First published: Mon Jan 24 2022(Updated: )
A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <3.7.3 | 3.7.3 |
GNU GnuTLS | <3.7.3 | |
Redhat Enterprise Linux | =8.0 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Solidfire \& Hci Management Node | ||
Netapp Hci Bootstrap Os | ||
Netapp Hci Compute Node |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4209 is a NULL pointer dereference flaw in GnuTLS that can cause a denial of service after authentication in rare circumstances.
CVE-2021-4209 affects GnuTLS versions up to and excluding 3.7.3, leading to a denial of service vulnerability.
CVE-2021-4209 has a severity rating of 6.5 (medium).
GnuTLS versions up to and excluding 3.7.3 are affected by CVE-2021-4209.
To fix CVE-2021-4209, it is recommended to update GnuTLS to version 3.7.3 or higher.