This is an automated email from the ASF dual-hosted git repository.
git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git
The following commit(s) were added to refs/heads/asf-site by this push:
new e42d0e5 git-site-role commit from copy_staging.sh
e42d0e5 is described below
commit e42d0e5a6f40550536b9acd441a85a1cf4aa019e
Author: jenkins <[email protected]>
AuthorDate: Thu Oct 7 18:52:59 2021 +0000
git-site-role commit from copy_staging.sh
---
content/feed.xml | 4 +-
content/lt/index.html | 2 +-
content/nl/index.html | 3 +-
content/security/bulletin.html | 16 +++--
content/security/cves/CVE-2021-28129.html | 107 ++++++++++++++++++++++++++++
content/security/cves/CVE-2021-33035.html | 109 ++++++++++++++++++++++++++++
content/security/cves/CVE-2021-40439.html | 114 ++++++++++++++++++++++++++++++
7 files changed, 347 insertions(+), 8 deletions(-)
diff --git a/content/feed.xml b/content/feed.xml
index 38ef83d..e7bdebe 100644
--- a/content/feed.xml
+++ b/content/feed.xml
@@ -6,8 +6,8 @@
<atom:link href="http://localhost:8820/feed.xml" rel="self"
type="application/rss+xml" />
<description>OpenOffice.org Feed</description>
<language>en-us</language>
- <pubDate>Thu, 7 Oct 2021 15:20:18 +0000</pubDate>
- <lastBuildDate>Thu, 7 Oct 2021 15:20:18 +0000</lastBuildDate>
+ <pubDate>Thu, 7 Oct 2021 18:48:53 +0000</pubDate>
+ <lastBuildDate>Thu, 7 Oct 2021 18:48:53 +0000</lastBuildDate>
</channel>
diff --git a/content/lt/index.html b/content/lt/index.html
index f160a35..6478a88 100644
--- a/content/lt/index.html
+++ b/content/lt/index.html
@@ -153,7 +153,7 @@
</p>
</div>
- <<div class="campaign">
+ <div class="campaign">
<h2>Išleistas „Apache OpenOffice“ 4.1.10</h2>
<p><em>2021 m. gegužės 4 d.:</em>
„Apache OpenOffice“ projektas praneša apie ką tik
išėjusią tarnybinę laidą
diff --git a/content/nl/index.html b/content/nl/index.html
index 68c22ca..b85e718 100644
--- a/content/nl/index.html
+++ b/content/nl/index.html
@@ -321,7 +321,8 @@
<div class="campaign">
<h2>Apache OpenOffice 4.1.10 released</h2>
-
+
+ <p>
<em>4 May 2021:</em>
The Apache OpenOffice project announces the
<a
href="https://blogs.apache.org/OOo/entry/announcing-apache-openoffice-4-16"
diff --git a/content/security/bulletin.html b/content/security/bulletin.html
index 6258024..9997849 100644
--- a/content/security/bulletin.html
+++ b/content/security/bulletin.html
@@ -37,29 +37,37 @@
subscribe to our <a href="alerts.html">security-alerts mailing
list</a>.</strong>
</p>
+ <h3>Fixed in Apache OpenOffice 4.1.11</h3>
+
+ <ul>
+ <li><a href="cves/CVE-2021-28129.html">CVE-2021-28129</a>: DEB packaging
installed with a non-root userid and groupid</li>
+ <li><a href="cves/CVE-2021-33035.html">CVE-2021-33035</a>: Buffer overflow
from a crafted DBF file</li>
+ <li><a href="cves/CVE-2021-40439.html">CVE-2021-40439</a>: "Billion Laughs"
fixed in Expat >=2.4.0</li>
+ </ul>
+
<h3>Fixed in Apache OpenOffice 4.1.10</h3>
<ul>
<li><a href="cves/CVE-2021-30245.html">CVE-2021-30245</a>: Code execution
in Apache OpenOffice via non-http(s) schemes in Hyperlinks</li>
- </ul>
+ </ul>
<h3>Fixed in Apache OpenOffice 4.1.8</h3>
<ul>
<li><a href="cves/CVE-2020-13958.html">CVE-2020-13958</a>: Unrestricted
actions leads to arbitrary code execution in crafted documents</li>
- </ul>
+ </ul>
<h3>Fixed in Apache OpenOffice 4.1.7</h3>
<ul>
<li><a href="cves/CVE-2019-9853.html">CVE-2019-9853</a>: Insufficient URL
decoding flaw in categorizing macro location</li>
- </ul>
+ </ul>
<h3>Fixed in Apache OpenOffice 4.1.6</h3>
<ul>
<li><a href="cves/CVE-2018-11790.html">CVE-2018-11790</a>: Arithmetic
overflow and wrap around during string length calculation </li>
- </ul>
+ </ul>
<h3>Fixed in Apache OpenOffice 4.1.5</h3>
diff --git a/content/security/cves/CVE-2021-28129.html
b/content/security/cves/CVE-2021-28129.html
new file mode 100644
index 0000000..36f556f
--- /dev/null
+++ b/content/security/cves/CVE-2021-28129.html
@@ -0,0 +1,107 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+ <head>
+ <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+
+ <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+ <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+ <title>CVE-2021-28129</title>
+
+
+ <script src="https://www.apachecon.com/event-images/snippet.js"></script>
+ </head>
+ <body>
+ <!--#include virtual="/brand.html" -->
+ <div id="topbara">
+ <!--#include virtual="/topnav.html" -->
+ <div id="breadcrumbsa"><a href="/">home</a> » <a
href="/security/">security</a> » <a
href="/security/cves/">cves</a></div>
+ </div>
+ <div id="clear"></div>
+
+
+ <div id="content">
+
+
+ <p>
+ <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-28129">CVE-2021-28129</a>
+ </p>
+ <p>
+ <a
href="https://www.openoffice.org/security/cves/CVE-2021-28129.html">Apache
OpenOffice Advisory</a>
+ </p>
+ <p style="text-align:center; font-size:largest">
+ <strong>CVE-2021-28129 DEB packaging for Apache OpenOffice 4.1.8
installed with a non-root userid and groupid</strong>
+ </p>
+ <p style="text-align:center; font-size:larger">
+ <strong>Fixed in Apache OpenOffice 4.1.11</strong>
+ </p>
+ <p>
+ <strong>Description</strong>
+ </p>
+ <p>
+ While working on Apache OpenOffice 4.1.8 a developer discovered that the
DEB package did not install
+ using root, but instead used a userid and groupid of 500. This both
caused issues with desktop
+ integration and could allow a crafted attack on files owned by that user
or group if they exist.
+ </p>
+ <p>
+ <strong>Severity: Moderate</strong>
+ </p>
+ <p>
+ There are no known exploits of this vulnerability.
+ <br />
+ A proof-of-concept demonstration exists.
+ </p>
+ <p>
+ Thanks to the reporter for discovering this issue.
+ </p>
+ <p>
+ <strong>Vendor: The Apache Software Foundation</strong>
+ </p>
+ <p>
+ <strong>Versions Affected</strong>
+ </p>
+ <p>
+ All Apache OpenOffice versions 4.1.10 and older are affected.
+ <br />
+ OpenOffice.org versions may also be affected.
+ </p>
+ <p>
+ <strong>Mitigation</strong>
+ </p>
+ <p>
+ Install Apache OpenOffice 4.1.11 for the latest maintenance and
cumulative security fixes.
+ Use the Apache OpenOffice <a
href="https://www.openoffice.org/download/"> download page</a>.
+ </p>
+ <p>
+ <strong>Acknowledgments</strong>
+ </p>
+ <p>
+ The Apache OpenOffice Security Team thanks for pointing to this issue.
+ </p>
+ <p>
+ <strong>Further Information</strong>
+ </p>
+ <p>
+ For additional information and assistance, consult the
+ <a href="https://forum.openoffice.org/">Apache OpenOffice Community
Forums</a>
+ or make requests to the
+ <a
href="mailto:[email protected]">[email protected]</a>
+ public mailing list.
+ </p>
+ <p>
+ The latest information on Apache OpenOffice security bulletins can be
found at the
+ <a href="https://www.openoffice.org/security/bulletin.html">Bulletin
Archive page</a>.
+ </p>
+ <hr />
+ <p>
+ <a href="https://security.openoffice.org">Security Home</a>->
+ <a
href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>->
+ <a
href="https://www.openoffice.org/security/cves/CVE-2021-28129.html">CVE-2021-28129</a>
+ </p>
+
+
+ </div>
+ <!--#include virtual="/footer.html" -->
+ </body>
+</html>
diff --git a/content/security/cves/CVE-2021-33035.html
b/content/security/cves/CVE-2021-33035.html
new file mode 100644
index 0000000..0924d65
--- /dev/null
+++ b/content/security/cves/CVE-2021-33035.html
@@ -0,0 +1,109 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+ <head>
+ <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+
+ <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+ <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+ <title>CVE-2021-33035</title>
+
+
+ <script src="https://www.apachecon.com/event-images/snippet.js"></script>
+ </head>
+ <body>
+ <!--#include virtual="/brand.html" -->
+ <div id="topbara">
+ <!--#include virtual="/topnav.html" -->
+ <div id="breadcrumbsa"><a href="/">home</a> » <a
href="/security/">security</a> » <a
href="/security/cves/">cves</a></div>
+ </div>
+ <div id="clear"></div>
+
+
+ <div id="content">
+
+
+ <p>
+ <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-33035">CVE-2021-33035</a>
+ </p>
+ <p>
+ <a
href="https://www.openoffice.org/security/cves/CVE-2021-33035.html">Apache
OpenOffice Advisory</a>
+ </p>
+ <p style="text-align:center; font-size:largest">
+ <strong>CVE-2021-33035 Buffer overflow from a crafted DBF file</strong>
+ </p>
+ <p style="text-align:center; font-size:larger">
+ <strong>Fixed in Apache OpenOffice 4.1.11</strong>
+ </p>
+ <p>
+ <strong>Description</strong>
+ </p>
+ <p>
+ Apache OpenOffice opens dBase/DBF documents and shows the contents as
spreadsheets. DBF are database
+ files with data organized in fields. When reading DBF data the size of
certain fields is not checked:
+ the data is just copied into local variables. A carefully crafted
document could overflow the allocated
+ space, leading to the execution of arbitrary code by altering the
contents of the program stack.
+ </p>
+ <p>
+ <strong>Severity: Moderate</strong>
+ </p>
+ <p>
+ There are no known exploits of this vulnerability.
+ <br />
+ A proof-of-concept demonstration exists.
+ </p>
+ <p>
+ Thanks to the reporter for discovering this issue.
+ </p>
+ <p>
+ <strong>Vendor: The Apache Software Foundation</strong>
+ </p>
+ <p>
+ <strong>Versions Affected</strong>
+ </p>
+ <p>
+ All Apache OpenOffice versions 4.1.10 and older are affected.
+ <br />
+ OpenOffice.org versions may also be affected.
+ </p>
+ <p>
+ <strong>Mitigation</strong>
+ </p>
+ <p>
+ Install Apache OpenOffice 4.1.11 for the latest maintenance and
cumulative security fixes.
+ Use the Apache OpenOffice <a
href="https://www.openoffice.org/download/"> download page</a>.
+ </p>
+ <p>
+ <strong>Acknowledgments</strong>
+ </p>
+ <p>
+ The Apache OpenOffice Security Team would like to thank Eugene Lim,
Government Technology
+ Agency of Singapore, for discovering and reporting this attack vector.
+ </p>
+ <p>
+ <strong>Further Information</strong>
+ </p>
+ <p>
+ For additional information and assistance, consult the
+ <a href="https://forum.openoffice.org/">Apache OpenOffice Community
Forums</a>
+ or make requests to the
+ <a
href="mailto:[email protected]">[email protected]</a>
+ public mailing list.
+ </p>
+ <p>
+ The latest information on Apache OpenOffice security bulletins can be
found at the
+ <a href="https://www.openoffice.org/security/bulletin.html">Bulletin
Archive page</a>.
+ </p>
+ <hr />
+ <p>
+ <a href="https://security.openoffice.org">Security Home</a>->
+ <a
href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>->
+ <a
href="https://www.openoffice.org/security/cves/CVE-2021-33035.html">CVE-2021-33035</a>
+ </p>
+
+
+ </div>
+ <!--#include virtual="/footer.html" -->
+ </body>
+</html>
diff --git a/content/security/cves/CVE-2021-40439.html
b/content/security/cves/CVE-2021-40439.html
new file mode 100644
index 0000000..36d3b48
--- /dev/null
+++ b/content/security/cves/CVE-2021-40439.html
@@ -0,0 +1,114 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+ <head>
+ <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+
+ <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+
+ <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+ <title>CVE-2021-40439</title>
+
+
+ <script src="https://www.apachecon.com/event-images/snippet.js"></script>
+ </head>
+ <body>
+ <!--#include virtual="/brand.html" -->
+ <div id="topbara">
+ <!--#include virtual="/topnav.html" -->
+ <div id="breadcrumbsa"><a href="/">home</a> » <a
href="/security/">security</a> » <a
href="/security/cves/">cves</a></div>
+ </div>
+ <div id="clear"></div>
+
+
+ <div id="content">
+
+
+ <p>
+ <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-40439">CVE-2021-40439</a>
+ </p>
+ <p>
+ <a
href="https://www.openoffice.org/security/cves/CVE-2021-40439.html">Apache
OpenOffice Advisory</a>
+ </p>
+ <p style="text-align:center; font-size:largest">
+ <strong>CVE-2021-40439 "Billion Laughs" fixed in Expat >=2.4.0</strong>
+ </p>
+ <p style="text-align:center; font-size:larger">
+ <strong>Fixed in Apache OpenOffice 4.1.11</strong>
+ </p>
+ <p>
+ <strong>Description</strong>
+ </p>
+ <p>
+ Apache OpenOffice has a dependency on expat software. Versions prior to
2.1.0 were subject to
+ CVE-2013-0340 a "Billion Laughs" entity expansion denial of service
attack and exploit via crafted
+ XML files. ODF files consist of a set of XML files.
+ expat 2.1.0 and earlier does not properly handle entities expansion
unless an application developer
+ uses the XML_SetEntityDeclHandler function, which allows remote
attackers to cause a denial of service
+ (resource consumption), send HTTP requests to intranet servers, or read
arbitrary files via a crafted
+ XML document, aka an XML External Entity (XXE) issue.
+ <br />
+ expat is a 3rd party library that is used in the Apache OpenOffice build
process to make use of its
+ functions.
+ </p>
+ <p>
+ <strong>Severity: Moderate</strong>
+ </p>
+ <p>
+ There are no known exploits of this vulnerability.
+ <br />
+ A proof-of-concept demonstration exists.
+ </p>
+ <p>
+ Thanks to the reporter for discovering this issue
+ </p>
+ <p>
+ <strong>Vendor: The Apache Software Foundation</strong>
+ </p>
+ <p>
+ <strong>Versions Affected</strong>
+ </p>
+ <p>
+ All Apache OpenOffice versions 4.1.10 and older are affected.
+ <br />
+ OpenOffice.org versions may also be affected.
+ </p>
+ <p>
+ <strong>Mitigation</strong>
+ </p>
+ <p>
+ Install Apache OpenOffice 4.1.11 for the latest maintenance and
cumulative security fixes.
+ Use the Apache OpenOffice <a
href="https://www.openoffice.org/download/"> download page</a>.
+ </p>
+ <p>
+ <strong>Acknowledgments</strong>
+ </p>
+ <p>
+ The Apache OpenOffice Security Team thanks for pointing to this issue.
+ </p>
+ <p>
+ <strong>Further Information</strong>
+ </p>
+ <p>
+ For additional information and assistance, consult the
+ <a href="https://forum.openoffice.org/">Apache OpenOffice Community
Forums</a>
+ or make requests to the
+ <a
href="mailto:[email protected]">[email protected]</a>
+ public mailing list.
+ </p>
+ <p>
+ The latest information on Apache OpenOffice security bulletins can be
found at the
+ <a href="https://www.openoffice.org/security/bulletin.html">Bulletin
Archive page</a>.
+ </p>
+ <hr />
+ <p>
+ <a href="https://security.openoffice.org">Security Home</a>->
+ <a
href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>->
+ <a
href="https://www.openoffice.org/security/cves/CVE-2021-40439.html">CVE-2021-40439</a>
+ </p>
+
+
+ </div>
+ <!--#include virtual="/footer.html" -->
+ </body>
+</html>