GLSA 202309-13: GMP: Buffer Overflow Vulnerability

Severity:normal
Title:GMP: Buffer Overflow Vulnerability
Date:09/29/2023
Bugs: #823804
ID:202309-13

Synopsis

A buffer overflow vulnerability has been found in GMP which could result in denial of service.

Background

The GNU Multiple Precision Arithmetic Library is a library forarbitrary-precision arithmetic on different types of numbers.

Affected packages

Package Vulnerable Unaffected Architecture(s)
dev-libs/gmp < 6.2.1-r2 >= 6.2.1-r2 All supported architectures

Description

There is an integer overflow leading to a buffer overflow when processing untrusted input via GMP's mpz_inp_raw function.

Impact

Untrusted input can cause a denial of service via segmentation fault.

Workaround

Users can ensure no untrusted input is passed into GMP's mpz_inp_raw function.

Resolution

All GMP users should upgrade to the latest version:

          # emerge --sync
          # emerge --ask --oneshot --verbose ">=dev-libs/gmp-6.2.1-r2"
        

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-202309-13.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!