Summary: | <dev-libs/freexl-1.0.1: Multiple vulnerabilities (CVE-2015-{2753,2754,2776}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | sci-geosciences |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2015/03/25/1 | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() CVE-2015-2776 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2776): The parse_SST function in FreeXL before 1.0.0i allows remote attackers to cause a denial of service (memory consumption) via a crafted shared strings table in a workbook. CVE-2015-2754 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2754): FreeXL before 1.0.0i allows remote attackers to cause a denial of service (stack corruption) and possibly execute arbitrary code via a crafted workbook, related to a "premature EOF." CVE-2015-2753 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2753): FreeXL before 1.0.0i allows remote attackers to cause a denial of service (stack corruption) or possibly execute arbitrary code via a crafted sector in a workbook. Bug has been around since March, with upstream released 2015-03-22. Any progress with Ebuild? We are now in August, this is a B2 bug, which should be fixed. This has been around since the March of this year. Please advised if you still want to maintain this package, or remove it from tree. Hey, working on it. Amy author Amy Winston <amynka@gentoo.org> 2016-02-14 19:08:16 (GMT) committer Amy Winston <amynka@gentoo.org> 2016-02-14 19:08:16 (GMT) commit 8a1bc8250959967320d0587197f23d4742ffb50d dev-libs/freexl: version bump, security fix bug #544426 New version freexl-1.0.1 is ready for stable on amd64 ppc ppc64 x86. Arches please stabilize. amd64 stable x86 stable arm passes, no previous stable version. Stable for PPC64. ppc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. GLSA Request opened. author Amy Winston <amynka@gentoo.org> 2016-03-16 14:10:05 (GMT) committer Amy Winston <amynka@gentoo.org> 2016-03-16 14:10:05 (GMT) commit 61bb3fef4a393776d6e40f21d79987b35c6863f6 dev-libs/freexl: clean vulnerable version bug #544426 This issue was resolved and addressed in GLSA 201606-15 at https://security.gentoo.org/glsa/201606-15 by GLSA coordinator Aaron Bauman (b-man). |