Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5737-1

Debian Linux Security Advisory 5737-1 - If LibreOffice failed to validate a signed macro, it displayed a warning but still allowed execution of the script after printing a warning. Going forward in high macro security mode such macros are now disabled.

Packet Storm
#web#mac#linux#debian#js

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


Debian Security Advisory DSA-5737-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
August 05, 2024 https://www.debian.org/security/faq


Package : libreoffice
CVE ID : CVE-2024-6472

If LibreOffice failed to validate a signed macro, it displayed a warning
but still allowed execution of the script after printing a warning.
Going forward in high macro security mode such macros are now disabled.

For additional information please refer to
https://www.libreoffice.org/about-us/security/advisories/cve-2024-6472/

For the oldstable distribution (bullseye), this problem has been fixed
in version 1:7.0.4-4+deb11u10.

For the stable distribution (bookworm), this problem has been fixed in
version 4:7.4.7-1+deb12u4.

We recommend that you upgrade your libreoffice packages.

For the detailed security status of libreoffice please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libreoffice

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmaw7MgACgkQEMKTtsN8
TjbwRg//Uj5T8Z48NWwyT/IrUxHiSGIPdjjg8l422Ya5oMfF28Ks3ApQPpMhnkwM
YhsjZb6yRc9dxj81n5V78FtIKS5nqJ6A6NrPAb5fuan2pcULxbkvzDa9eGnhsg3G
0+lhg60KsXs0Ef9ScjWARUcmW49ukqpnUEcTXWqmZ/DDF16G6OOD5oR4s5BUnBq0
t41n5TvJC//13ptBnnI3iTq2rFMZz4jb/yoxGsc9WOvcTpb46yXKQnckIviMH4Nt
FWsAOZuI24o9tWeB/HkOSCY/KploFkojrxQpIJg7M7UqCzK/woWI5JfuI+xaqSiB
gibOqSohzYAxem1DhM/UckqXfgjpo91YgWVwbeaMfxX2VFCEUQW0ZiPQ/G4wQZMS
zawp/6hMuBTIlX+zQaYb7uyC3iIUj3UFeGvoQmOfeSSxpDI4yp7cHNPQvSTe1mXB
XlCzf8we/TzhjSKXcNvbYLnn2ro2fHRs3AwExZ+X24S1hfG+Fv9xnRk9VqqG8hiE
Tc4nEX92aHprjDTXhofRG5oDEAmhz7nyVAWiyJDTYtQkdbooU5sDIjTol7Ednckp
jTtkpajlIHfQrtjoxBFAU3MmUX1DIP8CUzOtrBsEdQ5yv3Y+zDLn4O1VJRGMfAzT
TaZ7tFwYbE7/rQh/Kv6a55z1QfPK13aWLhLvx9jfwudl4zAytGk=
=KIup
-----END PGP SIGNATURE-----

Related news

Red Hat Security Advisory 2024-5886-03

Red Hat Security Advisory 2024-5886-03 - An update for libreoffice is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.

Red Hat Security Advisory 2024-5608-03

Red Hat Security Advisory 2024-5608-03 - An update for libreoffice is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.

Red Hat Security Advisory 2024-5607-03

Red Hat Security Advisory 2024-5607-03 - An update for libreoffice is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.

Red Hat Security Advisory 2024-5599-03

Red Hat Security Advisory 2024-5599-03 - An update for libreoffice is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.

Red Hat Security Advisory 2024-5598-03

Red Hat Security Advisory 2024-5598-03 - An update for libreoffice is now available for Red Hat Enterprise Linux 8.

Red Hat Security Advisory 2024-5584-03

Red Hat Security Advisory 2024-5584-03 - An update for libreoffice is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.

Red Hat Security Advisory 2024-5583-03

Red Hat Security Advisory 2024-5583-03 - An update for libreoffice is now available for Red Hat Enterprise Linux 9.

Ubuntu Security Notice USN-6962-1

Ubuntu Security Notice 6962-1 - It was discovered that LibreOffice incorrectly allowed users to enable macros when a cryptographic signature failed to validate. If a user were tricked into opening a specially crafted document, a remote attacker could possibly execute arbitrary macros.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution