Jump to content

paul

Admin
  • Posts

    5611
  • Joined

  • Last visited

  • Days Won

    8

Posts posted by paul

  1. This updates provides a new OpenOffice.org version 3.1.1. It holds

    security and bug fixes described as follow:

     

    An integer underflow might allow remote attackers to execute arbitrary

    code via crafted records in the document table of a Word document,

    leading to a heap-based buffer overflow (CVE-2009-0200).

     

    A heap-based buffer overflow might allow remote attackers to execute

    arbitrary code via unspecified records in a crafted Word document,

    related to table parsing (CVE-2009-0201).

     

    A heap-based buffer overflow allows remote attackers to execute

    arbitrary code via a crafted EMF file (CVE-2009-2139).

     

    Multiple heap-based buffer overflows allow remote attackers to execute

    arbitrary code via a crafted EMF+ file (CVE-2009-2140).

     

    OpenOffice's xmlsec uses a bundled Libtool which might load .la

    file in the current working directory allowing local users to gain

    privileges via a Trojan horse file. For enabling such vulnerability

    xmlsec has to use --enable-crypto_dl building flag however it does

    not, although the fix keeps protected against this threat whenever

    that flag had been enabled (CVE-2009-3736).

     

    Further this update provides following bug fixes:

     

    OpenOffice.org is not properly configure to use the xdg-email

    functionality of the FreeDesktop standard (#52195).

     

    As the template desktop icons are not properly set, it's not presented

    under the context menu of applications like Dolphin (#56439).

     

    The Firefox plugin which enables viewing of OpenOffice documents

    inside the browser was not enabled.

  2. Some vulnerabilities were discovered and corrected in the Linux

    2.6 kernel:

     

    Array index error in the gdth_read_event function in

    drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows

    local users to cause a denial of service or possibly gain privileges

    via a negative event index in an IOCTL request. (CVE-2009-3080)

     

    The collect_rx_frame function in drivers/isdn/hisax/hfc_usb.c in the

    Linux kernel before 2.6.32-rc7 allows attackers to have an unspecified

    impact via a crafted HDLC packet that arrives over ISDN and triggers

    a buffer under-read. (CVE-2009-4005)

     

    An issue was discovered in 2.6.32.x kernels, which sets unsecure

    permission for devtmpfs file system by default. (CVE-2010-0299)

     

    Additionally, it was added support for Atheros AR2427 Wireless

    Network Adapter.

     

    To update your kernel, please follow the directions located at:

     

    http://www.mandriva.com/en/security/kernelupdate

  3. Some vulnerabilities were discovered and corrected in the Linux

    2.6 kernel:

     

    Array index error in the gdth_read_event function in

    drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows

    local users to cause a denial of service or possibly gain privileges

    via a negative event index in an IOCTL request. (CVE-2009-3080)

     

    The collect_rx_frame function in drivers/isdn/hisax/hfc_usb.c in the

    Linux kernel before 2.6.32-rc7 allows attackers to have an unspecified

    impact via a crafted HDLC packet that arrives over ISDN and triggers

    a buffer under-read. (CVE-2009-4005)

     

    Additionally, the Linux kernel was updated to the stable release

    2.6.27.45.

     

    To update your kernel, please follow the directions located at:

     

    http://www.mandriva.com/en/security/kernelupdate

×
×
  • Create New...