Is it OK to stabilize =app-office/calligra-l10n-2.4.3 ? If so, please CC all arches which have stable keywords for older versions of this package and add STABLEREQ keyword to the bug.
Arches please stabilize: app-office/calligra-2.4.3 app-office/calligra-l10n-2.4.3 Target: amd64 x86
http://www.openwall.com/lists/oss-security/2012/08/04/1 Let me stop the stabilization here.
more info here: http://media.blackhat.com/bh-us-12/Briefings/C_Miller/BH_US_12_Miller_NFC_attack_surface_WP.pdf Arches please stabilize: app-office/calligra-2.4.3-r1 app-office/calligra-l10n-2.4.3 Target: amd64 x86
amd64 stable
amd64: ok
(In reply to comment #4) > amd64 stable ehm... it doesn't seem so!? Readded amd64 to this bug $ cat calligra-2.4.3-r1.ebuild | grep KEYWO [[ ${PV} == *9999 ]] || KEYWORDS="~amd64 x86" I've hit bug #430570, but these are no regressions... so x86 is done now. :-)
Thanks all. Removing maintainers from cc, nothing to do for us anymore. + 09 Aug 2012; Johannes Huber <johu@gentoo.org> -calligra-2.4.2.ebuild: + Remove old wrt bug #428890.
Thanks, everyone. Filing a new GLSA request.
CVE-2012-3456 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3456): Heap-based buffer overflow in the read function in filters/words/msword-odf/wv2/src/styles.cpp in the Microsoft import filter in Calligra 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted ODF style in an ODF document. NOTE: this is the same vulnerability as CVE-2012-3455, but it was SPLIT by the CNA even though Calligra and KOffice share the same codebase.
This issue was resolved and addressed in GLSA 201209-10 at http://security.gentoo.org/glsa/glsa-201209-10.xml by GLSA coordinator Sean Amoss (ackle).