>From the dapper builds I did during the last security update, it's in there, so dapper is not affected either:
$(CONFIGURE_FLAGS) is --disable-post-install-scripts --with- tag=oob680-m5 --with-system-gcc --with-distro=Ubuntu --with- vendor=Debian --enable-package-directories --with-installed-ooo- dirname=openoffice --mandir=/usr/share/man --with-lang=en-US -x-libraries=/usr/lib --with-build-version=openoffice.org 2.0.2-2ubuntu12.6, Tue Apr 22 15:53:39 PDT 2008 --disable-strip --with- alloc=system --enable-atkbridge --enable-lockdown --with-binsuffix=no --with-java=gij --with-jdk-home=/usr/lib/jvm/java-gcj --with-system-xt --with-system-xerces --with-system-xalan --with-system-xml-apis --with- firefox --disable-mono --with- stlport4=/build/kees/openoffice.org-2.0.2/stlport4 --with-system-boost --with-system-portaudio --with-system-libwpd --with-system-icu --with- system-xmlsec --with-system-cairo --with-system-mdbtools --enable- binfilter --with-system-hsqldb --with-system-beanshell --with-gcc- speedup=ccache --enable-symbols=SMALL --with-num-cpus=5 -- [CVE-2008-2152] Integer overflow in rtl_allocateMemory() in OpenOffice.org https://bugs.launchpad.net/bugs/238925 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs