Your message dated Tue, 2 Dec 2014 21:51:19 +0000
with message-id <20141202215119.ga17...@survex.com>
and subject line Re: Bug#771768: antiword: CVE-2014-8123: buffer overflow of of
atPPSlist[].szName[]
has caused the Debian Bug report #771768,
regarding antiword: CVE-2014-8123: buffer overflow of of atPPSlist[].szName[]
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
771768: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771768
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: antiword
Version: 0.37-6
Severity: grave
Tags: security upstream patch
Hi,
the following vulnerability was published for antiword.
CVE-2014-8123[0]:
buffer overflow of atPPSlist[].szName[]
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2014-8123
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1169665
[2] http://seclists.org/oss-sec/2014/q4/870
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Control: notfound -1 0.37-6
Control: found -1 0.37-1
Control: fixed -1 0.37-5
On Tue, Dec 02, 2014 at 08:59:28PM +0000, Olly Betts wrote:
> On Tue, Dec 02, 2014 at 08:35:40AM +0100, Salvatore Bonaccorso wrote:
> > the following vulnerability was published for antiword.
> >
> > CVE-2014-8123[0]:
> > buffer overflow of atPPSlist[].szName[]
>
> We're actually already carrying a patch to address this buffer overflow
> - 10_fix_buffer_overflow_wordole_c.dpatch, added in 0.37-5 back in June
> 2009:
>
> http://sources.debian.net/src/antiword/0.37-10/debian/patches/10_fix_buffer_overflow_wordole_c.patch/
>
> Reported in: https://bugs.debian.org/407015
>
> I'm not going to just close this though, as the check in our patch is
> ">" but the new patch uses ">=". I'll dig into if the equality
> condition results in an overflow, but the scope for exploiting this in
> Debian is going to be rather more limited than in upstream 0.37.
OK, reviewing the code, the ">" check we already have is fine - in fact
the new patch's check is one character too strict (but in a safe way).
Oldstable has 0.37-6, so this is already fixed in all supported Debian
versions.
I pinged carnil on IRC, and he said to just close if the patch we have
is enough.
Cheers,
Olly
--- End Message ---