A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2021-4209 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2044156 | Issue Tracking Third Party Advisory |
https://gitlab.com/gnutls/gnutls/-/commit/3db352734472d851318944db13be73da61300568 | Patch Third Party Advisory |
https://gitlab.com/gnutls/gnutls/-/issues/1306 | Third Party Advisory |
https://gitlab.com/gnutls/gnutls/-/merge_requests/1503 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220915-0005/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2022-08-24T15:07:31
Updated: 2022-09-15T17:06:40
Reserved: 2022-01-24T00:00:00
Link: CVE-2021-4209
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-08-24T16:15:09.927
Modified: 2022-10-27T16:57:33.273
Link: CVE-2021-4209
JSON object: View
Redhat Information
No data.
CWE