A new MPFR vulnerability update is available for Ubuntu Linux. Here the announcement:
Ubuntu Security Notice USN-772-1 May 07, 2009
mpfr vulnerability
CVE-2009-0757
==========================
==========================
=========
A security issue affects the following Ubuntu releases:
Ubuntu 9.04
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 9.04:
lib64mpfr1 2.4.0-1ubuntu3.1
libmpfr1ldbl 2.4.0-1ubuntu3.1
In general, a standard system upgrade is sufficient to effect the
necessary changes.
Details follow:
It was discovered that MPFR improperly handled string lengths in its print
routines. If a user or automated system were tricked into processing
specially crafted data with applications linked against MPFR, an attacker
could cause a denial of service or execute arbitrary code with privileges
of the user invoking the program.
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/mpfr_2.4.0-1ubuntu3.=
1.diff.gz
Size/MD5: 7603 d996b99c39cae2d82db24bd5f123ade1
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/mpfr_2.4.0-1ubuntu3.=
1.dsc
Size/MD5: 1316 a28e504aedb1c804af4b7156a9dc3573
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/mpfr_2.4.0.orig.tar.=
gz
Size/MD5: 1336846 232f9d6917898e8277041bcc046fbb72
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/libmpfr-doc_2.4.0-1u=
buntu3.1_all.deb
Size/MD5: 645652 a0041c74091777ecc87686fab37ab1da
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/libmpfr-dev_2.4.0-1u=
buntu3.1_amd64.deb
Size/MD5: 459986 a9e110cdaf84103c6c8c5c1b09aa11a8
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/libmpfr1ldbl_2.4.0-1=
ubuntu3.1_amd64.deb
Size/MD5: 417730 6fba616c8ab42fda163bd35a5993d5e5
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/libmpfr-dev_2.4.0-1u=
buntu3.1_i386.deb
Size/MD5: 431566 872b92cab9aa82122435a6d80c3dabb7
http://security.ubuntu.com/ubuntu/pool/main/m/mpfr/libmpfr1ldbl_2.4.0-1=
ubuntu3.1_i386.deb
Size/MD5: 404100 81cee51ae17a92f65a8fe8881c0417ca
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr-dev_2.4.0-1ubuntu3.1_l=
pia.deb
Size/MD5: 433150 d60c4b1377d722bcdfb881480079e089
http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr1ldbl_2.4.0-1ubuntu3.1_=
lpia.deb
Size/MD5: 404108 eb59aaaefdfa8bf954ca16be35c61896
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/m/mpfr/lib64mpfr-dev_2.4.0-1ubuntu3.1=
_powerpc.deb
Size/MD5: 461744 a943b5f7d8566cb91405ff162e07bf14
http://ports.ubuntu.com/pool/main/m/mpfr/lib64mpfr1_2.4.0-1ubuntu3.1_po=
werpc.deb
Size/MD5: 407042 8646e75a38bc8c0f28ab5478a768ffdc
http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr-dev_2.4.0-1ubuntu3.1_p=
owerpc.deb
Size/MD5: 469676 05b5927c2c359dcf8060d00e14cde769
http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr1ldbl_2.4.0-1ubuntu3.1_=
powerpc.deb
Size/MD5: 421772 e209d7e0b960f4c734547b0fc71fe56d
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr-dev_2.4.0-1ubuntu3.1_s=
parc.deb
Size/MD5: 444678 14b90d05922e55b437b7bf613f7a2fce
http://ports.ubuntu.com/pool/main/m/mpfr/libmpfr1ldbl_2.4.0-1ubuntu3.1_=
sparc.deb
Size/MD5: 403328 5af0d9a4665f3bdeb58755e32235aceb
--=-F5L5SsXjSyo07HEJeaRJ
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: This is a digitally signed message part
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEABECAAYFAkoDJ/8ACgkQLMAs/0C4zNpM9QCffCzTp3ue7f1dWiNDRjYmv5Gc
T04AmgKdDkNEhwp3ZngOcZn2/FmG7ftm
=n6B4
-----END PGP SIGNATURE-----