A use after free vulnerability was found in RTF parser of LibreOffice. The vulnerability lies in the parsing of documents containing both stylesheet and superscript tokens. A specially crafted RTF document containing both a stylesheet and superscript element causes LibreOffice to access an invalid pointer referencing previously used memory on the heap. By carefully manipulating the contents of the heap, this vulnerability can be used to execute arbitrary code. External References: https://www.libreoffice.org/about-us/security/advisories/cve-2016-4324/ http://blog.talosintel.com/2016/06/vulnerability-spotlight-libreoffice-rtf.html
Created libreoffice tracking bugs for this issue: Affects: fedora-23 [bug 1351199]
libreoffice-5.0.6.2-9.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
Upstream patch: https://cgit.freedesktop.org/libreoffice/core/commit/?id=05cc87ce45fad402445c8d748817e386e56148af