exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4178-1

Debian Security Advisory 4178-1
Posted Apr 23, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4178-1 - Two vulnerabilities were discovered in LibreOffice's code to parse MS Word and Structured Storage files, which could result in denial of service and potentially the execution of arbitrary code if a malformed file is opened.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2018-10119, CVE-2018-10120
SHA-256 | 159dd6ac962d87a09305543365907db58b430318d6a33c6e67ecc67fde1da39d

Debian Security Advisory 4178-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4178-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
April 20, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : libreoffice
CVE ID : CVE-2018-10119 CVE-2018-10120

Two vulnerabilities were discovered in LibreOffice's code to parse
MS Word and Structured Storage files, which could result in denial of
service and potentially the execution of arbitrary code if a malformed
file is opened.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:4.3.3-2+deb8u11.

For the stable distribution (stretch), these problems have been fixed in
version 1:5.2.7-1+deb9u4.

We recommend that you upgrade your libreoffice packages.

For the detailed security status of libreoffice please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libreoffice

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=KPGE
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close