Linux Security
    Linux Security
    Linux Security

    Debian: New packages fix several vulnerabilities

    Posted By
    Several security related problems have been discovered in, the free office suite. The Common Vulnerabilities and Exposures project identifies the following problems.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1270-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    March 20th, 2007              
    - --------------------------------------------------------------------------
    Package        :
    Vulnerability  : several
    Problem type   : local (remote)
    Debian-specific: no
    CVE IDs        : CVE-2007-0002 CVE-2007-0238 CVE-2007-0239
    Several security related problems have been discovered in, the free office suite.  The Common Vulnerabilities and
    Exposures project identifies the following problems:
        iDefense reported several integer overflow bugs in libwpd, a
        library for handling WordPerfect documents that is included in  Attackers are able to exploit these with
        carefully crafted WordPerfect files that could cause an
        application linked with libwpd to crash or possibly execute
        arbitrary code.
        Next Generation Security discovered that the StarCalc parser in contains an easily exploitable stack overflow that
        could be used exploited by a specially crafted document to execute
        arbitrary code.
        It has been reported that does not escape shell
        meta characters and is hence vulnerable to execute arbitrary shell
        commands via a specially crafted document after the user clicked
        to a prepared link.
    For the stable distribution (sarge) these problems have been fixed in
    version 1.1.3-9sarge6.
    For the testing distribution (etch) these problems have been fixed in
    version 2.0.4.dfsg.2-6.
    For the unstable distribution (sid) these problems have been fixed in
    version 2.0.4.dfsg.2-6.
    We recommend that you upgrade your packages.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given at the end of this advisory:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
      Source archives:
          Size/MD5 checksum:     2878 6c4447f2bdd8cde4e10556eacb9aef80
          Size/MD5 checksum:  4630152 e9d9ee838f73572836b059f8033bdb35
          Size/MD5 checksum: 166568714 5250574bad9906b38ce032d04b765772
      Architecture independent components:
          Size/MD5 checksum:  2648700 9dedff380f535381ca48fc23da8c74ae
          Size/MD5 checksum:  2696106 2eebd4484da0e9a4dcbde3b01e309ba7
          Size/MD5 checksum:  2692842 e2f0cce7f7ca75c26a55b2615a0d32a2
          Size/MD5 checksum:  3587952 02a0dcfd7d36cea6433365e4c9acd00f
          Size/MD5 checksum:  2664822 176c3bd0b24dc4a0700d558e7df15ddd
          Size/MD5 checksum:  3584442 b7a8d9b8b21a152537ef71d3dce56d54
          Size/MD5 checksum:  3455220 214fd0769fb967b22521b244a5f8e412
          Size/MD5 checksum:  2742946 04c91de4bb5b2b6d453ede296693889a
          Size/MD5 checksum:  3527040 738553a6850160b374d36b7a83f79370
          Size/MD5 checksum:  3563372 db130e40120c69626e950063eee07a3d
          Size/MD5 checksum:  2646546 5ebb68935e9a3eba761cc2574717339c
          Size/MD5 checksum:  2670434 ed48f9c2f37fed09f741ce4f8a690bc5
          Size/MD5 checksum:  2675206 5f7d1dcd9a1e3ee8c9582da53300e8f4
          Size/MD5 checksum:  3496040 b65004e7d70e0bc6b94ce5fcba33f21c
          Size/MD5 checksum:  2659162 dc858e988c2025cc37b76d1b21d400b8
          Size/MD5 checksum:  2661416 d3ad4533667aa90f52bed28b1525437c
          Size/MD5 checksum:  2697048 b84ec1f9fa2561e4c2f344b6d6052986
          Size/MD5 checksum:  2772632 fcb6b507ff92c95c94a85f471a0fa522
          Size/MD5 checksum:  3557364 ed6dcc2203bb3329ce98c4e626a9ffa7
          Size/MD5 checksum:  3564910 59cbed0cba5644f4f428fa9cb5551c2d
          Size/MD5 checksum:  2686506 a7aa7937a1818cb63537746e961c2072
          Size/MD5 checksum:  3541338 a411e36d9d06b844628a1bbce51508f1
          Size/MD5 checksum:  2673870 8899a3bddb951b8affe9b68774d22cb5
          Size/MD5 checksum:  2665700 dadd04e21d730a0eda273205d8b0e506
          Size/MD5 checksum:  3561748 6807bb01d7c2bef00c393128d7948da4
          Size/MD5 checksum:  2665678 08076bb0916dd8d702b0ac6a6b582aba
          Size/MD5 checksum:  2667602 8cd2a2fd1544772908a239fcf81d5057
          Size/MD5 checksum:  3241012 ffa736fab57309f09cf269316c2be189
          Size/MD5 checksum:  3527818 b97751305b37e48e99e76eff3a684239
          Size/MD5 checksum:  3164122 4aa344cc3da0d600bbf7a37f6d161df9
          Size/MD5 checksum:  3333266 b5c3466e4f6df17431cfe57840da8da4
          Size/MD5 checksum:  3604862 1c9e35a8b63c9cff2a7ac25f9613cbf9
          Size/MD5 checksum:  3600626 0802e8e76b4f13e0c8c426051d3d19b0
          Size/MD5 checksum:  3543964 7c75870c1e87da21750175c9347b1e17
          Size/MD5 checksum:  2689868 2df2a8205355c4081f5b41f1a8a23485
          Size/MD5 checksum:  2652696 6aee58cf724a13ae07ffcb2d52b4fde6
          Size/MD5 checksum:  2895216 99f03f68a8046edbf56faf2d75d82edd
          Size/MD5 checksum:  3554128 bf3e1b409a3779b7f3dac854dbd878b3
          Size/MD5 checksum:  3549590 ce73373dbc4b1598d01596ab3ac91a96
          Size/MD5 checksum:  2673534 06ae86a2e873845cf08e9fff5d23ff6a
          Size/MD5 checksum:    67534 56b5d2fe567a33bd5d208e0f179b4410
          Size/MD5 checksum:  3131362 f1e269dc8d5cd27099e3c1db7bd15c8d
          Size/MD5 checksum:  6852372 c2c23a8406b9890521f87716585e0fd4
          Size/MD5 checksum:   137464 6f58470f00a2ec8c27ab98e875de956c
      Intel IA-32 architecture:
          Size/MD5 checksum: 41473388 b280f888e5a84c12e359e7f6830a81a7
          Size/MD5 checksum:  1857594 e54523506eb611fa23e758161cf250b0
          Size/MD5 checksum:   164856 f1809a564e47ee6cf1af37883fe91108
          Size/MD5 checksum:   160390 6a214287121ed3d1a03c2b3efbd3950e
          Size/MD5 checksum:   144378 87bff29447ba1026c8ea6a2cb56dc406
      PowerPC architecture:
          Size/MD5 checksum: 39929566 545ef69eda0f41c93c1e09a3f2ff2efa
          Size/MD5 checksum:  1865952 828b0ce16533bb417a593edbcda9deac
          Size/MD5 checksum:   161836 8ccbd9c932eb05eb6cc79fd84759d5f2
          Size/MD5 checksum:   159046 bca17d24d59e847fc46e3ce3847a1a75
          Size/MD5 checksum:   142544 dd2356f4c0d924006a8340b4ac42ac76
      IBM S/390 architecture:
          Size/MD5 checksum: 42752608 21b8a45df2205e8193977539d79df845
          Size/MD5 checksum:  1853012 fc6d24bf76d4967999edb066e585dd0c
          Size/MD5 checksum:   167062 43ea44833535e55c4593d4c66a6b887a
          Size/MD5 checksum:   166918 cfd508737ce96134e2f1f4e6969cde3c
          Size/MD5 checksum:   145564 e7fc82f32d149e99be23a85a5eae3f60
      Sun Sparc architecture:
          Size/MD5 checksum: 40804962 5ea6fa0ce8f275db0e841db5e46a3956
          Size/MD5 checksum:  1847980 713150289b2908fd6a4cc98b13293ac3
          Size/MD5 checksum:   168226 181d3b7efbdc3decebc5d605c386af14
          Size/MD5 checksum:   158594 ba8b7b9491cfd6295afac1e49d87c704
          Size/MD5 checksum:   140106 9ab2c61b292603df23efc2a7c3eb7867
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"2","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.