[oi-dev] Security update: Update to LibreOffice 4.4.7
Aurélien Larcher
aurelien.larcher at gmail.com
Fri Dec 25 18:25:56 UTC 2015
Hi,
Should this be the subject of a post on the OI website ?
Better visibility of such security announcements could be appreciated by
users.
I can create a category with a dedicated page for such information if there
is interest.
Best regards
Aurélien
On Fri, Dec 25, 2015 at 7:15 PM, Thomas Wagner <tom-oi-dev at tom.bn-ulm.de>
wrote:
> Hi Ken,
>
> we have version 4.4.5 in the binary repo.
>
> I couldn't find a location with a patch for this CVE; so if anyone
> has better luck, I would integrate it and rebuild the packages.
>
> Until then, users may not blindly click on links in documents they
> don't trust the source.
>
> Regards,
> Thomas
>
> On Tue, Dec 22, 2015 at 04:15:06PM +0000, ken mays via oi-dev wrote:
> >
> > Security update: Update to LibreOffice 4.4.7
> > Location: OI-SFE packaging
> > LibreOffice is an open source, community-developed office productivity
> > suite. It includes key desktop applications, such as a word processor,
> > a
> > spreadsheet, a presentation manager, a formula editor, and a drawing
> > program. LibreOffice replaces OpenOffice and provides a similar but
> > enhanced and extended office suite.
> > It was discovered that LibreOffice did not properly restrict automatic
> > link
> > updates. By tricking a victim into opening specially crafted
> > documents, an
> > attacker could possibly use this flaw to disclose contents of files
> > accessible by the victim. (CVE-2015-4551)
> > An integer underflow flaw leading to a heap-based buffer overflow when
> > parsing PrinterSetup data was discovered. By tricking a user into
> > opening a
> > specially crafted document, an attacker could possibly exploit this
> > flaw to
> > execute arbitrary code with the privileges of the user opening the
> > file.
> > (CVE-2015-5212)
> > An integer overflow flaw, leading to a heap-based buffer overflow, was
> > found in the way LibreOffice processed certain Microsoft Word .doc
> > files.
> > By tricking a user into opening a specially crafted Microsoft Word
> > .doc
> > document, an attacker could possibly use this flaw to execute
> > arbitrary
> > code with the privileges of the user opening the file. (CVE-2015-5213)
> > It was discovered that LibreOffice did not properly sanity check
> > bookmark
> > indexes. By tricking a user into opening a specially crafted document,
> > an
> > attacker could possibly use this flaw to execute arbitrary code with
> > the
> > privileges of the user opening the file. (CVE-2015-5214)
> > All libreoffice users are advised to upgrade to these updated
> > packages,
> > which contain backported patches to correct these issues.
>
> > _______________________________________________
> > oi-dev mailing list
> > oi-dev at openindiana.org
> > http://openindiana.org/mailman/listinfo/oi-dev
>
> --
> --
> Thomas Wagner
>
> ------------------------------------------------------------------------
> Service rund um UNIX(TM), Wagner Network Services, Thomas Wagner
> Solaris(TM), Linux(TM) Eschenweg 21, 89174 Altheim, Germany
> Novell(TM), Windows(TM) TEL: +49-731-9807799, FAX: +49-731-9807711
> Telekommunikation, LAN, MOBILE/CELL: +49-171-6135989
> Internet-Service, Elektronik EMAIL: wagner at wagner-net.com
>
> _______________________________________________
> oi-dev mailing list
> oi-dev at openindiana.org
> http://openindiana.org/mailman/listinfo/oi-dev
>
--
---
Praise the Caffeine embeddings
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openindiana.org/pipermail/oi-dev/attachments/20151225/5bd2cf12/attachment-0005.html>
More information about the oi-dev
mailing list