Low
Canonical Ubuntu
It was discovered that GMP did not properly manage memory on 32-bit platforms when processing a specially crafted input. An attacker could possibly use this issue to cause applications using GMP to crash, resulting in a denial of service. Update Instructions: Run sudo pro fix USN-5672-1
to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: libgmp10-doc – 2:6.1.0+dfsg-2ubuntu0.1~esm1 libgmpxx4ldbl – 2:6.1.0+dfsg-2ubuntu0.1~esm1 libgmp3-dev – 2:6.1.0+dfsg-2ubuntu0.1~esm1 libgmp10 – 2:6.1.0+dfsg-2ubuntu0.1~esm1 libgmp-dev – 2:6.1.0+dfsg-2ubuntu0.1~esm1 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro
CVEs contained in this USN include: CVE-2021-43618.
Severity is low unless otherwise noted.
Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:
2022-12-07: Initial vulnerability report published.
CPE | Name | Operator | Version |
---|---|---|---|
bionic stemcells | lt | 1.122 | |
cflinuxfs3 | lt | 0.328.0 | |
cf deployment | lt | 23.0.0 |