Updated OpenOffice.org packages fix vulnerability
Integer overflow in the rtl_allocateMemory function in
sal/rtl/source/alloc_global.c in OpenOffice.org (OOo) 2.0 through 2.4
allows remote attackers to execute arbitrary code via a crafted file
that triggers a heap-based buffer overflow.
The updated packages have been patched to fix the issue.
Update:
The OpenOffice.org package for Mandriva Corporate 3 missed the patch
application due to a build error. This update fixes that.