First published: Fri Sep 01 2023(Updated: )
Integer Overflow vulnerability in mp_grow in libtom libtommath before commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9, allows attackers to execute arbitrary code and cause a denial of service (DoS).
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libtom libtommath | <2023-05-09 | |
Fedoraproject Fedora | =38 | |
debian/libtommath | <=1.1.0-3<=1.2.0-6 | 1.2.1-2 |
ubuntu/libtommath | <1.0.1-1ubuntu0.1~ | 1.0.1-1ubuntu0.1~ |
ubuntu/libtommath | <1.2.0-3ubuntu0.1 | 1.2.0-3ubuntu0.1 |
ubuntu/libtommath | <1.2.0-6ubuntu0.22.04.1 | 1.2.0-6ubuntu0.22.04.1 |
ubuntu/libtommath | <1.2.0-6ubuntu0.23.04.1 | 1.2.0-6ubuntu0.23.04.1 |
ubuntu/libtommath | <0.42.0-1.2ubuntu0.1~ | 0.42.0-1.2ubuntu0.1~ |
ubuntu/libtommath | <1.2.0-6ubuntu0.23.10.1 | 1.2.0-6ubuntu0.23.10.1 |
libtom libtommath | <1.2.1 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-36328.
The severity of CVE-2023-36328 is critical with a CVSS score of 9.8.
The affected software for CVE-2023-36328 is libtom libtommath before commit beba892bc0d4e4ded4d667ab1d2a94f4d75109a9 and Fedoraproject Fedora 38.
CVE-2023-36328 allows attackers to execute arbitrary code and cause a denial of service (DoS).
Yes, the references for CVE-2023-36328 are: [1] [2] [3]