Linux Security
    Linux Security
    Linux Security

    Debian: fix several vulnerabilities DSA-1104-1

    Date 29 Jun 2006
    Posted By LinuxSecurity Advisories
    Several vulnerabilities have been discovered in, a free office suite. The Common Vulnerabilities and Exposures Project identifies the following problems: CVE-2006-2198 CVE-2006-2199 CVE-2006-3117
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1104-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    June 30th, 2006               
    - --------------------------------------------------------------------------
    Package        :
    Vulnerability  : several
    Problem type   : local (remote)
    Debian-specific: no
    CVE IDs        : CVE-2006-2198 CVE-2006-2199 CVE-2006-3117
    Several vulnerabilities have been discovered in, a free
    office suite.  The Common Vulnerabilities and Exposures Project
    identifies the following problems:
        It turned out to be possible to embed arbitrary BASIC macros in
        documents in a way that does not see them but
        executes them anyway without any user interaction.
        It is possible to evade the Java sandbox with specially crafted
        Java applets.
        Loading malformed XML documents can cause buffer overflows and
        cause a denial of service or execute arbitrary code.
    This update has the Mozilla component disabled, so that the
    Mozilla/LDAP adressbook feature won't work anymore.  It didn't work on
    anything else than i386 on sarge either.
    The old stable distribution (woody) does not contain
    For the stable distribution (sarge) this problem has been fixed in
    version 1.1.3-9sarge2.
    For the unstable distribution (sid) this problem has been fixed in
    version 2.0.3-1.
    We recommend that you upgrade your packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given at the end of this advisory:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:     2878 c29af36cea3d6f22c13f00dbe8247322
          Size/MD5 checksum:  4627106 93c4a9d88d0a115df537a3d61cca82b9
          Size/MD5 checksum: 166568714 5250574bad9906b38ce032d04b765772
      Architecture independent components:
          Size/MD5 checksum:  2648322 4f7714aad4409e00e14ce332e486662e
          Size/MD5 checksum:  2695762 4141052d3207816b5368408da9b15975
          Size/MD5 checksum:  2692534 b4ccab7fbac287c3e217abd35763c63d
          Size/MD5 checksum:  3587602 f0e95ccc9b8d7b355584a8bc052e5686
          Size/MD5 checksum:  2664462 1c4c270ce73b183f56adb7e7b6ab79ab
          Size/MD5 checksum:  3584076 ad6d82e05d64ed9e0e5bfa9fdb8ea1a3
          Size/MD5 checksum:  3454874 6cc643abc1a34367f357b01979a9e74e
          Size/MD5 checksum:  2742632 e21a6035232fe123b92da0e1a8b4ad6a
          Size/MD5 checksum:  3526678 1dca9def45f48a04b58a1c8794280dfd
          Size/MD5 checksum:  3563056 da70a829bcdf5357b1a9fb0d0c024f58
          Size/MD5 checksum:  2646184 822b4acde201446a26ac6632688bbad9
          Size/MD5 checksum:  2670064 ad10df5ab47cd27da0249e03c472a042
          Size/MD5 checksum:  2674846 f72f73f8933d2e23d9fc02e3ef17330f
          Size/MD5 checksum:  3495714 83d82fdeb236ab9fe8468d71282e95a1
          Size/MD5 checksum:  2658848 9c107e3b269ab7ffa57a0adc72968f8e
          Size/MD5 checksum:  2661050 fb2e7b56a4ec4d83241d018a88cb1088
          Size/MD5 checksum:  2696714 4acbd63edac85a4b74d948db27dfce12
          Size/MD5 checksum:  2772276 3919e225857c1b6b4687aa9194ddcc9a
          Size/MD5 checksum:  3556994 7ad5254da0f8354be0bc099d044cab1a
          Size/MD5 checksum:  3564520 f46caf42dc24a488a5ca61cb20ae3929
          Size/MD5 checksum:  2686182 1ab244880350c7f960d75323119fafd4
          Size/MD5 checksum:  3540942 6cc85e55ee6c4a6cd9f25bd33aee58fa
          Size/MD5 checksum:  2673538 0ebdfd84d88a08a6ed0bf3dd145188e6
          Size/MD5 checksum:  2665356 9ee46edc78bc00520dbdf019de2212b2
          Size/MD5 checksum:  3561370 11edb164c42cfb1c5141253bf730545b
          Size/MD5 checksum:  2665342 b030e20a7f32bf270bc1a1637c6d430e
          Size/MD5 checksum:  2667280 f48a54299a81f5b1197c1c4a2aa856e9
          Size/MD5 checksum:  3240660 594ca6fef1ea5e172eeebe9583777442
          Size/MD5 checksum:  3527454 32a915788eb695a53477f26796caeb2d
          Size/MD5 checksum:  3163760 987764f8fbb68de32bdf8ac52f53e089
          Size/MD5 checksum:  3332890 d41efa6a8574aae797cb4e80ef146492
          Size/MD5 checksum:  3604492 f457b77875e59d3de1bc581790ac1757
          Size/MD5 checksum:  3600290 bc7520ecae4c8c57fc715a339378f3a2
          Size/MD5 checksum:  3543580 81428bd8c9c18023c7bafbbb70fb67d0
          Size/MD5 checksum:  2689546 a1e8b5d97b5727fc019fc2a345a79621
          Size/MD5 checksum:  2652358 5646c499f10db23e7ebe7a705fe106ac
          Size/MD5 checksum:  2894872 32b6ad9a61744971ea404bf359ab32df
          Size/MD5 checksum:  3553752 addfff128953d5d8ff750d17bf46d85d
          Size/MD5 checksum:  3549254 d76933e96608ce1f061a103e35cb64b0
          Size/MD5 checksum:  2673156 92b6bfb587118375597db859d365ff7a
          Size/MD5 checksum:    67170 751a987f42c32c66d58873e6db56f403
          Size/MD5 checksum:  3130996 b7066c65ee5f48ecde70207bbd42c280
          Size/MD5 checksum:  6852018 d5634c24311188bcc5b6a2c02ce2f40c
          Size/MD5 checksum:   137102 5b3988d68d82fb5203edd42382740df2
      Intel IA-32 architecture:
          Size/MD5 checksum: 55754028 a7fa3cd60830602a0166fb5a02b8d9ca
          Size/MD5 checksum:  1857498 551e7688230bcd13c2a408521d53c1d4
          Size/MD5 checksum:   219936 babea1358fdeb65abcff0215e882db91
          Size/MD5 checksum:   202086 0b6eada27c857f58739a7cca36169810
          Size/MD5 checksum:   179506 aae628723c95d47f26e37879cf0e79d4
      PowerPC architecture:
          Size/MD5 checksum: 39929012 7d12b1be517fc63e565c278e171675e7
          Size/MD5 checksum:  1865472 1893367338dc987090a5a013e6b5e326
          Size/MD5 checksum:   161442 d31cae826c4a0e274d168564782dedbf
          Size/MD5 checksum:   158680 4fa8bd46594f93713433b53e71ea0151
          Size/MD5 checksum:   142202 0eeaf1e9526a2b13f2b52f5b7967d6eb
      IBM S/390 architecture:
          Size/MD5 checksum: 42753100 8e42040126f1790a4b1f1383b2272d7e
          Size/MD5 checksum:  1852914 da327cab034af93e336e219c8a1acb84
          Size/MD5 checksum:   166720 edeffc825dfdbc0734bf235661d2e8c9
          Size/MD5 checksum:   166550 2c611012c1cf57e4452818ec954644c8
          Size/MD5 checksum:   145214 81ed5ca6496ef4fa00469a6d198d5726
      Sun Sparc architecture:
          Size/MD5 checksum: 47627108 43a094373b754c324d666ecf26dcf80f
          Size/MD5 checksum:  1847490 ff92173f9d209979fb6f87997079979b
          Size/MD5 checksum:   198066 192928ab2fda8cf14f2c7cd110467957
          Size/MD5 checksum:   182520 cf8b4e1cba1690cbf01280a415e0d7de
          Size/MD5 checksum:   164814 219624bd999b31c534401b78c98179a2
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.