Description
A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.
References (6)
Core 6
Core References
Third Party Advisory x_refsource_misc
https://gitlab.com/gnutls/gnutls/-/issues/1306
Issue Tracking, Third Party Advisory x_refsource_misc
https://bugzilla.redhat.com/show_bug.cgi?id=2044156
Third Party Advisory x_refsource_misc
https://access.redhat.com/security/cve/CVE-2021-4209
Third Party Advisory x_refsource_misc
https://gitlab.com/gnutls/gnutls/-/merge_requests/1503
Patch, Third Party Advisory x_refsource_misc
https://gitlab.com/gnutls/gnutls/-/commit/3db352734472d851318944db13be73da61300568
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20220915-0005/
Scores
CVSS v3
6.5
EPSS
0.0037
EPSS Percentile
58.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-476
Status
published
Products (5)
gnu/gnutls
< 3.7.3
netapp/active_iq_unified_manager
netapp/hci_bootstrap_os
netapp/solidfire_\&_hci_management_node
redhat/enterprise_linux
8.0
Published
Aug 24, 2022
Tracked Since
Feb 18, 2026