Gentoo Archives: gentoo-announce

From: Yury German <blueknight@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201512-06 ] MPFR: User-assisted execution of arbitrary code
Date: Wed, 30 Dec 2015 11:08:02
Message-Id: 5683BAA8.90007@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201512-06
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: MPFR: User-assisted execution of arbitrary code
9 Date: December 30, 2015
10 Bugs: #532028
11 ID: 201512-06
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A buffer overflow vulnerability in MPFR could allow remote attackers to
19 execute arbitrary code or cause Denial of Service.
20
21 Background
22 ==========
23
24 MPFR is a library for multiple-precision floating-point computations
25 with exact rounding.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 dev-libs/mpfr < 3.1.3_p4 >= 3.1.3_p4
34
35 Description
36 ===========
37
38 MPFR fails to adequately check user-supplied input, which could lead to
39 a buffer overflow.
40
41 Impact
42 ======
43
44 A remote attacker could possibly execute arbitrary code with the
45 privileges of the process or cause a Denial of Service condition.
46
47 Workaround
48 ==========
49
50 There is no known workaround at this time.
51
52 Resolution
53 ==========
54
55 All MPFR users should upgrade to the latest version:
56
57 # emerge --sync
58 # emerge --ask --oneshot --verbose ">=dev-libs/mpfr-3.1.3_p4"
59
60 References
61 ==========
62
63 [ 1 ] CVE-2014-9474
64 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9474
65
66 Availability
67 ============
68
69 This GLSA and any updates to it are available for viewing at
70 the Gentoo Security Website:
71
72 https://security.gentoo.org/glsa/201512-06
73
74 Concerns?
75 =========
76
77 Security is a primary focus of Gentoo Linux and ensuring the
78 confidentiality and security of our users' machines is of utmost
79 importance to us. Any security concerns should be addressed to
80 security@g.o or alternatively, you may file a bug at
81 https://bugs.gentoo.org.
82
83 License
84 =======
85
86 Copyright 2015 Gentoo Foundation, Inc; referenced text
87 belongs to its owner(s).
88
89 The contents of this document are licensed under the
90 Creative Commons - Attribution / Share Alike license.
91
92 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature