You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@openoffice.apache.org by ma...@apache.org on 2021/10/11 13:45:28 UTC

[openoffice-org] branch main updated (19a0567 -> 3fb2995)

This is an automated email from the ASF dual-hosted git repository.

marcus pushed a change to branch main
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git.


    from 19a0567  Added Polish Release Notes
     new e5ffb79  Security Bulletin for the Apache OpenOffice 4.1.11 Release
     new 3fb2995  Security Bulletin for the Apache OpenOffice 4.1.11 Release

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 content/security/bulletin.html                     | 12 ++++++----
 .../{CVE-2021-28129.html => CVE-2021-41830.html}   | 28 ++++++++++++++--------
 .../{CVE-2021-28129.html => CVE-2021-41831.html}   | 24 ++++++++++++-------
 .../{CVE-2021-28129.html => CVE-2021-41832.html}   | 24 ++++++++++++-------
 4 files changed, 56 insertions(+), 32 deletions(-)
 copy content/security/cves/{CVE-2021-28129.html => CVE-2021-41830.html} (70%)
 copy content/security/cves/{CVE-2021-28129.html => CVE-2021-41831.html} (74%)
 copy content/security/cves/{CVE-2021-28129.html => CVE-2021-41832.html} (74%)

[openoffice-org] 02/02: Security Bulletin for the Apache OpenOffice 4.1.11 Release

Posted by ma...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

marcus pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git

commit 3fb29953b4dcc398e72f8fd51b0cbbfd211bf1cf
Author: Marcus <ma...@apache.org>
AuthorDate: Mon Oct 11 15:39:46 2021 +0200

    Security Bulletin for the Apache OpenOffice 4.1.11 Release
---
 content/security/bulletin.html | 12 ++++++++----
 1 file changed, 8 insertions(+), 4 deletions(-)

diff --git a/content/security/bulletin.html b/content/security/bulletin.html
index ad121b4..aa5fc83 100644
--- a/content/security/bulletin.html
+++ b/content/security/bulletin.html
@@ -22,15 +22,19 @@
   <h3>Fixed in Apache OpenOffice 4.1.11</h3>
 
   <ul>
-   <li><a href="cves/CVE-2021-28129.html">CVE-2021-28129</a>: DEB packaging installed with a non-root userid and groupid</li>
-   <li><a href="cves/CVE-2021-33035.html">CVE-2021-33035</a>: Buffer overflow from a crafted DBF file</li>
-   <li><a href="cves/CVE-2021-40439.html">CVE-2021-40439</a>: "Billion Laughs" fixed in Expat >=2.4.0</li>
+    <li><a href="cves/CVE-2021-28129.html">CVE-2021-28129</a>: DEB packaging installed with a non-root userid and groupid</li>
+    <li><a href="cves/CVE-2021-33035.html">CVE-2021-33035</a>: Buffer overflow from a crafted DBF file</li>
+    <li><a href="cves/CVE-2021-40439.html">CVE-2021-40439</a>: "Billion Laughs" fixed in Expat >=2.4.0</li>
+    <li><a href="cves/CVE-2021-41830.html">CVE-2021-41830</a>: #1 Content Manipulation with Certificate Double Attack</li>
+    <li><a href="cves/CVE-2021-41830.html">CVE-2021-41830</a>: #2 Macro Manipulation with Certificate Double Attack</li>
+    <li><a href="cves/CVE-2021-41831.html">CVE-2021-41831</a>: #3 Timestamp Manipulation with Signature Wrapping</li>
+    <li><a href="cves/CVE-2021-41832.html">CVE-2021-41832</a>: #4 Content Manipulation with Certificate Validation Attack</li>
   </ul>
 
   <h3>Fixed in Apache OpenOffice 4.1.10</h3>
 
   <ul>
-   <li><a href="cves/CVE-2021-30245.html">CVE-2021-30245</a>: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks</li>
+    <li><a href="cves/CVE-2021-30245.html">CVE-2021-30245</a>: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks</li>
   </ul>
 
   <h3>Fixed in Apache OpenOffice 4.1.8</h3>

[openoffice-org] 01/02: Security Bulletin for the Apache OpenOffice 4.1.11 Release

Posted by ma...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

marcus pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git

commit e5ffb79a26c1395b5d11c3587fe7e0b0d4153bf2
Author: Marcus <ma...@apache.org>
AuthorDate: Mon Oct 11 15:38:50 2021 +0200

    Security Bulletin for the Apache OpenOffice 4.1.11 Release
---
 content/security/cves/CVE-2021-41830.html | 93 +++++++++++++++++++++++++++++++
 content/security/cves/CVE-2021-41831.html | 91 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2021-41832.html | 91 ++++++++++++++++++++++++++++++
 3 files changed, 275 insertions(+)

diff --git a/content/security/cves/CVE-2021-41830.html b/content/security/cves/CVE-2021-41830.html
new file mode 100644
index 0000000..839c00e
--- /dev/null
+++ b/content/security/cves/CVE-2021-41830.html
@@ -0,0 +1,93 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <title>CVE-2021-41830</title>
+  </head>
+
+  <body>
+    <p>
+      <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-41830">CVE-2021-41830</a>
+    </p>
+    <p>
+      <a href="https://www.openoffice.org/security/cves/CVE-2021-41830.html">Apache OpenOffice Advisory</a>
+    </p>
+    <p style="text-align:center; font-size:largest">
+      <strong>#1 Content Manipulation with Certificate Double Attack</strong>
+      <br />
+      <strong>#2 Macro Manipulation with Certificate Double Attack</strong>
+    </p>
+    <p style="text-align:center; font-size:larger">
+      <strong>Fixed in Apache OpenOffice 4.1.11</strong>
+    </p>
+    <p>
+      <strong>Description</strong>
+    </p>
+    <p>
+      It is possible for an attacker to manipulate signed documents and macros to appear to come from a trusted source.
+      <br />
+      An attacker can use the vulnerabilities to convert an untrusted digital signature into trusted ones
+      and change the content of the ODF document without invalidating the signature.
+    </p>
+    <p>
+      <strong>Severity: High</strong>
+    </p>
+    <p>
+      There are no known exploits of this vulnerability.
+      <br />
+      A proof-of-concept demonstration exists.
+    </p>
+    <p>
+      Thanks to the reporter for discovering this issue.
+    </p>
+    <p>
+      <strong>Vendor: The Apache Software Foundation</strong>
+    </p>
+    <p>
+      <strong>Versions Affected</strong>
+    </p>
+    <p>
+      All Apache OpenOffice versions 4.1.10 and older are affected.
+      <br />
+      OpenOffice.org versions may also be affected.
+    </p>
+    <p>
+      <strong>Mitigation</strong>
+    </p>
+    <p>
+      Install Apache OpenOffice 4.1.11 for the latest maintenance and cumulative security fixes.
+      Use the Apache OpenOffice <a href="https://www.openoffice.org/download/"> download page</a>.
+    </p>
+    <p>
+      <strong>Acknowledgments</strong>
+    </p>
+    <p>
+      The Apache OpenOffice Security Team would like to thank Simon Rohlmann, Vladislav Mladenov,
+      Christian Mainka and Jörg Schwenk, Ruhr University Bochum, Germany, for discovering and reporting this
+      attack vector.
+    </p>
+    <p>
+      <strong>Further Information</strong>
+    </p>
+    <p>
+      This issue was also reported to LibreOffice with CVE-2021-25633.
+    </p>
+    <p>
+      For additional information and assistance, consult the
+      <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+      or make requests to the
+      <a href="mailto:users@openoffice.apache.org">users@openoffice.apache.org</a>
+      public mailing list.
+    </p>
+    <p>
+      The latest information on Apache OpenOffice security bulletins can be found at the
+      <a href="https://www.openoffice.org/security/bulletin.html">Bulletin Archive page</a>.
+    </p>
+    <hr />
+    <p>
+      <a href="https://security.openoffice.org">Security Home</a>-&gt;
+      <a href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>-&gt;
+      <a href="https://www.openoffice.org/security/cves/CVE-2021-41830.html">CVE-2021-41830</a>
+    </p>
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2021-41831.html b/content/security/cves/CVE-2021-41831.html
new file mode 100644
index 0000000..36f8655
--- /dev/null
+++ b/content/security/cves/CVE-2021-41831.html
@@ -0,0 +1,91 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <title>CVE-2021-41831</title>
+  </head>
+
+  <body>
+    <p>
+      <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-41831">CVE-2021-41831</a>
+    </p>
+    <p>
+      <a href="https://www.openoffice.org/security/cves/CVE-2021-41831.html">Apache OpenOffice Advisory</a>
+    </p>
+    <p style="text-align:center; font-size:largest">
+      <strong>#3 Timestamp Manipulation with Signature Wrapping</strong>
+    </p>
+    <p style="text-align:center; font-size:larger">
+      <strong>Fixed in Apache OpenOffice 4.1.11</strong>
+    </p>
+    <p>
+      <strong>Description</strong>
+    </p>
+    <p>
+      It is possible for an attacker to manipulate the timestamp of signed documents.
+      <br />
+      An attacker can use the vulnerability to convert an untrusted digital signature into trusted ones
+      and allows the time stamp of the signature to be changed arbitrarily.
+    </p>
+    <p>
+      <strong>Severity: Moderate</strong>
+    </p>
+    <p>
+      There are no known exploits of this vulnerability.
+      <br />
+      A proof-of-concept demonstration exists.
+    </p>
+    <p>
+      Thanks to the reporter for discovering this issue.
+    </p>
+    <p>
+      <strong>Vendor: The Apache Software Foundation</strong>
+    </p>
+    <p>
+      <strong>Versions Affected</strong>
+    </p>
+    <p>
+      All Apache OpenOffice versions 4.1.10 and older are affected.
+      <br />
+      OpenOffice.org versions may also be affected.
+    </p>
+    <p>
+      <strong>Mitigation</strong>
+    </p>
+    <p>
+      Install Apache OpenOffice 4.1.11 for the latest maintenance and cumulative security fixes.
+      Use the Apache OpenOffice <a href="https://www.openoffice.org/download/"> download page</a>.
+    </p>
+    <p>
+      <strong>Acknowledgments</strong>
+    </p>
+    <p>
+      The Apache OpenOffice Security Team would like to thank Simon Rohlmann, Vladislav Mladenov,
+      Christian Mainka and Jörg Schwenk, Ruhr University Bochum, Germany, for discovering and reporting this
+      attack vector.
+    </p>
+    <p>
+      <strong>Further Information</strong>
+    </p>
+    <p>
+      This issue was also reported to LibreOffice with CVE-2021-25634.
+    </p>
+    <p>
+      For additional information and assistance, consult the
+      <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+      or make requests to the
+      <a href="mailto:users@openoffice.apache.org">users@openoffice.apache.org</a>
+      public mailing list.
+    </p>
+    <p>
+      The latest information on Apache OpenOffice security bulletins can be found at the
+      <a href="https://www.openoffice.org/security/bulletin.html">Bulletin Archive page</a>.
+    </p>
+    <hr />
+    <p>
+      <a href="https://security.openoffice.org">Security Home</a>-&gt;
+      <a href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>-&gt;
+      <a href="https://www.openoffice.org/security/cves/CVE-2021-41831.html">CVE-2021-41831</a>
+    </p>
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2021-41832.html b/content/security/cves/CVE-2021-41832.html
new file mode 100644
index 0000000..042577d
--- /dev/null
+++ b/content/security/cves/CVE-2021-41832.html
@@ -0,0 +1,91 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <title>CVE-2021-41832</title>
+  </head>
+
+  <body>
+    <p>
+      <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-41832">CVE-2021-41832</a>
+    </p>
+    <p>
+      <a href="https://www.openoffice.org/security/cves/CVE-2021-41832.html">Apache OpenOffice Advisory</a>
+    </p>
+    <p style="text-align:center; font-size:largest">
+      <strong>#4 Content Manipulation with Certificate Validation Attack</strong>
+    </p>
+    <p style="text-align:center; font-size:larger">
+      <strong>Fixed in Apache OpenOffice 4.1.11</strong>
+    </p>
+    <p>
+      <strong>Description</strong>
+    </p>
+    <p>
+      It is possible for an attacker to manipulate documents to appear to be signed by a trusted source.
+      <br />
+      An attacker can use the vulnerability to convert an untrusted digital signature into trusted ones
+      and change the content of the ODF document without invalidating the signature.
+    </p>
+    <p>
+      <strong>Severity: Moderate</strong>
+    </p>
+    <p>
+      There are no known exploits of this vulnerability.
+      <br />
+      A proof-of-concept demonstration exists.
+    </p>
+    <p>
+      Thanks to the reporter for discovering this issue.
+    </p>
+    <p>
+      <strong>Vendor: The Apache Software Foundation</strong>
+    </p>
+    <p>
+      <strong>Versions Affected</strong>
+    </p>
+    <p>
+      All Apache OpenOffice versions 4.1.10 and older are affected.
+      <br />
+      OpenOffice.org versions may also be affected.
+    </p>
+    <p>
+      <strong>Mitigation</strong>
+    </p>
+    <p>
+      Install Apache OpenOffice 4.1.11 for the latest maintenance and cumulative security fixes.
+      Use the Apache OpenOffice <a href="https://www.openoffice.org/download/"> download page</a>.
+    </p>
+    <p>
+      <strong>Acknowledgments</strong>
+    </p>
+    <p>
+      The Apache OpenOffice Security Team would like to thank Simon Rohlmann, Vladislav Mladenov,
+      Christian Mainka and Jörg Schwenk, Ruhr University Bochum, Germany, for discovering and reporting this
+      attack vector.
+    </p>
+    <p>
+      <strong>Further Information</strong>
+    </p>
+    <p>
+      This issue was also reported to LibreOffice with CVE-2021-25635.
+    </p>
+    <p>
+      For additional information and assistance, consult the
+      <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a>
+      or make requests to the
+      <a href="mailto:users@openoffice.apache.org">users@openoffice.apache.org</a>
+      public mailing list.
+    </p>
+    <p>
+      The latest information on Apache OpenOffice security bulletins can be found at the
+      <a href="https://www.openoffice.org/security/bulletin.html">Bulletin Archive page</a>.
+    </p>
+    <hr />
+    <p>
+      <a href="https://security.openoffice.org">Security Home</a>-&gt;
+      <a href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>-&gt;
+      <a href="https://www.openoffice.org/security/cves/CVE-2021-41832.html">CVE-2021-41832</a>
+    </p>
+  </body>
+</html>