USN-5672-1: GMP vulnerability
12 October 2022
GMP could be made to crash if it received specially crafted input.
Releases
Packages
- gmp - Multiprecision arithmetic library developers tools
Details
It was discovered that GMP did not properly manage memory
on 32-bit platforms when processing a specially crafted
input. An attacker could possibly use this issue to cause
applications using GMP to crash, resulting in a denial of
service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04
-
libgmpxx4ldbl
-
2:6.2.0+dfsg-4ubuntu0.1
-
libgmp-dev
-
2:6.2.0+dfsg-4ubuntu0.1
-
libgmp10
-
2:6.2.0+dfsg-4ubuntu0.1
Ubuntu 18.04
-
libgmpxx4ldbl
-
2:6.1.2+dfsg-2ubuntu0.1
-
libgmp-dev
-
2:6.1.2+dfsg-2ubuntu0.1
-
libgmp10
-
2:6.1.2+dfsg-2ubuntu0.1
Ubuntu 16.04
-
libgmpxx4ldbl
-
2:6.1.0+dfsg-2ubuntu0.1~esm1
Available with Ubuntu Pro
-
libgmp-dev
-
2:6.1.0+dfsg-2ubuntu0.1~esm1
Available with Ubuntu Pro
-
libgmp10
-
2:6.1.0+dfsg-2ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5672-2: gmp, libgmp10-doc, libgmpxx4ldbl, libgmp10, libgmp3-dev, libgmp-dev