First published: Tue Mar 05 2024(Updated: )
Moderate: gmp security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gmp | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp-debuginfo | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp-debuginfo | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp-debugsource | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp-debugsource | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp-devel | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp-devel | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp-debuginfo | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp-debugsource | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp-devel | <6.1.2-11.el8_6.1 | 6.1.2-11.el8_6.1 |
redhat/gmp | <6.1.2-11.el8_6.1.aa | 6.1.2-11.el8_6.1.aa |
redhat/gmp-debuginfo | <6.1.2-11.el8_6.1.aa | 6.1.2-11.el8_6.1.aa |
redhat/gmp-debugsource | <6.1.2-11.el8_6.1.aa | 6.1.2-11.el8_6.1.aa |
redhat/gmp-devel | <6.1.2-11.el8_6.1.aa | 6.1.2-11.el8_6.1.aa |
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for ARM64 EUS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:1102 is classified as Moderate due to the presence of an integer overflow and resultant buffer overflow vulnerability in gmp.
To address RHSA-2024:1102, you should update the gmp package to version 6.1.2-11.el8_6.1 or later.
The vulnerability in RHSA-2024:1102 could allow attackers to exploit integer overflow leading to potential buffer overflows, which may compromise system integrity.
RHSA-2024:1102 affects multiple Red Hat products including Red Hat Enterprise Linux Server and versions supporting x86_64 and Power architectures.
Typically, a system reboot is not required after applying the fix for RHSA-2024:1102, but it is advisable to evaluate specific application dependencies.