>From the dapper builds I did during the last security update, it's in
there, so dapper is not affected either:

$(CONFIGURE_FLAGS) is --disable-post-install-scripts --with-
tag=oob680-m5 --with-system-gcc --with-distro=Ubuntu --with-
vendor=Debian --enable-package-directories --with-installed-ooo-
dirname=openoffice --mandir=/usr/share/man --with-lang=en-US
-x-libraries=/usr/lib --with-build-version=openoffice.org
2.0.2-2ubuntu12.6, Tue Apr 22 15:53:39 PDT 2008 --disable-strip --with-
alloc=system --enable-atkbridge --enable-lockdown --with-binsuffix=no
--with-java=gij --with-jdk-home=/usr/lib/jvm/java-gcj --with-system-xt
--with-system-xerces --with-system-xalan --with-system-xml-apis --with-
firefox --disable-mono --with-
stlport4=/build/kees/openoffice.org-2.0.2/stlport4 --with-system-boost
--with-system-portaudio --with-system-libwpd --with-system-icu --with-
system-xmlsec --with-system-cairo --with-system-mdbtools --enable-
binfilter --with-system-hsqldb --with-system-beanshell --with-gcc-
speedup=ccache --enable-symbols=SMALL --with-num-cpus=5

-- 
[CVE-2008-2152] Integer overflow in rtl_allocateMemory() in OpenOffice.org
https://bugs.launchpad.net/bugs/238925
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to