Adolf Belka 8e498000ec mpfr: Update with latest bug patches
- Update version 4.2.0 from 4 bug patches to 9 bug patches
- Update of rootfile not required
- Bug fix changelog
5	The mpfr_reldiff function, which computes |b−c|/b, is buggy on special values,
         e.g. on the following (b,c) values: (+Inf,+Inf) gives ±0 instead of NaN (like
         NaN/Inf); (+0,+0) gives 1 instead of NaN (like 0/0); (+0,1) gives 1 instead of
         Inf (like 1/0). Moreover, the sign of 0 for (+Inf,+Inf) or (−Inf,−Inf) is not
         set, i.e. it is just the sign of the destination before the call; as a
	 consequence, results are not even consistent. These bugs are fixed by the
	 reldiff patch.
	Corresponding changeset in the 4.2 branch: 81e4d4427.
6	The reuse tests are incomplete: the sign of a result zero is not checked, so
	 that it can miss bugs (one of the mpfr_reldiff bugs mentioned above, in
	 particular). The tests-reuse patch adds a check of the sign of zero and
	 contains other minor improvements.
	Corresponding changeset in the 4.2 branch: e6d47b8f5.
7	The general code for the power function (mpfr_pow_general internal function) has
	 two bugs in particular cases: the first one is an incorrect computation of the
	 error bound when there has been an intermediate underflow or overflow (in such
	 a case, the computation is performed again with a rescaling, thus with an
	 additional error term, but there is a bug in the computation of this term), so
	 that the result may be rounded incorrectly (in particular, a spurious overflow
	 is possible); the second one occurs in a corner case (destination precision 1,
	 rounding to nearest, and where the rounded result assuming an unbounded
	 exponent range would be 2emin−2 and the exact result is larger than this value),
	 with the only consequence being a missing underflow exception (the underflow
	 flag is not set). These two bugs are fixed by the pow_general patch, which also
	 provides testcases.
	Note: The second bug was introduced by commit 936df8ef6 in MPFR 4.1.0 (the code
	 simplification was incorrect, and there were no associated tests in the
	 testsuite).
	Corresponding changesets in the 4.2 branch: 85bc7331c, 5fa407a6c, 9a16c173e.
8	The mpfr_compound_si function can take a huge amount of memory and time in some
	 cases (when the argument x is a large even integer and xn is represented exactly
	 in the target precision) and does not correctly detect overflows and underflows.
	 This is fixed by the compound patch, which also provides various tests.
	Corresponding changesets in the 4.2 branch: 7635c4a35, 74d86a61f, 952fb0f5c,
	 a4894f68d, 7bb748775, f5cb40571, d87459969.
9	MPFR can crash when a formatted output function is called with %.2147483648Rg in
	 the format string. For instance: mpfr_snprintf (NULL, 0, "%.2147483648Rg\n", x);
	 This is fixed by the printf_large_prec_for_g patch, which also provides
	 testcases.
	Corresponding changesets in the 4.2 branch: 686f82776, 769ad91a6.

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-15 09:37:47 +00:00
2023-06-15 09:36:59 +00:00
2023-06-15 09:37:47 +00:00
2023-06-15 09:37:47 +00:00
2022-04-08 00:32:40 +02:00
2021-03-10 14:42:37 +00:00
2023-06-15 09:23:02 +00:00
2022-03-21 13:47:58 +00:00

IPFire 2.x - The Open Source Firewall

What is IPFire?

IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario and extensibility make it usable for everyone. For a full list of features have a look here.

This repository contains the source code of IPFire 2.x which is used to build the whole distribution from scratch, since IPFire is not based on any other distribution.

Where can I get IPFire?

Just head over to https://www.ipfire.org/download

How do I use this software?

We have a long and detailed wiki located here which should answers most of your questions.

But I have some questions left. Where can I get support?

You can ask your question at our community located here. A complete list of our support channels can be found here.

How can I contribute?

We have another document for this. Please look here.

Description
No description provided
Readme 101 MiB
Languages
Perl 70.4%
Shell 23%
C 4%
Python 0.6%
Makefile 0.5%
Other 1.4%