This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsaid="201606-15">
<title>FreeXL: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in FreeXL, allowing remote
attackers to executive arbitrary code or cause Denial of Service.
</synopsis>
<producttype="ebuild"/>
<announced>2016-06-26</announced>
<revisedcount="1">2016-06-26</revised>
<bug>544426</bug>
<access>remote</access>
<affected>
<packagename="dev-libs/freexl"auto="yes"arch="*">
<unaffectedrange="ge">1.0.1</unaffected>
<vulnerablerange="lt">1.0.1</vulnerable>
</package>
</affected>
<background>
<p>FreeXL is an open source library to extract valid data from within an
Excel (.xls) spreadsheet.
</p>
</background>
<description>
<p>FreeXL’s shared strings and workbook functions are vulnerable to the
remote execution of arbitrary code and Denial of Service. This can be
achieved through specially crafted workbooks from attackers.
</p>
</description>
<impacttype="normal">
<p>Remote attackers could potentially execute arbitrary code or cause
Denial of Service.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All FreeXL users should upgrade to the latest version:</p>