A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1967983 | patch third party advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20211104-0006/ | third party advisory |
https://security.gentoo.org/glsa/202401-24 | vendor advisory |