- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202309-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: GMP: Buffer Overflow Vulnerability Date: September 29, 2023 Bugs: #823804 ID: 202309-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= A buffer overflow vulnerability has been found in GMP which could result in denial of service. Background ========= The GNU Multiple Precision Arithmetic Library is a library forarbitrary- precision arithmetic on different types of numbers. Affected packages ================ Package Vulnerable Unaffected ------------ ------------ ------------ dev-libs/gmp < 6.2.1-r2 >= 6.2.1-r2 Description ========== There is an integer overflow leading to a buffer overflow when processing untrusted input via GMP's mpz_inp_raw function. Impact ===== Untrusted input can cause a denial of service via segmentation fault. Workaround ========= Users can ensure no untrusted input is passed into GMP's mpz_inp_raw function. Resolution ========= All GMP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">Þv-libs/gmp-6.2.1-r2" References ========= [ 1 ] CVE-2021-43618 https://nvd.nist.gov/vuln/detail/CVE-2021-43618 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202309-13 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5