CVE-2021-43618

NameCVE-2021-43618
DescriptionGNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2837-1
Debian Bugs994405

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gmp (PTS)bullseye2:6.2.1+dfsg-1+deb11u1fixed
bookworm2:6.2.1+dfsg1-1.1fixed
sid, trixie2:6.3.0+dfsg-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gmpsourcestretch2:6.1.2+dfsg-1+deb9u1DLA-2837-1
gmpsourcebuster2:6.1.2+dfsg-4+deb10u1
gmpsourcebullseye2:6.2.1+dfsg-1+deb11u1
gmpsource(unstable)2:6.2.1+dfsg-3994405

Notes

https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e

Search for package or bug name: Reporting problems