---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_vacancies/ Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/ ---------------------------------------------------------------------- TITLE: Fedora update for libwpd SECUNIA ADVISORY ID: SA24573 VERIFY ADVISORY: http://secunia.com/advisories/24573/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ Fedora Core 5 http://secunia.com/product/8808/ DESCRIPTION: Fedora has issued an update for libwpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library. For more information: SA24507 SOLUTION: Apply updated packages. -- Fedora Core 5 -- ac04c855a542713789b012c7c748955902f5e0d5 SRPMS/libwpd-0.8.9-1.fc5.src.rpm ac04c855a542713789b012c7c748955902f5e0d5 noarch/libwpd-0.8.9-1.fc5.src.rpm 1641f2aa79faf2e7d6a1f40889d9cfa86c0d2e16 ppc/libwpd-devel-0.8.9-1.fc5.ppc.rpm 46fe9d4f8f67892b4aafb54561ca86acf14d564e ppc/libwpd-tools-0.8.9-1.fc5.ppc.rpm f60a4342b52c013822bc0757b3c77459bb784b0d ppc/debug/libwpd-debuginfo-0.8.9-1.fc5.ppc.rpm 90b0e534b079e6cc4b9fe9d41ba6ce0dffb34953 ppc/libwpd-0.8.9-1.fc5.ppc.rpm 62c4e9cd4e26c42597702ed40b7b35d2db3eca44 x86_64/debug/libwpd-debuginfo-0.8.9-1.fc5.x86_64.rpm 9f906cbe021f4ecf4df1b08e97895827a1a4c534 x86_64/libwpd-devel-0.8.9-1.fc5.x86_64.rpm c233b7981bb17d98ccc2880657d3b6c46a4cc599 x86_64/libwpd-0.8.9-1.fc5.x86_64.rpm 49be4992c42f05515a450453dec5cafc5afc375c x86_64/libwpd-tools-0.8.9-1.fc5.x86_64.rpm f8c04ab995ad24f8166a130415749f1696e41705 i386/libwpd-devel-0.8.9-1.fc5.i386.rpm c87355919592e7faee65e6feead22bb1f488467a i386/libwpd-tools-0.8.9-1.fc5.i386.rpm 8d328c869a9471fe92501f7c1039fb858a66325b i386/libwpd-0.8.9-1.fc5.i386.rpm cbfb43eb990771b494662032085de34aa5f24d56 i386/debug/libwpd-debuginfo-0.8.9-1.fc5.i386.rpm -- Fedora Core 6 -- c19d2541e88b8056998e24b35787b6fcc0d180b8 SRPMS/libwpd-0.8.9-1.fc6.src.rpm c19d2541e88b8056998e24b35787b6fcc0d180b8 noarch/libwpd-0.8.9-1.fc6.src.rpm 9a62af4f6bdc15e1f86f4994b36d2a5e308ba8cd ppc/libwpd-tools-0.8.9-1.fc6.ppc.rpm 969a4eba1cf413a3dcd67c6922a08a33f3ea9653 ppc/debug/libwpd-debuginfo-0.8.9-1.fc6.ppc.rpm f321d3a10543871abb9da7b3a25b24904c84be3c ppc/libwpd-0.8.9-1.fc6.ppc.rpm 7e6745b9128b0ac3897c2777573d484093d35542 ppc/libwpd-devel-0.8.9-1.fc6.ppc.rpm db32fec3ec0e96954b2d8ae3d45fbbd3dc9c3f3f x86_64/libwpd-0.8.9-1.fc6.x86_64.rpm 200fd78dfb054e2baa86490d911e0d086af18de0 x86_64/libwpd-tools-0.8.9-1.fc6.x86_64.rpm 38824f1a522b860c1cac18c0dd4c0e1a64ff374d x86_64/debug/libwpd-debuginfo-0.8.9-1.fc6.x86_64.rpm 3be810bc0cc4034654171c12909c0e60f116a635 x86_64/libwpd-devel-0.8.9-1.fc6.x86_64.rpm bc601298c43b4c327e1a4899e20878326c9936f5 i386/debug/libwpd-debuginfo-0.8.9-1.fc6.i386.rpm ddfced7f9b7f179b4a1d7e71a1fc0ae4b92c2578 i386/libwpd-devel-0.8.9-1.fc6.i386.rpm fbbdd9387496f1838be01e9e62376bc691474dbb i386/libwpd-0.8.9-1.fc6.i386.rpm d835a4ca83ebb234908bbd4129d2ac959f802264 i386/libwpd-tools-0.8.9-1.fc6.i386.rpm ORIGINAL ADVISORY: http://fedoranews.org/cms/node/2804 http://fedoranews.org/cms/node/2805 OTHER REFERENCES: SA24507: http://secunia.com/advisories/24507/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------