Red Hat 8853 Published by

A new update is available for Red Hat Enterprise Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Important: openoffice.org security update
Advisory ID: RHSA-2007:0001-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-0001.html
Issue date: 2007-01-03
Updated on: 2007-01-03
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-5870
- ---------------------------------------------------------------------

1. Summary:

Updated openoffice.org packages are now available.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, x86_64
Red Hat Enterprise Linux WS version 3 - i386, x86_64
Red Hat Enterprise Linux AS version 4 - i386, ppc, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, x86_64
Red Hat Enterprise Linux WS version 4 - i386, x86_64

3. Problem description:

OpenOffice.org is an office productivity suite that includes desktop
applications such as a word processor, spreadsheet, presentation manager,
formula editor, and drawing program.

Several integer overflow bugs were found in the OpenOffice.org WMF file
processor. An attacker could create a carefully crafted WMF file that could
cause OpenOffice.org to execute arbitrary code when the file was opened by
a victim. (CVE-2006-5870)

All users of OpenOffice.org are advised to upgrade to these updated
packages, which contain a backported fix for this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

217347 - CVE-2006-5870 WMF heap overflow

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/openoffice.org-1.1.2-35.2.0.EL3.src.rpm
6f3069cdf173a36929aee9e6ebdb8440 openoffice.org-1.1.2-35.2.0.EL3.src.rpm

i386:
ea2830df835325f459fa0ef8f344ba58 openoffice.org-1.1.2-35.2.0.EL3.i386.rpm
e285afb100f2673b575b7dad1338c12c openoffice.org-debuginfo-1.1.2-35.2.0.EL3.i386.rpm
e07b9cf11b115ad8de8ec029262bad73 openoffice.org-i18n-1.1.2-35.2.0.EL3.i386.rpm
b3be91bc84e9eb02e40b7a293db9a444 openoffice.org-libs-1.1.2-35.2.0.EL3.i386.rpm

x86_64:
ea2830df835325f459fa0ef8f344ba58 openoffice.org-1.1.2-35.2.0.EL3.i386.rpm
e285afb100f2673b575b7dad1338c12c openoffice.org-debuginfo-1.1.2-35.2.0.EL3.i386.rpm
e07b9cf11b115ad8de8ec029262bad73 openoffice.org-i18n-1.1.2-35.2.0.EL3.i386.rpm
b3be91bc84e9eb02e40b7a293db9a444 openoffice.org-libs-1.1.2-35.2.0.EL3.i386.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/openoffice.org-1.1.2-35.2.0.EL3.src.rpm
6f3069cdf173a36929aee9e6ebdb8440 openoffice.org-1.1.2-35.2.0.EL3.src.rpm

i386:
ea2830df835325f459fa0ef8f344ba58 openoffice.org-1.1.2-35.2.0.EL3.i386.rpm
e285afb100f2673b575b7dad1338c12c openoffice.org-debuginfo-1.1.2-35.2.0.EL3.i386.rpm
e07b9cf11b115ad8de8ec029262bad73 openoffice.org-i18n-1.1.2-35.2.0.EL3.i386.rpm
b3be91bc84e9eb02e40b7a293db9a444 openoffice.org-libs-1.1.2-35.2.0.EL3.i386.rpm

x86_64:
ea2830df835325f459fa0ef8f344ba58 openoffice.org-1.1.2-35.2.0.EL3.i386.rpm
e285afb100f2673b575b7dad1338c12c openoffice.org-debuginfo-1.1.2-35.2.0.EL3.i386.rpm
e07b9cf11b115ad8de8ec029262bad73 openoffice.org-i18n-1.1.2-35.2.0.EL3.i386.rpm
b3be91bc84e9eb02e40b7a293db9a444 openoffice.org-libs-1.1.2-35.2.0.EL3.i386.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/openoffice.org-1.1.2-35.2.0.EL3.src.rpm
6f3069cdf173a36929aee9e6ebdb8440 openoffice.org-1.1.2-35.2.0.EL3.src.rpm

i386:
ea2830df835325f459fa0ef8f344ba58 openoffice.org-1.1.2-35.2.0.EL3.i386.rpm
e285afb100f2673b575b7dad1338c12c openoffice.org-debuginfo-1.1.2-35.2.0.EL3.i386.rpm
e07b9cf11b115ad8de8ec029262bad73 openoffice.org-i18n-1.1.2-35.2.0.EL3.i386.rpm
b3be91bc84e9eb02e40b7a293db9a444 openoffice.org-libs-1.1.2-35.2.0.EL3.i386.rpm

x86_64:
ea2830df835325f459fa0ef8f344ba58 openoffice.org-1.1.2-35.2.0.EL3.i386.rpm
e285afb100f2673b575b7dad1338c12c openoffice.org-debuginfo-1.1.2-35.2.0.EL3.i386.rpm
e07b9cf11b115ad8de8ec029262bad73 openoffice.org-i18n-1.1.2-35.2.0.EL3.i386.rpm
b3be91bc84e9eb02e40b7a293db9a444 openoffice.org-libs-1.1.2-35.2.0.EL3.i386.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/openoffice.org-1.1.2-35.2.0.EL3.src.rpm
6f3069cdf173a36929aee9e6ebdb8440 openoffice.org-1.1.2-35.2.0.EL3.src.rpm

i386:
ea2830df835325f459fa0ef8f344ba58 openoffice.org-1.1.2-35.2.0.EL3.i386.rpm
e285afb100f2673b575b7dad1338c12c openoffice.org-debuginfo-1.1.2-35.2.0.EL3.i386.rpm
e07b9cf11b115ad8de8ec029262bad73 openoffice.org-i18n-1.1.2-35.2.0.EL3.i386.rpm
b3be91bc84e9eb02e40b7a293db9a444 openoffice.org-libs-1.1.2-35.2.0.EL3.i386.rpm

x86_64:
ea2830df835325f459fa0ef8f344ba58 openoffice.org-1.1.2-35.2.0.EL3.i386.rpm
e285afb100f2673b575b7dad1338c12c openoffice.org-debuginfo-1.1.2-35.2.0.EL3.i386.rpm
e07b9cf11b115ad8de8ec029262bad73 openoffice.org-i18n-1.1.2-35.2.0.EL3.i386.rpm
b3be91bc84e9eb02e40b7a293db9a444 openoffice.org-libs-1.1.2-35.2.0.EL3.i386.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/openoffice.org-1.1.5-6.6.0.EL4.src.rpm
eeb08699ea4be24272fcfd9f2eff47c5 openoffice.org-1.1.5-6.6.0.EL4.src.rpm

i386:
f91fe90ea39081d4c7032d043fab560c openoffice.org-1.1.5-6.6.0.EL4.i386.rpm
87311d1a41828aaee1e1bdddc2c1b0b4 openoffice.org-debuginfo-1.1.5-6.6.0.EL4.i386.rpm
88fdb1893621ab64839d69e905f58b53 openoffice.org-i18n-1.1.5-6.6.0.EL4.i386.rpm
1bbd8c3f838532b55b9892d274e617e2 openoffice.org-kde-1.1.5-6.6.0.EL4.i386.rpm
c38f19182c1e17e383e81b31bca47101 openoffice.org-libs-1.1.5-6.6.0.EL4.i386.rpm

ppc:
8dea40bdabbaa3013c3c447f1f466001 openoffice.org-1.1.5-6.6.0.EL4.ppc.rpm
95f2367a70d8c0a319d3e0707a13f60d openoffice.org-debuginfo-1.1.5-6.6.0.EL4.ppc.rpm
1e2b701f707f804be099a9e067a55bea openoffice.org-i18n-1.1.5-6.6.0.EL4.ppc.rpm
5278629cd13d0a377ba93eb2ac1d0219 openoffice.org-kde-1.1.5-6.6.0.EL4.ppc.rpm
0df62d4ee6939cf2f55cb6f3ff1fb8ca openoffice.org-libs-1.1.5-6.6.0.EL4.ppc.rpm

x86_64:
f91fe90ea39081d4c7032d043fab560c openoffice.org-1.1.5-6.6.0.EL4.i386.rpm
87311d1a41828aaee1e1bdddc2c1b0b4 openoffice.org-debuginfo-1.1.5-6.6.0.EL4.i386.rpm
88fdb1893621ab64839d69e905f58b53 openoffice.org-i18n-1.1.5-6.6.0.EL4.i386.rpm
c38f19182c1e17e383e81b31bca47101 openoffice.org-libs-1.1.5-6.6.0.EL4.i386.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/openoffice.org-1.1.5-6.6.0.EL4.src.rpm
eeb08699ea4be24272fcfd9f2eff47c5 openoffice.org-1.1.5-6.6.0.EL4.src.rpm

i386:
f91fe90ea39081d4c7032d043fab560c openoffice.org-1.1.5-6.6.0.EL4.i386.rpm
87311d1a41828aaee1e1bdddc2c1b0b4 openoffice.org-debuginfo-1.1.5-6.6.0.EL4.i386.rpm
88fdb1893621ab64839d69e905f58b53 openoffice.org-i18n-1.1.5-6.6.0.EL4.i386.rpm
1bbd8c3f838532b55b9892d274e617e2 openoffice.org-kde-1.1.5-6.6.0.EL4.i386.rpm
c38f19182c1e17e383e81b31bca47101 openoffice.org-libs-1.1.5-6.6.0.EL4.i386.rpm

x86_64:
f91fe90ea39081d4c7032d043fab560c openoffice.org-1.1.5-6.6.0.EL4.i386.rpm
87311d1a41828aaee1e1bdddc2c1b0b4 openoffice.org-debuginfo-1.1.5-6.6.0.EL4.i386.rpm
88fdb1893621ab64839d69e905f58b53 openoffice.org-i18n-1.1.5-6.6.0.EL4.i386.rpm
c38f19182c1e17e383e81b31bca47101 openoffice.org-libs-1.1.5-6.6.0.EL4.i386.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/openoffice.org-1.1.5-6.6.0.EL4.src.rpm
eeb08699ea4be24272fcfd9f2eff47c5 openoffice.org-1.1.5-6.6.0.EL4.src.rpm

i386:
f91fe90ea39081d4c7032d043fab560c openoffice.org-1.1.5-6.6.0.EL4.i386.rpm
87311d1a41828aaee1e1bdddc2c1b0b4 openoffice.org-debuginfo-1.1.5-6.6.0.EL4.i386.rpm
88fdb1893621ab64839d69e905f58b53 openoffice.org-i18n-1.1.5-6.6.0.EL4.i386.rpm
1bbd8c3f838532b55b9892d274e617e2 openoffice.org-kde-1.1.5-6.6.0.EL4.i386.rpm
c38f19182c1e17e383e81b31bca47101 openoffice.org-libs-1.1.5-6.6.0.EL4.i386.rpm

x86_64:
f91fe90ea39081d4c7032d043fab560c openoffice.org-1.1.5-6.6.0.EL4.i386.rpm
87311d1a41828aaee1e1bdddc2c1b0b4 openoffice.org-debuginfo-1.1.5-6.6.0.EL4.i386.rpm
88fdb1893621ab64839d69e905f58b53 openoffice.org-i18n-1.1.5-6.6.0.EL4.i386.rpm
c38f19182c1e17e383e81b31bca47101 openoffice.org-libs-1.1.5-6.6.0.EL4.i386.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/openoffice.org-1.1.5-6.6.0.EL4.src.rpm
eeb08699ea4be24272fcfd9f2eff47c5 openoffice.org-1.1.5-6.6.0.EL4.src.rpm

i386:
f91fe90ea39081d4c7032d043fab560c openoffice.org-1.1.5-6.6.0.EL4.i386.rpm
87311d1a41828aaee1e1bdddc2c1b0b4 openoffice.org-debuginfo-1.1.5-6.6.0.EL4.i386.rpm
88fdb1893621ab64839d69e905f58b53 openoffice.org-i18n-1.1.5-6.6.0.EL4.i386.rpm
1bbd8c3f838532b55b9892d274e617e2 openoffice.org-kde-1.1.5-6.6.0.EL4.i386.rpm
c38f19182c1e17e383e81b31bca47101 openoffice.org-libs-1.1.5-6.6.0.EL4.i386.rpm

x86_64:
f91fe90ea39081d4c7032d043fab560c openoffice.org-1.1.5-6.6.0.EL4.i386.rpm
87311d1a41828aaee1e1bdddc2c1b0b4 openoffice.org-debuginfo-1.1.5-6.6.0.EL4.i386.rpm
88fdb1893621ab64839d69e905f58b53 openoffice.org-i18n-1.1.5-6.6.0.EL4.i386.rpm
c38f19182c1e17e383e81b31bca47101 openoffice.org-libs-1.1.5-6.6.0.EL4.i386.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFFm/r7XlSAg2UNWIIRAiwcAKC4BO3kJv4G/uMQJQy9X3LPG1MFnQCfcaWi
f8viPMPuKVYDDTI0z/WznFk=
=5nEJ
-----END PGP SIGNATURE-----