Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
References
| Link | Resource |
|---|---|
| https://gitlab.com/gnutls/libtasn1 | Product |
| https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 | Patch |
| http://www.openwall.com/lists/oss-security/2026/01/08/5 | Mailing List Patch |
| https://www.kb.cert.org/vuls/id/271649 | Third Party Advisory |
Configurations
History
02 Feb 2026, 19:27
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:gnu:libtasn1:4.20.0:*:*:*:*:*:*:* | |
| First Time |
Gnu
Gnu libtasn1 |
|
| CWE | CWE-787 | |
| References | () https://gitlab.com/gnutls/libtasn1 - Product | |
| References | () https://gitlab.com/gnutls/libtasn1/-/merge_requests/121 - Patch | |
| References | () http://www.openwall.com/lists/oss-security/2026/01/08/5 - Mailing List, Patch | |
| References | () https://www.kb.cert.org/vuls/id/271649 - Third Party Advisory |
20 Jan 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
08 Jan 2026, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
07 Jan 2026, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-07 22:15
Updated : 2026-02-02 19:27
NVD link : CVE-2025-13151
Mitre link : CVE-2025-13151
CVE.ORG link : CVE-2025-13151
JSON object : View
Products Affected
gnu
- libtasn1
CWE
CWE-787
Out-of-bounds Write
