Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-43618

Опубликовано: 15 нояб. 2021
Источник: debian
EPSS Низкий

Описание

GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gmpfixed2:6.2.1+dfsg-3package
gmpfixed2:6.2.1+dfsg-1+deb11u1bullseyepackage
gmpfixed2:6.1.2+dfsg-4+deb10u1busterpackage

Примечания

  • https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html

  • https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e

EPSS

Процентиль: 65%
0.00501
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 4 года назад

GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.

CVSS3: 6.2
redhat
почти 4 года назад

GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.

CVSS3: 7.5
nvd
почти 4 года назад

GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.

CVSS3: 7.5
msrc
почти 4 года назад

GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input leading to a segmentation fault on 32-bit platforms.

suse-cvrf
почти 4 года назад

Security update for gmp

EPSS

Процентиль: 65%
0.00501
Низкий