Description: "GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms."
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=0c55fe4bf46a1b867746a6ead419fce585d0d456 commit 0c55fe4bf46a1b867746a6ead419fce585d0d456 Author: Sam James <sam@gentoo.org> AuthorDate: 2021-11-25 02:41:44 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2021-11-25 02:45:24 +0000 dev-libs/gmp: add patch for CVE-2021-43618; add Darwin arm64 patch Apply two upstream patches: - Fix CVE-2021-43618 - Fix incorrect use of reserved register on Darwin/arm64 Bug: https://bugs.gentoo.org/823804 Signed-off-by: Sam James <sam@gentoo.org> dev-libs/gmp/Manifest | 1 + dev-libs/gmp/files/gmp-6.2.1-CVE-2021-43618.patch | 17 ++++ dev-libs/gmp/gmp-6.2.1-r2.ebuild | 116 ++++++++++++++++++++++ 3 files changed, 134 insertions(+)
Please cleanup
Cleanup done
GLSA request filed
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=17e5b5cf877ebf0127b18185375d03e4b07b3c43 commit 17e5b5cf877ebf0127b18185375d03e4b07b3c43 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2023-09-29 13:02:07 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2023-09-29 13:02:49 +0000 [ GLSA 202309-13 ] GMP: Buffer Overflow Vulnerability Bug: https://bugs.gentoo.org/823804 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org> glsa-202309-13.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+)