This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-site in repository https://gitbox.apache.org/repos/asf/openoffice-org.git
The following commit(s) were added to refs/heads/asf-site by this push: new e69e023486 git-site-role commit from copy_staging.sh e69e023486 is described below commit e69e0234861648a7abcc2ee7133e83b404f735c8 Author: jenkins <bui...@apache.org> AuthorDate: Fri Mar 24 15:03:49 2023 +0000 git-site-role commit from copy_staging.sh --- content/feed.xml | 4 ++-- content/security/bulletin.html | 8 ++++++++ content/security/cves/CVE-2022-38745.html | 4 ++-- content/security/cves/CVE-2022-47502.html | 9 +++++---- 4 files changed, 17 insertions(+), 8 deletions(-) diff --git a/content/feed.xml b/content/feed.xml index e42f3d16fe..4118fad351 100644 --- a/content/feed.xml +++ b/content/feed.xml @@ -6,8 +6,8 @@ <atom:link href="http://localhost:8820/feed.xml" rel="self" type="application/rss+xml" /> <description>OpenOffice.org Feed</description> <language>en-us</language> - <pubDate>Wed, 22 Mar 2023 18:22:30 +0000</pubDate> - <lastBuildDate>Wed, 22 Mar 2023 18:22:30 +0000</lastBuildDate> + <pubDate>Fri, 24 Mar 2023 14:52:30 +0000</pubDate> + <lastBuildDate>Fri, 24 Mar 2023 14:52:30 +0000</lastBuildDate> </channel> diff --git a/content/security/bulletin.html b/content/security/bulletin.html index 38c0d9cb3c..b1442e941e 100644 --- a/content/security/bulletin.html +++ b/content/security/bulletin.html @@ -37,6 +37,14 @@ subscribe to our <a href="alerts.html">security-alerts mailing list</a>.</strong> </p> + <h3>Fixed in Apache OpenOffice 4.1.14</h3> + + <ul> + <li><a href="cves/CVE-2022-38745.html">CVE-2022-38745</a>: An empty class path may lead to run arbitrary Java code</li> + <li><a href="cves/CVE-2022-40674.html">CVE-2022-40674</a>: "Use after free" fixed in expat >= 2.4.9</li> + <li><a href="cves/CVE-2022-47502.html">CVE-2022-47502</a>: Macro URL arbitrary script execution without warning</li> + </ul> + <h3>Fixed in Apache OpenOffice 4.1.13</h3> <ul> diff --git a/content/security/cves/CVE-2022-38745.html b/content/security/cves/CVE-2022-38745.html index 25ae75a281..1bfe15c484 100644 --- a/content/security/cves/CVE-2022-38745.html +++ b/content/security/cves/CVE-2022-38745.html @@ -40,8 +40,8 @@ <strong>Description</strong> </p> <p> - It is possible to configure Apache OpenOffice so that it launches the JVM giving an empty class path, - that means: "load classes from the current directory". This may lead to run arbitrary Java code. + Apache OpenOffice versions before 4.1.14 may be configured to add an empty entry to the Java class path. + This may lead to run arbitrary Java code from the current directory. </p> <p> <strong>Severity: Moderate</strong> diff --git a/content/security/cves/CVE-2022-47502.html b/content/security/cves/CVE-2022-47502.html index 7748308595..45a2eadf93 100644 --- a/content/security/cves/CVE-2022-47502.html +++ b/content/security/cves/CVE-2022-47502.html @@ -40,10 +40,11 @@ <strong>Description</strong> </p> <p> - Apache OpenOffice supports Office URI Schemes to enable browser integration of Apache OpenOffice with - MS SharePoint server. In the affected versions links could be constructed to call internal macros - with arbitrary arguments. Which when clicked on, or activated by document events, could result in - arbitrary script execution without warning. + Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. + Several URI Schemes are defined for this purpose.Links can be activated by clicks, or by automatic + document events. The execution of such links must be subject to user approval. In the affected + versions of OpenOffice, approval for certain links is not requested; when activated, such links could + therefore result in arbitrary script execution. </p> <p> <strong>Severity: Critical</strong>