Your message dated Thu, 11 Dec 2014 12:19:38 +0000
with message-id <e1xz2iy-000312...@franck.debian.org>
and subject line Bug#772008: fixed in mpfr4 3.1.2-2
has caused the Debian Bug report #772008,
regarding libmpfr4: buffer overflow in mpfr_strtofr
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
772008: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772008
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libmpfr4
Version: 3.1.2-1+b1
Severity: grave
Tags: security
Justification: user security hole
A buffer overflow may occur in mpfr_strtofr. This bug was actually
discovered a year ago, and was a consequence of incorrect GMP
documentation. For details, see the discussion:
https://gmplib.org/list-archives/gmp-bugs/2013-December/003267.html
A short description of the bug and a patch (which just increases the
buffer size according to the new GMP documentation) is available at:
http://www.mpfr.org/mpfr-3.1.2/#bugs
The effects of this bug may be those of a buffer overflow. I don't
know whether it can be exploitable to execute random code (I'd say
that this is unlikely, but I'm not sure). I just know that a crash
is possible (memory corruption detected by the glibc?) with the
32-bit ABI when alloca is disabled (alloca is not disabled by
default, but note that alloca is not used in large precisions).
-- System Information:
Debian Release: 8.0
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1,
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 3.16.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=POSIX, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
Versions of packages libmpfr4:amd64 depends on:
ii libc6 2.19-13
ii libgmp10 2:6.0.0+dfsg-6
ii multiarch-support 2.19-13
libmpfr4:amd64 recommends no packages.
libmpfr4:amd64 suggests no packages.
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: mpfr4
Source-Version: 3.1.2-2
We believe that the bug you reported is fixed in the latest version of
mpfr4, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 772...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Matthias Klose <d...@debian.org> (supplier of updated mpfr4 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Thu, 11 Dec 2014 12:32:33 +0100
Source: mpfr4
Binary: libmpfr4 libmpfr4-dbg libmpfr-dev libmpfr-doc
Architecture: source all amd64
Version: 3.1.2-2
Distribution: unstable
Urgency: medium
Maintainer: Debian QA Group <packa...@qa.debian.org>
Changed-By: Matthias Klose <d...@debian.org>
Description:
libmpfr-dev - multiple precision floating-point computation developers tools
libmpfr-doc - multiple precision floating-point computation documentation
libmpfr4 - multiple precision floating-point computation
libmpfr4-dbg - multiple precision floating-point computation (debug symbols)
Closes: 772008
Changes:
mpfr4 (3.1.2-2) unstable; urgency=medium
.
* QA upload, properly orphan the package. See #771884.
* Bump standards version to 3.9.6, fix lintian warnings.
* Build using dpkg-buildflags.
* Fix buffer overflow in mpfr_strtofr. Closes: #772008.
Checksums-Sha1:
71dc1a9bd11b749cdee9ac9011dc3e4606a4dd8b 2116 mpfr4_3.1.2-2.dsc
adf8f20893d5e64fc0fed442791f37b861de46ea 12804 mpfr4_3.1.2-2.debian.tar.xz
37deb0380c542a0377825ed894733795c249aa03 916744 libmpfr-doc_3.1.2-2_all.deb
3e942834201bcd61182095c8697a3bb1c864acfa 527336 libmpfr4_3.1.2-2_amd64.deb
aa514888fefaa66cf1ed2fdaaaea4183417420c6 678050 libmpfr4-dbg_3.1.2-2_amd64.deb
c2a244845905a06b771b34940c4e3a1990067f60 559204 libmpfr-dev_3.1.2-2_amd64.deb
Checksums-Sha256:
fcbf025b0daf6dc95715ac226d4e4a8f86cda4b796115ad5b9d8271da6de9c7b 2116
mpfr4_3.1.2-2.dsc
49efd1d2032c8576868b64419e3403869dd5a62e1974b341f836852f7f2fd097 12804
mpfr4_3.1.2-2.debian.tar.xz
90d41c47192df55b3c9ee49f792214926412c88cf7f64f0660323beeca2b4e06 916744
libmpfr-doc_3.1.2-2_all.deb
1b6ef16024e7850c4f2d47dbe06cba1143ac36d5584db515f63d5fbd873e3eb2 527336
libmpfr4_3.1.2-2_amd64.deb
1430d9e4ff37a018587a2dc8a058682a8cd8baee8e2f55115df8f2bc70871ef8 678050
libmpfr4-dbg_3.1.2-2_amd64.deb
76bf8471b28ed1e5f5fdbfb190c81c560fadc0227df4b823c10b8a81ea000ff2 559204
libmpfr-dev_3.1.2-2_amd64.deb
Files:
8f2e5c932f8d1ae697471abe40a0624d 2116 math optional mpfr4_3.1.2-2.dsc
d9855b0be103b4f662a301b1f0630353 12804 math optional
mpfr4_3.1.2-2.debian.tar.xz
ca0e9eb3649c38daffa9d94b8cea426b 916744 doc optional
libmpfr-doc_3.1.2-2_all.deb
c3cec2c064105c9c123013e416939a7a 527336 libs optional
libmpfr4_3.1.2-2_amd64.deb
e41f68a5d2cd208d13ac5c7fd792d4d7 678050 debug extra
libmpfr4-dbg_3.1.2-2_amd64.deb
9e56ce0cc40d7e9e9e03a2974a83543b 559204 libdevel optional
libmpfr-dev_3.1.2-2_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=XvRq
-----END PGP SIGNATURE-----
--- End Message ---