[<prev] [next>] [day] [month] [year] [list]
Message-ID: <87ipf2yk31.fsf@mid.deneb.enyo.de>
Date: Thu, 07 Jun 2012 21:53:54 +0200
From: Florian Weimer <fw@...eb.enyo.de>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 2487-1] openoffice.org security
update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2487-1 security@...ian.org
http://www.debian.org/security/ Florian Weimer
June 07, 2012 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openoffice.org
Vulnerability : buffer overflow
Problem type : local (remote)
Debian-specific: no
CVE ID : CVE-2012-1149 CVE-2012-2334
It was discovered that OpenOffice.org would not properly process
crafted document files, possibly leading to arbitrary code execution.
CVE-2012-1149
Integer overflows in PNG image handling
CVE-2012-2334
Integer overflow in operator new[] invocation and heap-based
buffer overflow inside the MS-ODRAW parser
For the stable distribution (squeeze), this problem has been fixed in
version 1:3.2.1-11+squeeze6.
For the unstable distribution (sid), these problems have been fixed in
version 1:3.5.2~rc2-1 of the libreoffice package.
We recommend that you upgrade your openoffice.org packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iQEcBAEBAgAGBQJP0P4UAAoJEL97/wQC1SS+xVsH/RryzKONh1SBGKN4osq27UH2
774tOERttRzsDgipwpp560aPMM04rLfH2k3Os9vk3zvzgwnBd4e7GeLKYbTkK/M7
g1zIPNRjGbLxREsTbdXYbgB86+PWjtd4Ex6TPFsPWPyOheqZMKEj2clNOW32ZKfV
X7vBXDt3OlxrZo4Vxy6Q33HGF0Nf9eJv9N0se4o4mZJ/Uom8LpgOrfy4Lwsyxkkg
csRrzqus9GgYpvjpf9R10YCj11rpXojGybZL6Xz5MPrqTcD6c2pTTTvIWczKTy5j
QlYGuu/l4sTql5aZjdbIt/TAThQpKDPSIBc10/Br/sTER1YrrYuDj0ZDY8PR5cQ=
=3nsr
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists