This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 90b402c337 git-site-role commit from copy_staging.sh
90b402c337 is described below

commit 90b402c33781e86988511721387f1d360a49a17c
Author: jenkins <bui...@apache.org>
AuthorDate: Wed Mar 22 18:34:13 2023 +0000

    git-site-role commit from copy_staging.sh
---
 content/feed.xml                          |   4 +-
 content/fr/download/msg_prop_l10n_fr.js   |   1 +
 content/security/cves/CVE-2022-38745.html | 107 +++++++++++++++++++++++++++++
 content/security/cves/CVE-2022-40674.html |  96 ++++++++++++++++++++++++++
 content/security/cves/CVE-2022-47502.html | 109 ++++++++++++++++++++++++++++++
 content/stats/aoo-downloads.txt           |  35 ++++++++++
 6 files changed, 350 insertions(+), 2 deletions(-)

diff --git a/content/feed.xml b/content/feed.xml
index 2e0c547504..e42f3d16fe 100644
--- a/content/feed.xml
+++ b/content/feed.xml
@@ -6,8 +6,8 @@
     <atom:link href="http://localhost:8820/feed.xml"; rel="self" 
type="application/rss+xml" />
     <description>OpenOffice.org Feed</description>
     <language>en-us</language>
-    <pubDate>Fri, 10 Mar 2023 17:41:30 +0000</pubDate>
-    <lastBuildDate>Fri, 10 Mar 2023 17:41:30 +0000</lastBuildDate>
+    <pubDate>Wed, 22 Mar 2023 18:22:30 +0000</pubDate>
+    <lastBuildDate>Wed, 22 Mar 2023 18:22:30 +0000</lastBuildDate>
     
 
   </channel> 
diff --git a/content/fr/download/msg_prop_l10n_fr.js 
b/content/fr/download/msg_prop_l10n_fr.js
index 7e7af0b663..54dd508b50 100644
--- a/content/fr/download/msg_prop_l10n_fr.js
+++ b/content/fr/download/msg_prop_l10n_fr.js
@@ -359,6 +359,7 @@ l10n.dl_analyze_table_javascript_text               = 
"JavaScript&nbsp;functions/variables";
 
 
 // General: Links to webpage files that could be localized.
+l10n.dl_rel_notes_aoo4114_link                 = 
"https://cwiki.apache.org/confluence/pages/viewpage.action?pageId=247827079";;
 l10n.dl_rel_notes_aoo4113_link                 = 
"https://cwiki.apache.org/confluence/pages/viewpage.action?pageId=217393127";;
 l10n.dl_rel_notes_aoo4112_link                 = 
"https://cwiki.apache.org/confluence/pages/viewpage.action?pageId=211884130";;
 l10n.dl_rel_notes_aoo4111_link                 = 
"https://cwiki.apache.org/confluence/pages/viewpage.action?pageId=191334515";;
diff --git a/content/security/cves/CVE-2022-38745.html 
b/content/security/cves/CVE-2022-38745.html
new file mode 100644
index 0000000000..25ae75a281
--- /dev/null
+++ b/content/security/cves/CVE-2022-38745.html
@@ -0,0 +1,107 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <title>CVE-2022-38745</title>
+  
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+    <div id="content">
+      
+      
+    <p>
+      <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-38745";>CVE-2022-38745</a>
+    </p>
+    <p>
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2022-38745.html";>Apache 
OpenOffice Advisory</a>
+    </p>
+    <p style="text-align:center; font-size:largest">
+      <strong>An empty class path may lead to run arbitrary Java code</strong>
+    </p>
+    <p style="text-align:center; font-size:larger">
+      <strong>Fixed in Apache OpenOffice 4.1.14</strong>
+    </p>
+    <p>
+      <strong>Description</strong>
+    </p>
+    <p>
+     It is possible to configure Apache OpenOffice so that it launches the JVM 
giving an empty class path,
+     that means: "load classes from the current directory". This may lead to 
run arbitrary Java code.
+    </p>
+    <p>
+      <strong>Severity: Moderate</strong>
+    </p>
+    <p>
+      There are no known exploits of this vulnerability.
+      <br />
+      A proof-of-concept demonstration does not exist.
+    </p>
+    <p>
+      Thanks to the reporter for discovering this issue.
+    </p>
+    <p>
+      <strong>Vendor: The Apache Software Foundation</strong>
+    </p>
+    <p>
+      <strong>Versions Affected</strong>
+    </p>
+    <p>
+      All Apache OpenOffice versions 4.1.13 and older are affected.
+      <br />
+      OpenOffice.org versions may also be affected.
+    </p>
+    <p>
+      <strong>Mitigation</strong>
+    </p>
+    <p>
+      Install Apache OpenOffice 4.1.14 for the latest maintenance and 
cumulative security fixes.
+      Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";> download page</a>.
+    </p>
+    <p>
+      <strong>Acknowledgments</strong>
+    </p>
+    <p>
+      The Apache OpenOffice Security Team would like to thank the European 
Commission's Open Source Programme
+      Office for discovering and reporting this attack vector.
+    </p>
+    <p>
+      <strong>Further Information</strong>
+    </p>
+    <p>
+      For additional information and assistance, consult the
+      <a href="https://forum.openoffice.org/";>Apache OpenOffice Community 
Forums</a>
+      or make requests to the
+      <a 
href="mailto:us...@openoffice.apache.org";>us...@openoffice.apache.org</a>
+      public mailing list.
+    </p>
+    <p>
+      The latest information on Apache OpenOffice security bulletins can be 
found at the
+      <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive page</a>.
+    </p>
+    <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2022-38745.html";>CVE-2022-38745</a>
+    </p>
+  
+      
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2022-40674.html 
b/content/security/cves/CVE-2022-40674.html
new file mode 100644
index 0000000000..627c6ab5d0
--- /dev/null
+++ b/content/security/cves/CVE-2022-40674.html
@@ -0,0 +1,96 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <title>CVE-2022-40674</title>
+  
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+    <div id="content">
+      
+      
+    <p>
+      <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-40674";>CVE-2022-40674</a>
+    </p>
+    <p>
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2022-40674.html";>Apache 
OpenOffice Advisory</a>
+    </p>
+    <p style="text-align:center; font-size:largest">
+      <strong>"Use after free" fixed in expat >= 2.4.9</strong>
+    </p>
+    <p style="text-align:center; font-size:larger">
+      <strong>Fixed in Apache OpenOffice 4.1.14</strong>
+    </p>
+    <p>
+      <strong>Description</strong>
+    </p>
+    <p>
+     libexpat before 2.4.9 has a use-after-free in the doContent function in 
xmlparse.c. 
+    </p>
+    <p>
+      <strong>Severity: Moderate</strong>
+    </p>
+    <p>
+      There are no known exploits of this vulnerability.
+      <br />
+      A proof-of-concept demonstration does not exist.
+    </p>
+    <p>
+      <strong>Vendor: The Apache Software Foundation</strong>
+    </p>
+    <p>
+      <strong>Versions Affected</strong>
+    </p>
+    <p>
+      All Apache OpenOffice versions 4.1.13 and older are affected.
+      <br />
+      OpenOffice.org versions may also be affected.
+    </p>
+    <p>
+      <strong>Mitigation</strong>
+    </p>
+    <p>
+      Install Apache OpenOffice 4.1.14 for the latest maintenance and 
cumulative security fixes.
+      Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";> download page</a>.
+    </p>
+    <p>
+      <strong>Further Information</strong>
+    </p>
+    <p>
+      For additional information and assistance, consult the
+      <a href="https://forum.openoffice.org/";>Apache OpenOffice Community 
Forums</a>
+      or make requests to the
+      <a 
href="mailto:us...@openoffice.apache.org";>us...@openoffice.apache.org</a>
+      public mailing list.
+    </p>
+    <p>
+      The latest information on Apache OpenOffice security bulletins can be 
found at the
+      <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive page</a>.
+    </p>
+    <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2022-40674.html";>CVE-2022-40674</a>
+    </p>
+  
+      
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2022-47502.html 
b/content/security/cves/CVE-2022-47502.html
new file mode 100644
index 0000000000..7748308595
--- /dev/null
+++ b/content/security/cves/CVE-2022-47502.html
@@ -0,0 +1,109 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <title>CVE-2022-47502</title>
+  
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+    <div id="content">
+      
+      
+    <p>
+      <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-47502";>CVE-2022-47502</a>
+    </p>
+    <p>
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2022-47502.html";>Apache 
OpenOffice Advisory</a>
+    </p>
+    <p style="text-align:center; font-size:largest">
+      <strong>Macro URL arbitrary script execution without warning</strong>
+    </p>
+    <p style="text-align:center; font-size:larger">
+      <strong>Fixed in Apache OpenOffice 4.1.14</strong>
+    </p>
+    <p>
+      <strong>Description</strong>
+    </p>
+    <p>
+     Apache OpenOffice supports Office URI Schemes to enable browser 
integration of Apache OpenOffice with
+     MS SharePoint server. In the affected versions links could be constructed 
to call internal macros
+     with arbitrary arguments. Which when clicked on, or activated by document 
events, could result in
+     arbitrary script execution without warning.
+    </p>
+    <p>
+      <strong>Severity: Critical</strong>
+    </p>
+    <p>
+      There are no known exploits of this vulnerability.
+      <br />
+      A proof-of-concept demonstration exists.
+    </p>
+    <p>
+      Thanks to the reporter for discovering this issue.
+    </p>
+    <p>
+      <strong>Vendor: The Apache Software Foundation</strong>
+    </p>
+    <p>
+      <strong>Versions Affected</strong>
+    </p>
+    <p>
+      All Apache OpenOffice versions 4.1.13 and older are affected.
+      <br />
+      OpenOffice.org versions may also be affected.
+    </p>
+    <p>
+      <strong>Mitigation</strong>
+    </p>
+    <p>
+      Install Apache OpenOffice 4.1.14 for the latest maintenance and 
cumulative security fixes.
+      Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";> download page</a>.
+    </p>
+    <p>
+      <strong>Acknowledgments</strong>
+    </p>
+    <p>
+      The Apache OpenOffice Security Team would like to thank Altin Thartori 
(tin-z) for discovering and
+      reporting this attack vector.
+    </p>
+    <p>
+      <strong>Further Information</strong>
+    </p>
+    <p>
+      For additional information and assistance, consult the
+      <a href="https://forum.openoffice.org/";>Apache OpenOffice Community 
Forums</a>
+      or make requests to the
+      <a 
href="mailto:us...@openoffice.apache.org";>us...@openoffice.apache.org</a>
+      public mailing list.
+    </p>
+    <p>
+      The latest information on Apache OpenOffice security bulletins can be 
found at the
+      <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive page</a>.
+    </p>
+    <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2022-47502.html";>CVE-2022-47502</a>
+    </p>
+  
+      
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/stats/aoo-downloads.txt b/content/stats/aoo-downloads.txt
index 85a7e7a8db..552efd01b2 100644
--- a/content/stats/aoo-downloads.txt
+++ b/content/stats/aoo-downloads.txt
@@ -3932,3 +3932,38 @@
 2023-02-10,59942,342856098
 2023-02-11,54364,342910462
 2023-02-12,50362,342960824
+2023-02-13,56277,343017101
+2023-02-14,69235,343086336
+2023-02-15,64048,343150384
+2023-02-16,59348,343209732
+2023-02-17,68457,343278189
+2023-02-18,55884,343334073
+2023-02-19,53991,343388064
+2023-02-20,75718,343463782
+2023-02-21,55071,343518853
+2023-02-22,66812,343585665
+2023-02-23,68353,343654018
+2023-02-24,69707,343723725
+2023-02-25,56620,343780345
+2023-02-26,67340,343847685
+2023-02-27,72671,343920356
+2023-02-28,86407,344006763
+2023-03-01,95345,344102108
+2023-03-02,75951,344178059
+2023-03-03,84280,344262339
+2023-03-04,82439,344344778
+2023-03-05,81171,344425949
+2023-03-06,107498,344533447
+2023-03-07,112216,344645663
+2023-03-08,95636,344741299
+2023-03-09,88866,344830165
+2023-03-10,92710,344922875
+2023-03-11,64096,344986971
+2023-03-12,65304,345052275
+2023-03-13,97851,345150126
+2023-03-14,82843,345232969
+2023-03-15,86483,345319452
+2023-03-16,89713,345409165
+2023-03-17,131923,345541088
+2023-03-18,75977,345617065
+2023-03-19,72298,345689363

Reply via email to