Skip to navigation

Security Advisory Important: libwpd security update

Advisory: RHSA-2007:0055-5
Type: Security Advisory
Severity: Important
Issued on: 2007-03-16
Last updated on: 2007-03-16
Affected Products: RHEL Desktop Workstation (v. 5 client)
RHEL Optional Productivity Applications (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2007-0002
CVE-2007-1466

Details

Updated libwpd packages to correct a security issue are now available for
Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

libwpd is a library for reading and converting Word Perfect documents.

iDefense reported several overflow bugs in libwpd. An attacker could
create a carefully crafted Word Perfect file that could cause an
application linked with libwpd, such as OpenOffice, to crash or possibly
execute arbitrary code if the file was opened by a victim. (CVE-2007-0002)

All users are advised to upgrade to these updated packages, which contain a
backported fix for this issue.

Red Hat would like to thank Fridrich Štrba for alerting us to these issues
and providing a patch.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
libwpd-0.8.7-3.el5.src.rpm
File outdated by:  RHSA-2012:1043
    MD5: c212cfc2bfabec2887bca4cbcf34acdc
SHA-256: 68d5f22caee6d49310032888ee9ea8343a63e09a9555ab1ea3861a407b845fc6
 
IA-32:
libwpd-devel-0.8.7-3.el5.i386.rpm
File outdated by:  RHSA-2012:1043
    MD5: 8cca81259f7c924e8390f842907bf7fd
 
x86_64:
libwpd-devel-0.8.7-3.el5.i386.rpm
File outdated by:  RHSA-2012:1043
    MD5: 8cca81259f7c924e8390f842907bf7fd
libwpd-devel-0.8.7-3.el5.x86_64.rpm
File outdated by:  RHSA-2012:1043
    MD5: b86747cfa48cc2bd000baea86976a279
 
RHEL Optional Productivity Applications (v. 5 server)

SRPMS:
libwpd-0.8.7-3.el5.src.rpm
File outdated by:  RHSA-2012:1043
    MD5: c212cfc2bfabec2887bca4cbcf34acdc
SHA-256: 68d5f22caee6d49310032888ee9ea8343a63e09a9555ab1ea3861a407b845fc6
 
IA-32:
libwpd-0.8.7-3.el5.i386.rpm
File outdated by:  RHSA-2012:1043
    MD5: d7de3bf36ddb16a350408bc72114a687
libwpd-devel-0.8.7-3.el5.i386.rpm
File outdated by:  RHSA-2012:1043
    MD5: 8cca81259f7c924e8390f842907bf7fd
libwpd-tools-0.8.7-3.el5.i386.rpm
File outdated by:  RHSA-2012:1043
    MD5: 12cb995ab0f2ac9086ee7c80452eb10e
 
x86_64:
libwpd-0.8.7-3.el5.i386.rpm
File outdated by:  RHSA-2012:1043
    MD5: d7de3bf36ddb16a350408bc72114a687
libwpd-0.8.7-3.el5.x86_64.rpm
File outdated by:  RHSA-2012:1043
    MD5: 20d519bcc68a56585fdaae42e02ceb20
libwpd-devel-0.8.7-3.el5.i386.rpm
File outdated by:  RHSA-2012:1043
    MD5: 8cca81259f7c924e8390f842907bf7fd
libwpd-devel-0.8.7-3.el5.x86_64.rpm
File outdated by:  RHSA-2012:1043
    MD5: b86747cfa48cc2bd000baea86976a279
libwpd-tools-0.8.7-3.el5.x86_64.rpm
File outdated by:  RHSA-2012:1043
    MD5: d283ebc02dd5a7122bf9160c4dd3a8dd
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
libwpd-0.8.7-3.el5.src.rpm
File outdated by:  RHSA-2012:1043
    MD5: c212cfc2bfabec2887bca4cbcf34acdc
SHA-256: 68d5f22caee6d49310032888ee9ea8343a63e09a9555ab1ea3861a407b845fc6
 
IA-32:
libwpd-0.8.7-3.el5.i386.rpm
File outdated by:  RHSA-2012:1043
    MD5: d7de3bf36ddb16a350408bc72114a687
libwpd-tools-0.8.7-3.el5.i386.rpm
File outdated by:  RHSA-2012:1043
    MD5: 12cb995ab0f2ac9086ee7c80452eb10e
 
x86_64:
libwpd-0.8.7-3.el5.i386.rpm
File outdated by:  RHSA-2012:1043
    MD5: d7de3bf36ddb16a350408bc72114a687
libwpd-0.8.7-3.el5.x86_64.rpm
File outdated by:  RHSA-2012:1043
    MD5: 20d519bcc68a56585fdaae42e02ceb20
libwpd-tools-0.8.7-3.el5.x86_64.rpm
File outdated by:  RHSA-2012:1043
    MD5: d283ebc02dd5a7122bf9160c4dd3a8dd
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

222808 - CVE-2007-0002 buffer overflows


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/