This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-staging in repository https://gitbox.apache.org/repos/asf/openoffice-org.git
The following commit(s) were added to refs/heads/asf-staging by this push: new cf1d551 git-site-role commit from build_staging.sh cf1d551 is described below commit cf1d551857dc6e4ec3e3978426411d6f956b4c40 Author: jenkins <bui...@apache.org> AuthorDate: Mon Oct 11 13:52:02 2021 +0000 git-site-role commit from build_staging.sh --- content/feed.xml | 4 +- content/security/bulletin.html | 12 ++-- content/security/cves/CVE-2021-41830.html | 115 ++++++++++++++++++++++++++++++ content/security/cves/CVE-2021-41831.html | 113 +++++++++++++++++++++++++++++ content/security/cves/CVE-2021-41832.html | 113 +++++++++++++++++++++++++++++ 5 files changed, 351 insertions(+), 6 deletions(-) diff --git a/content/feed.xml b/content/feed.xml index 0033a42..0a94ad9 100644 --- a/content/feed.xml +++ b/content/feed.xml @@ -6,8 +6,8 @@ <atom:link href="http://localhost:8820/feed.xml" rel="self" type="application/rss+xml" /> <description>OpenOffice.org Feed</description> <language>en-us</language> - <pubDate>Fri, 8 Oct 2021 20:32:23 +0000</pubDate> - <lastBuildDate>Fri, 8 Oct 2021 20:32:23 +0000</lastBuildDate> + <pubDate>Mon, 11 Oct 2021 13:51:12 +0000</pubDate> + <lastBuildDate>Mon, 11 Oct 2021 13:51:12 +0000</lastBuildDate> </channel> diff --git a/content/security/bulletin.html b/content/security/bulletin.html index 9997849..e628004 100644 --- a/content/security/bulletin.html +++ b/content/security/bulletin.html @@ -40,15 +40,19 @@ <h3>Fixed in Apache OpenOffice 4.1.11</h3> <ul> - <li><a href="cves/CVE-2021-28129.html">CVE-2021-28129</a>: DEB packaging installed with a non-root userid and groupid</li> - <li><a href="cves/CVE-2021-33035.html">CVE-2021-33035</a>: Buffer overflow from a crafted DBF file</li> - <li><a href="cves/CVE-2021-40439.html">CVE-2021-40439</a>: "Billion Laughs" fixed in Expat >=2.4.0</li> + <li><a href="cves/CVE-2021-28129.html">CVE-2021-28129</a>: DEB packaging installed with a non-root userid and groupid</li> + <li><a href="cves/CVE-2021-33035.html">CVE-2021-33035</a>: Buffer overflow from a crafted DBF file</li> + <li><a href="cves/CVE-2021-40439.html">CVE-2021-40439</a>: "Billion Laughs" fixed in Expat >=2.4.0</li> + <li><a href="cves/CVE-2021-41830.html">CVE-2021-41830</a>: #1 Content Manipulation with Certificate Double Attack</li> + <li><a href="cves/CVE-2021-41830.html">CVE-2021-41830</a>: #2 Macro Manipulation with Certificate Double Attack</li> + <li><a href="cves/CVE-2021-41831.html">CVE-2021-41831</a>: #3 Timestamp Manipulation with Signature Wrapping</li> + <li><a href="cves/CVE-2021-41832.html">CVE-2021-41832</a>: #4 Content Manipulation with Certificate Validation Attack</li> </ul> <h3>Fixed in Apache OpenOffice 4.1.10</h3> <ul> - <li><a href="cves/CVE-2021-30245.html">CVE-2021-30245</a>: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks</li> + <li><a href="cves/CVE-2021-30245.html">CVE-2021-30245</a>: Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks</li> </ul> <h3>Fixed in Apache OpenOffice 4.1.8</h3> diff --git a/content/security/cves/CVE-2021-41830.html b/content/security/cves/CVE-2021-41830.html new file mode 100644 index 0000000..639ab09 --- /dev/null +++ b/content/security/cves/CVE-2021-41830.html @@ -0,0 +1,115 @@ + +<!--#include virtual="/doctype.html" --> +<html> + <head> + <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> + + <link href="/css/ooo.css" rel="stylesheet" type="text/css"> + + <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> + <title>CVE-2021-41830</title> + + + <script src="https://www.apachecon.com/event-images/snippet.js"></script> + </head> + <body> + <!--#include virtual="/brand.html" --> + <div id="topbara"> + <!--#include virtual="/topnav.html" --> + <div id="breadcrumbsa"><a href="/">home</a> » <a href="/security/">security</a> » <a href="/security/cves/">cves</a></div> + </div> + <div id="clear"></div> + + + <div id="content"> + + + <p> + <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-41830">CVE-2021-41830</a> + </p> + <p> + <a href="https://www.openoffice.org/security/cves/CVE-2021-41830.html">Apache OpenOffice Advisory</a> + </p> + <p style="text-align:center; font-size:largest"> + <strong>#1 Content Manipulation with Certificate Double Attack</strong> + <br /> + <strong>#2 Macro Manipulation with Certificate Double Attack</strong> + </p> + <p style="text-align:center; font-size:larger"> + <strong>Fixed in Apache OpenOffice 4.1.11</strong> + </p> + <p> + <strong>Description</strong> + </p> + <p> + It is possible for an attacker to manipulate signed documents and macros to appear to come from a trusted source. + <br /> + An attacker can use the vulnerabilities to convert an untrusted digital signature into trusted ones + and change the content of the ODF document without invalidating the signature. + </p> + <p> + <strong>Severity: High</strong> + </p> + <p> + There are no known exploits of this vulnerability. + <br /> + A proof-of-concept demonstration exists. + </p> + <p> + Thanks to the reporter for discovering this issue. + </p> + <p> + <strong>Vendor: The Apache Software Foundation</strong> + </p> + <p> + <strong>Versions Affected</strong> + </p> + <p> + All Apache OpenOffice versions 4.1.10 and older are affected. + <br /> + OpenOffice.org versions may also be affected. + </p> + <p> + <strong>Mitigation</strong> + </p> + <p> + Install Apache OpenOffice 4.1.11 for the latest maintenance and cumulative security fixes. + Use the Apache OpenOffice <a href="https://www.openoffice.org/download/"> download page</a>. + </p> + <p> + <strong>Acknowledgments</strong> + </p> + <p> + The Apache OpenOffice Security Team would like to thank Simon Rohlmann, Vladislav Mladenov, + Christian Mainka and Jörg Schwenk, Ruhr University Bochum, Germany, for discovering and reporting this + attack vector. + </p> + <p> + <strong>Further Information</strong> + </p> + <p> + This issue was also reported to LibreOffice with CVE-2021-25633. + </p> + <p> + For additional information and assistance, consult the + <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a> + or make requests to the + <a href="mailto:us...@openoffice.apache.org">us...@openoffice.apache.org</a> + public mailing list. + </p> + <p> + The latest information on Apache OpenOffice security bulletins can be found at the + <a href="https://www.openoffice.org/security/bulletin.html">Bulletin Archive page</a>. + </p> + <hr /> + <p> + <a href="https://security.openoffice.org">Security Home</a>-> + <a href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>-> + <a href="https://www.openoffice.org/security/cves/CVE-2021-41830.html">CVE-2021-41830</a> + </p> + + + </div> + <!--#include virtual="/footer.html" --> + </body> +</html> diff --git a/content/security/cves/CVE-2021-41831.html b/content/security/cves/CVE-2021-41831.html new file mode 100644 index 0000000..6bfb04f --- /dev/null +++ b/content/security/cves/CVE-2021-41831.html @@ -0,0 +1,113 @@ + +<!--#include virtual="/doctype.html" --> +<html> + <head> + <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> + + <link href="/css/ooo.css" rel="stylesheet" type="text/css"> + + <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> + <title>CVE-2021-41831</title> + + + <script src="https://www.apachecon.com/event-images/snippet.js"></script> + </head> + <body> + <!--#include virtual="/brand.html" --> + <div id="topbara"> + <!--#include virtual="/topnav.html" --> + <div id="breadcrumbsa"><a href="/">home</a> » <a href="/security/">security</a> » <a href="/security/cves/">cves</a></div> + </div> + <div id="clear"></div> + + + <div id="content"> + + + <p> + <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-41831">CVE-2021-41831</a> + </p> + <p> + <a href="https://www.openoffice.org/security/cves/CVE-2021-41831.html">Apache OpenOffice Advisory</a> + </p> + <p style="text-align:center; font-size:largest"> + <strong>#3 Timestamp Manipulation with Signature Wrapping</strong> + </p> + <p style="text-align:center; font-size:larger"> + <strong>Fixed in Apache OpenOffice 4.1.11</strong> + </p> + <p> + <strong>Description</strong> + </p> + <p> + It is possible for an attacker to manipulate the timestamp of signed documents. + <br /> + An attacker can use the vulnerability to convert an untrusted digital signature into trusted ones + and allows the time stamp of the signature to be changed arbitrarily. + </p> + <p> + <strong>Severity: Moderate</strong> + </p> + <p> + There are no known exploits of this vulnerability. + <br /> + A proof-of-concept demonstration exists. + </p> + <p> + Thanks to the reporter for discovering this issue. + </p> + <p> + <strong>Vendor: The Apache Software Foundation</strong> + </p> + <p> + <strong>Versions Affected</strong> + </p> + <p> + All Apache OpenOffice versions 4.1.10 and older are affected. + <br /> + OpenOffice.org versions may also be affected. + </p> + <p> + <strong>Mitigation</strong> + </p> + <p> + Install Apache OpenOffice 4.1.11 for the latest maintenance and cumulative security fixes. + Use the Apache OpenOffice <a href="https://www.openoffice.org/download/"> download page</a>. + </p> + <p> + <strong>Acknowledgments</strong> + </p> + <p> + The Apache OpenOffice Security Team would like to thank Simon Rohlmann, Vladislav Mladenov, + Christian Mainka and Jörg Schwenk, Ruhr University Bochum, Germany, for discovering and reporting this + attack vector. + </p> + <p> + <strong>Further Information</strong> + </p> + <p> + This issue was also reported to LibreOffice with CVE-2021-25634. + </p> + <p> + For additional information and assistance, consult the + <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a> + or make requests to the + <a href="mailto:us...@openoffice.apache.org">us...@openoffice.apache.org</a> + public mailing list. + </p> + <p> + The latest information on Apache OpenOffice security bulletins can be found at the + <a href="https://www.openoffice.org/security/bulletin.html">Bulletin Archive page</a>. + </p> + <hr /> + <p> + <a href="https://security.openoffice.org">Security Home</a>-> + <a href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>-> + <a href="https://www.openoffice.org/security/cves/CVE-2021-41831.html">CVE-2021-41831</a> + </p> + + + </div> + <!--#include virtual="/footer.html" --> + </body> +</html> diff --git a/content/security/cves/CVE-2021-41832.html b/content/security/cves/CVE-2021-41832.html new file mode 100644 index 0000000..027821a --- /dev/null +++ b/content/security/cves/CVE-2021-41832.html @@ -0,0 +1,113 @@ + +<!--#include virtual="/doctype.html" --> +<html> + <head> + <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> + + <link href="/css/ooo.css" rel="stylesheet" type="text/css"> + + <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> + <title>CVE-2021-41832</title> + + + <script src="https://www.apachecon.com/event-images/snippet.js"></script> + </head> + <body> + <!--#include virtual="/brand.html" --> + <div id="topbara"> + <!--#include virtual="/topnav.html" --> + <div id="breadcrumbsa"><a href="/">home</a> » <a href="/security/">security</a> » <a href="/security/cves/">cves</a></div> + </div> + <div id="clear"></div> + + + <div id="content"> + + + <p> + <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-41832">CVE-2021-41832</a> + </p> + <p> + <a href="https://www.openoffice.org/security/cves/CVE-2021-41832.html">Apache OpenOffice Advisory</a> + </p> + <p style="text-align:center; font-size:largest"> + <strong>#4 Content Manipulation with Certificate Validation Attack</strong> + </p> + <p style="text-align:center; font-size:larger"> + <strong>Fixed in Apache OpenOffice 4.1.11</strong> + </p> + <p> + <strong>Description</strong> + </p> + <p> + It is possible for an attacker to manipulate documents to appear to be signed by a trusted source. + <br /> + An attacker can use the vulnerability to convert an untrusted digital signature into trusted ones + and change the content of the ODF document without invalidating the signature. + </p> + <p> + <strong>Severity: Moderate</strong> + </p> + <p> + There are no known exploits of this vulnerability. + <br /> + A proof-of-concept demonstration exists. + </p> + <p> + Thanks to the reporter for discovering this issue. + </p> + <p> + <strong>Vendor: The Apache Software Foundation</strong> + </p> + <p> + <strong>Versions Affected</strong> + </p> + <p> + All Apache OpenOffice versions 4.1.10 and older are affected. + <br /> + OpenOffice.org versions may also be affected. + </p> + <p> + <strong>Mitigation</strong> + </p> + <p> + Install Apache OpenOffice 4.1.11 for the latest maintenance and cumulative security fixes. + Use the Apache OpenOffice <a href="https://www.openoffice.org/download/"> download page</a>. + </p> + <p> + <strong>Acknowledgments</strong> + </p> + <p> + The Apache OpenOffice Security Team would like to thank Simon Rohlmann, Vladislav Mladenov, + Christian Mainka and Jörg Schwenk, Ruhr University Bochum, Germany, for discovering and reporting this + attack vector. + </p> + <p> + <strong>Further Information</strong> + </p> + <p> + This issue was also reported to LibreOffice with CVE-2021-25635. + </p> + <p> + For additional information and assistance, consult the + <a href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a> + or make requests to the + <a href="mailto:us...@openoffice.apache.org">us...@openoffice.apache.org</a> + public mailing list. + </p> + <p> + The latest information on Apache OpenOffice security bulletins can be found at the + <a href="https://www.openoffice.org/security/bulletin.html">Bulletin Archive page</a>. + </p> + <hr /> + <p> + <a href="https://security.openoffice.org">Security Home</a>-> + <a href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>-> + <a href="https://www.openoffice.org/security/cves/CVE-2021-41832.html">CVE-2021-41832</a> + </p> + + + </div> + <!--#include virtual="/footer.html" --> + </body> +</html>