of the buffer is large enough without having to call realloc().

AVG-1674 gnutls 3.7.0-1 3.7.1-1 Low Fixed

https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
https://gitlab.com/gnutls/gnutls/-/issues/1151
https://gitlab.com/gnutls/gnutls/-/merge_requests/1399
https://gitlab.com/gnutls/gnutls/-/commit/15beb4b193b2714d88107e7dffca781798684e7e