[<prev] [next>] [day] [month] [year] [list]
Message-id: <E1JVCDb-0003zo-BF@artemis.annvix.ca>
Date: Fri, 29 Feb 2008 13:52:35 -0700
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2008:056 ] - Updated gnumeric packages fix vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2008:056
http://www.mandriva.com/security/
_______________________________________________________________________
Package : gnumeric
Date : February 29, 2008
Affected: 2007.1, 2008.0
_______________________________________________________________________
Problem Description:
A vulnerability was found in the excel_read_HLINK function in the
Microsoft Excel plugin in Gnumeric prior to version 1.8.1 that would
allow for the execution of arbitrary code via a crafted XLS file
containing XLS HLINK opcodes.
The updated packages have been patched to correct this issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0668
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
9d8d8e51ff3a059eed49ca4cb2caa7c1 2007.1/i586/gnumeric-1.7.8-1.1mdv2007.1.i586.rpm
e77664872cf575b6d20b09679b8c76fd 2007.1/i586/libspreadsheet1.7.8-1.7.8-1.1mdv2007.1.i586.rpm
46d182a8e884e501acde85c393244731 2007.1/i586/libspreadsheet1.7.8-devel-1.7.8-1.1mdv2007.1.i586.rpm
1ab5fc67822a4f8a7761a306b71ddcce 2007.1/SRPMS/gnumeric-1.7.8-1.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
ba90d08b24803f60a689a6b6e2fea6e5 2007.1/x86_64/gnumeric-1.7.8-1.1mdv2007.1.x86_64.rpm
18828470ec4a1166c1cef952c5327c24 2007.1/x86_64/lib64spreadsheet1.7.8-1.7.8-1.1mdv2007.1.x86_64.rpm
9f904d184b861fb174f39a6175571a26 2007.1/x86_64/lib64spreadsheet1.7.8-devel-1.7.8-1.1mdv2007.1.x86_64.rpm
1ab5fc67822a4f8a7761a306b71ddcce 2007.1/SRPMS/gnumeric-1.7.8-1.1mdv2007.1.src.rpm
Mandriva Linux 2008.0:
63839f24270516e305ed421c8d21860f 2008.0/i586/gnumeric-1.7.12-3.1mdv2008.0.i586.rpm
d5163cf3052826111112ec069aecdfc1 2008.0/i586/libspreadsheet1.7.12-1.7.12-3.1mdv2008.0.i586.rpm
af9f36dc9c6227ab3770670077fb9e32 2008.0/i586/libspreadsheet1.7.12-devel-1.7.12-3.1mdv2008.0.i586.rpm
8c9de4fac183cf3238558a43d389bc8c 2008.0/SRPMS/gnumeric-1.7.12-3.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
769b6a33e45f6b6623f103928c5538bf 2008.0/x86_64/gnumeric-1.7.12-3.1mdv2008.0.x86_64.rpm
e01cda022a31439821bef9bee12ee01a 2008.0/x86_64/lib64spreadsheet1.7.12-1.7.12-3.1mdv2008.0.x86_64.rpm
8b69a00a121046a58fd7f63bab13c682 2008.0/x86_64/lib64spreadsheet1.7.12-devel-1.7.12-3.1mdv2008.0.x86_64.rpm
8c9de4fac183cf3238558a43d389bc8c 2008.0/SRPMS/gnumeric-1.7.12-3.1mdv2008.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)
iD8DBQFHyEXvmqjQ0CJFipgRAu3XAKDhc+n0MDYAXq5QXoJ42NEYcK/EDQCg0PJW
BHx9EcXmj5mzLr4MmuOYePQ=
=1/5U
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists