BLAG Forums
It is currently Wed Mar 21, 2018 3:24 am

All times are UTC

Post new topic Reply to topic  [ 1 post ] 
Author Message
PostPosted: Sat Mar 05, 2005 2:26 am 

Joined: Mon Mar 15, 2004 8:17 pm
Posts: 415
Location: ny
Fedora Legacy Update Advisory

Synopsis: Updated abiword resolves security vulnerabilities
Advisory ID: FLSA:1906
Issue date: 2005-02-08
Product: Red Hat Linux
Keywords: Security
Cross references:
CVE Names: CAN-2004-0645

1. Topic:

Updated abiword packages that fix a security vulnerability are now

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386

3. Problem description:

AbiWord is a cross-platform, open-source word processor.

A buffer overflow in the wv library included in abiword allows remote
attackers to execute arbitrary code via a document with a long DateTime

All users are advised to upgrade to these updated packages, which contain a
backported fix and are not vulnerable to this issue.

Fedora Legacy would like to thank Marc Deslauriers for reporting this issue,
and Dave Botsch and Marc Deslauriers and preparing updated RPMs.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. This assumes that you have yum or
apt-get configured for obtaining Fedora Legacy content. Please visit for directions on how to configure yum
and apt-get.

5. Bug IDs fixed: - 1906 - CAN-2004-0645-Abiword wv component buffer

6. RPMs required:

Red Hat Linux 9:

SRPM: ... cy.src.rpm

i386: ... y.i386.rpm

7. Verification:

SHA1 sum Package Name

40ec194cf69f56ee176e6c7bb995a6b34bad5cb2 redhat/9/updates/SRPMS/abiword-1.0.4-5.legacy.src.rpm
fadc8f407110a121ced851d20748c7807f2f71a2 redhat/9/updates/i386/abiword-1.0.4-5.legacy.i386.rpm

These packages are GPG signed by Fedora Legacy for security. Our key is
available from http://www.fedoralegacy org/about/security.php

You can verify each package with the following command:

rpm –checksig -v

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:


8. References: ... tatus=true

Reply with quote  
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 1 post ] 

All times are UTC

Who is online

Users browsing this forum: No registered users and 7 guests

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB® Forum Software © phpBB Group