Multiple vulnerabilities have been discovered in LibreOffice, a full-featured office productivity:
Federico Scrinzi discovered an information leak in the handling of ODF documents. Quoting from <https://www.libreoffice.org/about-us/security/advisories/cve-2015-4551/>: The LinkUpdateMode feature controls whether documents inserted into Writer or Calc via links will either not get updated, or prompt to update, or automatically update, when the parent document is loaded. The configuration of this option was stored in the document. That flawed approach enabled documents to be crafted with links to plausible targets on the victims host computer. The contents of those automatically inserted after load links can be concealed in hidden sections and retrieved by the attacker if the document is saved and returned to sender, or via http requests if the user has selected lower security settings for that document.
A buffer overflow in parsing the printer setup information in ODF documents may result in the execution of arbitrary code.
A buffer overflow and an integer overflow in parsing Microsoft Word documents may result in the execution of arbitrary code.
For the oldstable distribution (wheezy), these problems have been fixed in version 1:3.5.4+dfsg2-0+deb7u5.
For the stable distribution (jessie), these problems have been fixed in version 1:4.3.3-2+deb8u2.
For the testing distribution (stretch), these problems have been fixed in version 1:5.0.2-1.
For the unstable distribution (sid), these problems have been fixed in version 1:5.0.2-1.
We recommend that you upgrade your libreoffice packages.