On Tue, Dec 02, 2014 at 08:35:40AM +0100, Salvatore Bonaccorso wrote:
> the following vulnerability was published for antiword.
> 
> CVE-2014-8123[0]:
> buffer overflow of atPPSlist[].szName[] 

We're actually already carrying a patch to address this buffer overflow
- 10_fix_buffer_overflow_wordole_c.dpatch, added in 0.37-5 back in June
2009:

http://sources.debian.net/src/antiword/0.37-10/debian/patches/10_fix_buffer_overflow_wordole_c.patch/

Reported in: https://bugs.debian.org/407015

I'm not going to just close this though, as the check in our patch is
">" but the new patch uses ">=".  I'll dig into if the equality
condition results in an overflow, but the scope for exploiting this in
Debian is going to be rather more limited than in upstream 0.37.

Cheers,
    Olly


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to