{"id":"CVE-2021-20231","details":"A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.","modified":"2026-03-20T11:38:13.254154Z","published":"2021-03-12T19:15:13.037Z","related":["ALSA-2021:4451","CGA-gxr2-m53m-xp6r","MGASA-2021-0291","SUSE-SU-2021:0934-1","SUSE-SU-2021:0935-1","openSUSE-SU-2021:0470-1"],"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210416-0005/"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922276"},{"type":"EVIDENCE","url":"https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gnutls/gnutls","events":[{"introduced":"c87f22eec1b412aaafa873ff81b02f52532bfa79"},{"fixed":"3aa1c455cc2fd7f63a0ee6fd90791b46bf06eb79"}],"database_specific":{"versions":[{"introduced":"3.6.3"},{"fixed":"3.7.1"}]}}],"versions":["3.6.12","3.6.13","3.6.14","3.7.0","gnutls_3_6_10","gnutls_3_6_11","gnutls_3_6_11_1","gnutls_3_6_12","gnutls_3_6_3","gnutls_3_6_4","gnutls_3_6_5","gnutls_3_6_6","gnutls_3_6_7","gnutls_3_6_9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-20231.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}