A flaw was found in the GnuTLS library, specifically in the gnutlspkcs11token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-9820.json"
[
{
"target": {
"file": "lib/pkcs11_write.c"
},
"id": "CVE-2025-9820-2f514dfb",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"203081701998267077212086687325320656047",
"181103679989110600517533548016277704131",
"39853057649325964027587234063574987404",
"259048303717493519631185376627170807634",
"235519305165135146109306515938527170000",
"15365237184004671114243159335111336950",
"128494245172431755117396483110562105716",
"44347100990748648967188547802763753138",
"328331381237090027273525864829690989806",
"255687099527695671086163998843993578170",
"226269730992432168968068826384392231200"
]
},
"signature_type": "Line",
"source": "https://gitlab.com/gnutls/gnutls@1d56f96f6ab5034d677136b9d50b5a75dff0faf5",
"deprecated": false
},
{
"id": "CVE-2025-9820-ef29652e",
"signature_version": "v1",
"target": {
"file": "lib/pkcs11_write.c",
"function": "gnutls_pkcs11_token_init"
},
"digest": {
"function_hash": "129252198033229729266867875486069486085",
"length": 734.0
},
"signature_type": "Function",
"source": "https://gitlab.com/gnutls/gnutls@1d56f96f6ab5034d677136b9d50b5a75dff0faf5",
"deprecated": false
}
]