{"schema_version":"1.7.2","id":"OESA-2022-1889","modified":"2022-09-02T11:04:14Z","published":"2022-09-02T11:04:14Z","upstream":["CVE-2021-4209"],"summary":"gnutls security update","details":"GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, and other required structures.The project strives to provide a secure communications back-end, simple to use and integrated with the rest of the base Linux libraries. A back-end designed to work and be secure out of the box, keeping the complexity of TLS and PKI out of application code.\r\n\r\nSecurity Fix(es):\r\n\r\nA NULL pointer dereference flaw was found in GnuTLS. As Nettle\u0026apos;s hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.(CVE-2021-4209)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.14-9.oe1"}]}],"ecosystem_specific":{"aarch64":["gnutls-debuginfo-3.6.14-9.oe1.aarch64.rpm","gnutls-debugsource-3.6.14-9.oe1.aarch64.rpm","gnutls-devel-3.6.14-9.oe1.aarch64.rpm","gnutls-3.6.14-9.oe1.aarch64.rpm"],"noarch":["gnutls-help-3.6.14-9.oe1.noarch.rpm"],"src":["gnutls-3.6.14-9.oe1.src.rpm"],"x86_64":["gnutls-debuginfo-3.6.14-9.oe1.x86_64.rpm","gnutls-3.6.14-9.oe1.x86_64.rpm","gnutls-devel-3.6.14-9.oe1.x86_64.rpm","gnutls-debugsource-3.6.14-9.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.14-9.oe1"}]}],"ecosystem_specific":{"aarch64":["gnutls-devel-3.6.14-9.oe1.aarch64.rpm","gnutls-3.6.14-9.oe1.aarch64.rpm","gnutls-debuginfo-3.6.14-9.oe1.aarch64.rpm","gnutls-debugsource-3.6.14-9.oe1.aarch64.rpm"],"noarch":["gnutls-help-3.6.14-9.oe1.noarch.rpm"],"src":["gnutls-3.6.14-9.oe1.src.rpm"],"x86_64":["gnutls-devel-3.6.14-9.oe1.x86_64.rpm","gnutls-debugsource-3.6.14-9.oe1.x86_64.rpm","gnutls-debuginfo-3.6.14-9.oe1.x86_64.rpm","gnutls-3.6.14-9.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.7.2-4.oe2203"}]}],"ecosystem_specific":{"aarch64":["gnutls-debugsource-3.7.2-4.oe2203.aarch64.rpm","gnutls-utils-3.7.2-4.oe2203.aarch64.rpm","gnutls-debuginfo-3.7.2-4.oe2203.aarch64.rpm","gnutls-devel-3.7.2-4.oe2203.aarch64.rpm","gnutls-3.7.2-4.oe2203.aarch64.rpm"],"noarch":["gnutls-help-3.7.2-4.oe2203.noarch.rpm"],"src":["gnutls-3.7.2-4.oe2203.src.rpm"],"x86_64":["gnutls-debuginfo-3.7.2-4.oe2203.x86_64.rpm","gnutls-3.7.2-4.oe2203.x86_64.rpm","gnutls-debugsource-3.7.2-4.oe2203.x86_64.rpm","gnutls-devel-3.7.2-4.oe2203.x86_64.rpm","gnutls-utils-3.7.2-4.oe2203.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1889"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4209"}],"database_specific":{"severity":"Medium"}}