The following updates are available for Debian:
[DLA 419-1] gtk+2.0 security update
[DSA 3482-1] libreoffice security update
[DLA 419-1] gtk+2.0 security update
[DSA 3482-1] libreoffice security update
[DLA 419-1] gtk+2.0 security update
Package : gtk+2.0
Version : 2.20.1-2+deb6u1
CVE ID : CVE-2013-7447
Debian Bug : 799275
Gtk+2.0, a graphical user interface library, was susceptible to an integer
overflow in its gdk_cairo_set_source_pixbuf function when allocating a
large block of memory.
For Debian 6 "Squeeze", this issue has been fixed in gtk+2.0 version
2.20.1-2+deb6u1. We recommend you to upgrade your gtk+2.0 packages.
Learn more about the Debian Long Term Support (LTS) Project and how to
apply these updates at: https://wiki.debian.org/LTS/
[DSA 3482-1] libreoffice security update
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3482-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
February 17, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libreoffice
CVE ID : CVE-2016-0794 CVE-2016-0795
An anonymous contributor working with VeriSign iDefense Labs
discovered that libreoffice, a full-featured office productivity
suite, did not correctly handle Lotus WordPro files. This would enable
an attacker to crash the program, or execute arbitrary code, by
supplying a specially crafted LWP file.
For the oldstable distribution (wheezy), these problems have been fixed
in version 3.5.4+dfsg2-0+deb7u6.
For the stable distribution (jessie), these problems have been fixed in
version 4.3.3-2+deb8u3.
For the testing (stretch) and unstable (sid) distributions, these
problems have been fixed in version 1:5.1.1~rc1-1.
We recommend that you upgrade your libreoffice packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/