Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
References
| Link | Resource |
|---|---|
| https://gitlab.com/gnutls/libtasn1 | Product |
| https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 | Patch |
| http://www.openwall.com/lists/oss-security/2026/01/08/5 | Mailing List Patch |
| https://www.kb.cert.org/vuls/id/271649 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-07 22:15
Updated : 2026-02-02 19:27
NVD link : CVE-2025-13151
Mitre link : CVE-2025-13151
CVE.ORG link : CVE-2025-13151
JSON object : View
Products Affected
gnu
- libtasn1
CWE
CWE-787
Out-of-bounds Write
