Summary: | <dev-libs/mpfr-3.1.3_p4: buffer overflow in mpfr_strtofr (CVE-2014-9474) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | toolchain |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://gmplib.org/list-archives/gmp-bugs/2013-December/003267.html | ||
See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1171701 | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() should be fixed by 3.1.3 in the tree and is fine to stabilize arch teams: please stabilize mpfr-3.1.3_p4 Stable for HPPA PPC64. stable for ppc amd64 stable x86 stable arm stable Stable on alpha. i've done the rest now Arches, Thank you for your work. New GLSA Request filed. Maintainer(s), please drop the vulnerable version(s). This issue was resolved and addressed in GLSA 201512-06 at https://security.gentoo.org/glsa/201512-06 by GLSA coordinator Yury German (BlueKnight). Re-Opening for cleanup. Maintainers, the GLSA has been released please clean up the Vulnerable versions. Maintainer(s), please drop the vulnerable version(s). |