Summary: | <app-text/antiword-0.37-r1: buffer overflow (CVE-2014-8123) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | clabbe.montjoie, grobian, proxy-maint |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2014/12/01/4 | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2014-12-02 08:25:35 UTC
The ebuild antiword-0.37-r1 with the patch is in tree. My apologies for missing out on this bug. I've been using antiword-0.37 without any problems, so I guess the committed revision should be ready to get stabilised. Thanks! Arches, please test and mark stable: =app-text/antiword-0.37-r1 Target keywords : "alpha amd64 ppc ppc64 sparc x86" amd64 stable x86 stable ppc stable ppc64 stable sparc stable Stable on alpha. New GLSA has been drafted and is ready for peer review. This issue was resolved and addressed in GLSA 201502-09 at http://security.gentoo.org/glsa/glsa-201502-09.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |