USN-772-1: MPFR vulnerability
Posted on: 05/07/2009 07:40 PM

A new MPFR vulnerability update is available for Ubuntu Linux. Here the announcement:

Ubuntu Security Notice USN-772-1 May 07, 2009
mpfr vulnerability
CVE-2009-0757
==========================
==========================
=========

A security issue affects the following Ubuntu releases:

Ubuntu 9.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 9.04:
lib64mpfr1 2.4.0-1ubuntu3.1
libmpfr1ldbl 2.4.0-1ubuntu3.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

It was discovered that MPFR improperly handled string lengths in its print
routines. If a user or automated system were tricked into processing
specially crafted data with applications linked against MPFR, an attacker
could cause a denial of service or execute arbitrary code with privileges
of the user invoking the program.


Updated packages for Ubuntu 9.04:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/mpfr_2.4.0-1ubuntu3.=
1.diff.gz
Size/MD5: 7603 d996b99c39cae2d82db24bd5f123ade1
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/mpfr_2.4.0-1ubuntu3.=
1.dsc
Size/MD5: 1316 a28e504aedb1c804af4b7156a9dc3573
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/mpfr_2.4.0.orig.tar.=
gz
Size/MD5: 1336846 232f9d6917898e8277041bcc046fbb72

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/libmpfr-doc_2.4.0-1u=
buntu3.1_all.deb
Size/MD5: 645652 a0041c74091777ecc87686fab37ab1da

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/libmpfr-dev_2.4.0-1u=
buntu3.1_amd64.deb
Size/MD5: 459986 a9e110cdaf84103c6c8c5c1b09aa11a8
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/libmpfr1ldbl_2.4.0-1=
ubuntu3.1_amd64.deb
Size/MD5: 417730 6fba616c8ab42fda163bd35a5993d5e5

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/libmpfr-dev_2.4.0-1u=
buntu3.1_i386.deb
Size/MD5: 431566 872b92cab9aa82122435a6d80c3dabb7
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/libmpfr1ldbl_2.4.0-1=
ubuntu3.1_i386.deb
Size/MD5: 404100 81cee51ae17a92f65a8fe8881c0417ca

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr-dev_2.4.0-1ubuntu3.1_l=
pia.deb
Size/MD5: 433150 d60c4b1377d722bcdfb881480079e089
http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr1ldbl_2.4.0-1ubuntu3.1_=
lpia.deb
Size/MD5: 404108 eb59aaaefdfa8bf954ca16be35c61896

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/m/mpfr/lib64mpfr-dev_2.4.0-1ubuntu3.1=
_powerpc.deb
Size/MD5: 461744 a943b5f7d8566cb91405ff162e07bf14
http://ports.ubuntu.com/pool/main/m/mpfr/lib64mpfr1_2.4.0-1ubuntu3.1_po=
werpc.deb
Size/MD5: 407042 8646e75a38bc8c0f28ab5478a768ffdc
http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr-dev_2.4.0-1ubuntu3.1_p=
owerpc.deb
Size/MD5: 469676 05b5927c2c359dcf8060d00e14cde769
http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr1ldbl_2.4.0-1ubuntu3.1_=
powerpc.deb
Size/MD5: 421772 e209d7e0b960f4c734547b0fc71fe56d

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr-dev_2.4.0-1ubuntu3.1_s=
parc.deb
Size/MD5: 444678 14b90d05922e55b437b7bf613f7a2fce
http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr1ldbl_2.4.0-1ubuntu3.1_=
sparc.deb
Size/MD5: 403328 5af0d9a4665f3bdeb58755e32235aceb



--=-F5L5SsXjSyo07HEJeaRJ
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEABECAAYFAkoDJ/8ACgkQLMAs/0C4zNpM9QCffCzTp3ue7f1dWiNDRjYmv5Gc
T04AmgKdDkNEhwp3ZngOcZn2/FmG7ftm
=n6B4
-----END PGP SIGNATURE-----



Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/usn_772_1_mpfr_vulnerability.html)