Calligra: User-assisted execution of arbitrary code — GLSA 201209-10

A buffer overflow vulnerability in Calligra could result in the execution of arbitrary code.

Affected packages

app-office/calligra on all architectures
Affected versions < 2.4.3-r1
Unaffected versions >= 2.4.3-r1

Background

Calligra is an office suite by KDE.

Description

An error in the read() function in styles.cpp could cause a heap-based buffer overflow.

Impact

A remote attacker could entice a user to open a specially crafted ODF file, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Calligra users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-office/calligra-2.4.3-r1"
 

References

Release date
September 25, 2012

Latest revision
September 25, 2012: 1

Severity
normal

Exploitable
remote

Bugzilla entries