Ledger is a powerful, double-entry accounting system that is accessed from the UNIX command-line.
Multiple vulnerabilities have been discovered in ledger. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user to process a specially crafted file using ledger, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All ledger users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/ledger-3.1.2"