Summary: | <app-office/calligra-2.4.3-r1 : buffer overflow vulnerability (CVE-2012-3456) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Paweł Hajdan, Jr. (RETIRED) <phajdan.jr> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://packages.gentoo.org/package/app-office/calligra-l10n?arches=linux | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Paweł Hajdan, Jr. (RETIRED)
2012-07-31 16:28:19 UTC
Arches please stabilize: app-office/calligra-2.4.3 app-office/calligra-l10n-2.4.3 Target: amd64 x86 http://www.openwall.com/lists/oss-security/2012/08/04/1 Let me stop the stabilization here. more info here: http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf Arches please stabilize: app-office/calligra-2.4.3-r1 app-office/calligra-l10n-2.4.3 Target: amd64 x86 amd64 stable amd64: ok (In reply to comment #4) > amd64 stable ehm... it doesn't seem so!? Readded amd64 to this bug $ cat calligra-2.4.3-r1.ebuild | grep KEYWO [[ ${PV} == *9999 ]] || KEYWORDS="~amd64 x86" I've hit bug #430570, but these are no regressions... so x86 is done now. :-) Thanks all. Removing maintainers from cc, nothing to do for us anymore. + 09 Aug 2012; Johannes Huber <johu@gentoo.org> -calligra-2.4.2.ebuild: + Remove old wrt bug #428890. Thanks, everyone. Filing a new GLSA request. CVE-2012-3456 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3456): Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in Calligra 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted ODF style in an ODF document. NOTE: this is the same vulnerability as CVE-2012-3455, but it was SPLIT by the CNA even though Calligra and KOffice share the same codebase. This issue was resolved and addressed in GLSA 201209-10 at http://security.gentoo.org/glsa/glsa-201209-10.xml by GLSA coordinator Sean Amoss (ackle). |