CVE-2019-15523

An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linbit:csync2:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:28

Type Values Removed Values Added
References () https://github.com/LINBIT/csync2/pull/13/commits/92742544a56bcbcd9ec99ca15f898b31797e39e2 - Patch, Third Party Advisory () https://github.com/LINBIT/csync2/pull/13/commits/92742544a56bcbcd9ec99ca15f898b31797e39e2 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/01/msg00003.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/01/msg00003.html - Mailing List, Third Party Advisory

Information

Published : 2020-12-30 21:15

Updated : 2024-11-21 04:28


NVD link : CVE-2019-15523

Mitre link : CVE-2019-15523

CVE.ORG link : CVE-2019-15523


JSON object : View

Products Affected

debian

  • debian_linux

linbit

  • csync2
CWE
CWE-252

Unchecked Return Value