Package "libfreexl1-dbg"
Name: |
libfreexl1-dbg
|
Description: |
library for direct reading of Microsoft Excel spreadsheets - debug
|
Latest version: |
1.0.2-1ubuntu0.1 |
Release: |
xenial (16.04) |
Level: |
updates |
Repository: |
universe |
Head package: |
freexl |
Homepage: |
https://www.gaia-gis.it/fossil/freexl/ |
Links
Download "libfreexl1-dbg"
Other versions of "libfreexl1-dbg" in Xenial
Changelog
freexl (1.0.2-1ubuntu0.1) xenial-security; urgency=medium
* SECURITY UPDATE: Imported changes from Debian's 1.0.2-2+deb9u2 package
- debian/patches/CVE-2017-2923_CVE-2017-2924.patch: Imported from Debian
- debian/patches/security-fixes-1.0.5.patch: Imported from Debian
- CVE-2017-2923 CVE-2017-2924 CVE-2017-7435 CVE-2017-7436 CVE-2017-7437
CVE-2017-7438 CVE-2017-7439
-- Mike Salvatore <email address hidden> Tue, 25 Sep 2018 11:05:08 -0400
|
CVE-2017-2923 |
An exploitable heap based buffer overflow vulnerability exists in the 'read_biff_next_record function' of FreeXL 1.0.3. A specially crafted XLS file |
CVE-2017-2924 |
An exploitable heap-based buffer overflow vulnerability exists in the read_legacy_biff function of FreeXL 1.0.3. A specially crafted XLS file can cau |
CVE-2017-7435 |
In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malic |
CVE-2017-7436 |
In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malic |
CVE-2017-7437 |
NetIQ Privileged Account Manager before 3.1 Patch Update 3 allowed cross site scripting attacks via the "type" and "account" parameters of json reque |
CVE-2017-7438 |
NetIQ Privileged Account Manager before 3.1 Patch Update 3 allowed cross site scripting attacks via javascript DOM modification using the supplied co |
CVE-2017-7439 |
NetApp OnCommand Unified Manager Core Package 5.x before 5.2.2P1 might allow remote attackers to obtain sensitive information via vectors involving e |
|
About
-
Send Feedback to @ubuntu_updates