Bug#658821: Serious bug affecting cryptographic applications

Steve M. Robbins smr at debian.org
Mon Feb 6 06:01:45 UTC 2012


Package: libgmp10
Version: 2:5.0.3+dfsg-1
Severity: grave
File: libgmp
Tags: upstream

Date: Tue, 31 Jan 2012 10:31:41 +0100
From: Torbjorn Granlund <tg at gmplib.org>
To: gmp-announce at gmplib.org
Subject: Buffer overrun in GMP 5.0.3

We have a buffer overrun in GMP 5.0.3, furthermore the functions
affected are mpz_powm_sec and mpn_powm_sec, i.e. GMP's modexp
functions specifically recommended for cryptographic applications.

Extra safe turned extra unsafe with this release.

We will make a new release before the end of this week.

Only GMP 5.0.3 is affected; earlier GMP releases did not have this bug.

We apologise for the problems this creates.



-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libgmp10 depends on:
ii  libc6              2.13-26
ii  multiarch-support  2.13-26

libgmp10 recommends no packages.

libgmp10 suggests no packages.

-- no debconf information





More information about the debian-science-maintainers mailing list