Secunia Security Advisory - Fedora has issued an update for libwpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library.
d97c18cf4c388e6f4d4e6a886eb47be6769da3a062f145f50d9fac9b93faf2b8
----------------------------------------------------------------------
Want a new job?
http://secunia.com/secunia_vacancies/
Secunia is looking for new researchers with a reversing background
and experience in writing exploit code:
http://secunia.com/hardcore_disassembler_and_reverse_engineer/
http://secunia.com/Disassembling_og_Reversing/
----------------------------------------------------------------------
TITLE:
Fedora update for libwpd
SECUNIA ADVISORY ID:
SA24573
VERIFY ADVISORY:
http://secunia.com/advisories/24573/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Fedora Core 6
http://secunia.com/product/12487/
Fedora Core 5
http://secunia.com/product/8808/
DESCRIPTION:
Fedora has issued an update for libwpd. This fixes some
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) or to compromise an application using the
library.
For more information:
SA24507
SOLUTION:
Apply updated packages.
-- Fedora Core 5 --
ac04c855a542713789b012c7c748955902f5e0d5
SRPMS/libwpd-0.8.9-1.fc5.src.rpm
ac04c855a542713789b012c7c748955902f5e0d5
noarch/libwpd-0.8.9-1.fc5.src.rpm
1641f2aa79faf2e7d6a1f40889d9cfa86c0d2e16
ppc/libwpd-devel-0.8.9-1.fc5.ppc.rpm
46fe9d4f8f67892b4aafb54561ca86acf14d564e
ppc/libwpd-tools-0.8.9-1.fc5.ppc.rpm
f60a4342b52c013822bc0757b3c77459bb784b0d
ppc/debug/libwpd-debuginfo-0.8.9-1.fc5.ppc.rpm
90b0e534b079e6cc4b9fe9d41ba6ce0dffb34953
ppc/libwpd-0.8.9-1.fc5.ppc.rpm
62c4e9cd4e26c42597702ed40b7b35d2db3eca44
x86_64/debug/libwpd-debuginfo-0.8.9-1.fc5.x86_64.rpm
9f906cbe021f4ecf4df1b08e97895827a1a4c534
x86_64/libwpd-devel-0.8.9-1.fc5.x86_64.rpm
c233b7981bb17d98ccc2880657d3b6c46a4cc599
x86_64/libwpd-0.8.9-1.fc5.x86_64.rpm
49be4992c42f05515a450453dec5cafc5afc375c
x86_64/libwpd-tools-0.8.9-1.fc5.x86_64.rpm
f8c04ab995ad24f8166a130415749f1696e41705
i386/libwpd-devel-0.8.9-1.fc5.i386.rpm
c87355919592e7faee65e6feead22bb1f488467a
i386/libwpd-tools-0.8.9-1.fc5.i386.rpm
8d328c869a9471fe92501f7c1039fb858a66325b
i386/libwpd-0.8.9-1.fc5.i386.rpm
cbfb43eb990771b494662032085de34aa5f24d56
i386/debug/libwpd-debuginfo-0.8.9-1.fc5.i386.rpm
-- Fedora Core 6 --
c19d2541e88b8056998e24b35787b6fcc0d180b8
SRPMS/libwpd-0.8.9-1.fc6.src.rpm
c19d2541e88b8056998e24b35787b6fcc0d180b8
noarch/libwpd-0.8.9-1.fc6.src.rpm
9a62af4f6bdc15e1f86f4994b36d2a5e308ba8cd
ppc/libwpd-tools-0.8.9-1.fc6.ppc.rpm
969a4eba1cf413a3dcd67c6922a08a33f3ea9653
ppc/debug/libwpd-debuginfo-0.8.9-1.fc6.ppc.rpm
f321d3a10543871abb9da7b3a25b24904c84be3c
ppc/libwpd-0.8.9-1.fc6.ppc.rpm
7e6745b9128b0ac3897c2777573d484093d35542
ppc/libwpd-devel-0.8.9-1.fc6.ppc.rpm
db32fec3ec0e96954b2d8ae3d45fbbd3dc9c3f3f
x86_64/libwpd-0.8.9-1.fc6.x86_64.rpm
200fd78dfb054e2baa86490d911e0d086af18de0
x86_64/libwpd-tools-0.8.9-1.fc6.x86_64.rpm
38824f1a522b860c1cac18c0dd4c0e1a64ff374d
x86_64/debug/libwpd-debuginfo-0.8.9-1.fc6.x86_64.rpm
3be810bc0cc4034654171c12909c0e60f116a635
x86_64/libwpd-devel-0.8.9-1.fc6.x86_64.rpm
bc601298c43b4c327e1a4899e20878326c9936f5
i386/debug/libwpd-debuginfo-0.8.9-1.fc6.i386.rpm
ddfced7f9b7f179b4a1d7e71a1fc0ae4b92c2578
i386/libwpd-devel-0.8.9-1.fc6.i386.rpm
fbbdd9387496f1838be01e9e62376bc691474dbb
i386/libwpd-0.8.9-1.fc6.i386.rpm
d835a4ca83ebb234908bbd4129d2ac959f802264
i386/libwpd-tools-0.8.9-1.fc6.i386.rpm
ORIGINAL ADVISORY:
http://fedoranews.org/cms/node/2804
http://fedoranews.org/cms/node/2805
OTHER REFERENCES:
SA24507:
http://secunia.com/advisories/24507/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------