Bug#658821: Serious bug affecting cryptographic applications
Steve M. Robbins
smr at debian.org
Mon Feb 6 06:01:45 UTC 2012
Package: libgmp10
Version: 2:5.0.3+dfsg-1
Severity: grave
File: libgmp
Tags: upstream
Date: Tue, 31 Jan 2012 10:31:41 +0100
From: Torbjorn Granlund <tg at gmplib.org>
To: gmp-announce at gmplib.org
Subject: Buffer overrun in GMP 5.0.3
We have a buffer overrun in GMP 5.0.3, furthermore the functions
affected are mpz_powm_sec and mpn_powm_sec, i.e. GMP's modexp
functions specifically recommended for cryptographic applications.
Extra safe turned extra unsafe with this release.
We will make a new release before the end of this week.
Only GMP 5.0.3 is affected; earlier GMP releases did not have this bug.
We apologise for the problems this creates.
-- System Information:
Debian Release: wheezy/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 3.2.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Versions of packages libgmp10 depends on:
ii libc6 2.13-26
ii multiarch-support 2.13-26
libgmp10 recommends no packages.
libgmp10 suggests no packages.
-- no debconf information
More information about the debian-science-maintainers
mailing list