First published: Mon Oct 24 2022(Updated: )
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libtasn1 | <4.19.0 | |
Fedora | =35 | |
Fedora | =36 | |
Fedora | =37 | |
Debian | =10.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.2 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.1 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46848 is a vulnerability in GNU Libtasn1 before version 4.19.0, which could allow a remote attacker to obtain sensitive information or cause a denial of service.
An attacker can exploit CVE-2021-46848 by sending a specially-crafted request to the affected system.
CVE-2021-46848 has a severity rating of 9.1 (critical).
GNU Libtasn1 versions up to and excluding 4.19.0 are affected, as well as Fedora 35, 36, and 37, Debian Debian Linux 10.0, and IBM Security Verify Access Docker and IBM Security Verify Access up to version 10.0.X.
To mitigate CVE-2021-46848, it is recommended to update to GNU Libtasn1 version 4.19.0 and apply any necessary patches provided by your software vendor.