This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 4e4ec62b1f git-site-role commit from build_staging.sh
4e4ec62b1f is described below

commit 4e4ec62b1f507d2ccf5bd6d6af14a4a60fccf5a4
Author: jenkins <bui...@apache.org>
AuthorDate: Thu Dec 28 13:54:50 2023 +0000

    git-site-role commit from build_staging.sh
---
 content/feed.xml                          |   4 +-
 content/security/bulletin.html            |   9 +++
 content/security/cves/CVE-2012-5639.html  | 108 ++++++++++++++++++++++++++++
 content/security/cves/CVE-2022-43680.html | 107 ++++++++++++++++++++++++++++
 content/security/cves/CVE-2023-1183.html  | 111 +++++++++++++++++++++++++++++
 content/security/cves/CVE-2023-47804.html | 113 ++++++++++++++++++++++++++++++
 6 files changed, 450 insertions(+), 2 deletions(-)

diff --git a/content/feed.xml b/content/feed.xml
index e5f6902ca1..65a4785ca5 100644
--- a/content/feed.xml
+++ b/content/feed.xml
@@ -6,8 +6,8 @@
     <atom:link href="http://localhost:8820/feed.xml"; rel="self" 
type="application/rss+xml" />
     <description>OpenOffice.org Feed</description>
     <language>en-us</language>
-    <pubDate>Thu, 28 Dec 2023 09:28:31 +0000</pubDate>
-    <lastBuildDate>Thu, 28 Dec 2023 09:28:31 +0000</lastBuildDate>
+    <pubDate>Thu, 28 Dec 2023 13:48:40 +0000</pubDate>
+    <lastBuildDate>Thu, 28 Dec 2023 13:48:40 +0000</lastBuildDate>
     
 
   </channel> 
diff --git a/content/security/bulletin.html b/content/security/bulletin.html
index c9de32a00b..627c87062b 100644
--- a/content/security/bulletin.html
+++ b/content/security/bulletin.html
@@ -38,6 +38,15 @@
     subscribe to our <a href="alerts.html">security-alerts mailing 
list</a>.</strong>
   </p>
 
+  <h3>Fixed in Apache OpenOffice 4.1.15</h3>
+
+  <ul>
+    <li><a href="cves/CVE-2012-5639.html">CVE-2012-5639</a>: Loading internal 
/ external resource without warning.</li>
+    <li><a href="cves/CVE-2022-43680.html">CVE-2022-43680</a>: "Use after 
free" fixed in expat >= 2.4.9</li>
+    <li><a href="cves/CVE-2023-1183.html">CVE-2023-1183</a>: Arbitrary file 
write in Base</li>
+    <li><a href="cves/CVE-2023-47804.html">CVE-2023-47804</a>: Macro URL 
arbitrary script execution</li>
+  </ul>
+
   <h3>Fixed in Apache OpenOffice 4.1.14</h3>
 
   <ul>
diff --git a/content/security/cves/CVE-2012-5639.html 
b/content/security/cves/CVE-2012-5639.html
new file mode 100644
index 0000000000..cc4f71e9cb
--- /dev/null
+++ b/content/security/cves/CVE-2012-5639.html
@@ -0,0 +1,108 @@
+
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <title>CVE-2012-5639</title>
+  
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+    <div id="content">
+      
+      
+    <p>
+      <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-5639";>CVE-2012-5639</a>
+    </p>
+    <p>
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2012-5639.html";>Apache 
OpenOffice Advisory</a>
+    </p>
+    <p style="text-align:center; font-size:largest">
+      <strong>Loading internal / external resources without warning</strong>
+    </p>
+    <p style="text-align:center; font-size:larger">
+      <strong>Fixed in Apache OpenOffice 4.1.15</strong>
+    </p>
+    <p>
+      <strong>Description</strong>
+    </p>
+    <p>
+     In Apache OpenOffice and LibreOffice embedded content will be opened 
automatically without
+     that a warning is shown.
+    </p>
+    <p>
+      <strong>Severity: Moderate</strong>
+    </p>
+    <p>
+      There are no known exploits of this vulnerability.
+      <br />
+      A proof-of-concept demonstration exists.
+    </p>
+    <p>
+      Thanks to the reporter for discovering this issue.
+    </p>
+    <p>
+      <strong>Vendor: The Apache Software Foundation</strong>
+    </p>
+    <p>
+      <strong>Versions Affected</strong>
+    </p>
+    <p>
+      All Apache OpenOffice versions 4.1.14 and older are affected.
+      <br />
+      OpenOffice.org versions may also be affected.
+    </p>
+    <p>
+      <strong>Mitigation</strong>
+    </p>
+    <p>
+      Install Apache OpenOffice 4.1.15 for the latest maintenance and 
cumulative security fixes.
+      Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";> download page</a>.
+    </p>
+    <p>
+      <strong>Acknowledgments</strong>
+    </p>
+    <p>
+      The Apache OpenOffice Security Team would like to thank Timo Warns and
+      Joachim Mammele for discovering and reporting this attack vector.
+    </p>
+    <p>
+      <strong>Further Information</strong>
+    </p>
+    <p>
+      For additional information and assistance, consult the
+      <a href="https://forum.openoffice.org/";>Apache OpenOffice Community 
Forums</a>
+      or make requests to the
+      <a 
href="mailto:us...@openoffice.apache.org";>us...@openoffice.apache.org</a>
+      public mailing list.
+    </p>
+    <p>
+      The latest information on Apache OpenOffice security bulletins can be 
found at the
+      <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive page</a>.
+    </p>
+    <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2022-47502.html";>CVE-2012-5639</a>
+    </p>
+  
+      
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2022-43680.html 
b/content/security/cves/CVE-2022-43680.html
new file mode 100644
index 0000000000..0c275dc715
--- /dev/null
+++ b/content/security/cves/CVE-2022-43680.html
@@ -0,0 +1,107 @@
+
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <title>CVE-2022-43680</title>
+  
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+    <div id="content">
+      
+      
+    <p>
+      <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-43680";>CVE-2022-43680</a>
+    </p>
+    <p>
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2022-43680.html";>Apache 
OpenOffice Advisory</a>
+    </p>
+    <p style="text-align:center; font-size:largest">
+      <strong>Use-after free" fixed in expat >= 2.4.9</strong>
+    </p>
+    <p style="text-align:center; font-size:larger">
+      <strong>Fixed in Apache OpenOffice 4.1.15</strong>
+    </p>
+    <p>
+      <strong>Description</strong>
+    </p>
+    <p>
+     In libexpat through 2.4.9, there is a use-after free caused by overeager 
destruction of a shared DTD
+     in XML_ExternalEntityParserCreate in out-of-memory situations.
+    </p>
+    <p>
+      <strong>Severity: Moderate</strong>
+    </p>
+    <p>
+      There are no known exploits of this vulnerability.
+      <br />
+      A proof-of-concept demonstration does not exist.
+    </p>
+    <p>
+      Thanks to the reporter for discovering this issue.
+    </p>
+    <p>
+      <strong>Vendor: The Apache Software Foundation</strong>
+    </p>
+    <p>
+      <strong>Versions Affected</strong>
+    </p>
+    <p>
+      All Apache OpenOffice versions 4.1.14 and older are affected.
+      <br />
+      OpenOffice.org versions may also be affected.
+    </p>
+    <p>
+      <strong>Mitigation</strong>
+    </p>
+    <p>
+      Install Apache OpenOffice 4.1.15 for the latest maintenance and 
cumulative security fixes.
+      Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";> download page</a>.
+    </p>
+    <p>
+      <strong>Acknowledgments</strong>
+    </p>
+    <p>
+      n/a
+    </p>
+    <p>
+      <strong>Further Information</strong>
+    </p>
+    <p>
+      For additional information and assistance, consult the
+      <a href="https://forum.openoffice.org/";>Apache OpenOffice Community 
Forums</a>
+      or make requests to the
+      <a 
href="mailto:us...@openoffice.apache.org";>us...@openoffice.apache.org</a>
+      public mailing list.
+    </p>
+    <p>
+      The latest information on Apache OpenOffice security bulletins can be 
found at the
+      <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive page</a>.
+    </p>
+    <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2022-43680.html";>CVE-2022-43680</a>
+    </p>
+  
+      
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2023-1183.html 
b/content/security/cves/CVE-2023-1183.html
new file mode 100644
index 0000000000..3df6eaef33
--- /dev/null
+++ b/content/security/cves/CVE-2023-1183.html
@@ -0,0 +1,111 @@
+
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <title>CVE-2023-1183</title>
+  
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+    <div id="content">
+      
+      
+    <p>
+      <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-1183";>CVE-2023-1183</a>
+    </p>
+    <p>
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2023-1183.html";>Apache 
OpenOffice Advisory</a>
+    </p>
+    <p style="text-align:center; font-size:largest">
+      <strong>Arbitrary file write in Apache OpenOffice Base</strong>
+    </p>
+    <p style="text-align:center; font-size:larger">
+      <strong>Fixed in Apache OpenOffice 4.1.15</strong>
+    </p>
+    <p>
+      <strong>Description</strong>
+    </p>
+    <p>
+     An attacker can craft an OBD containing a "database/script" file with a 
SCRIPT command where
+     the contents of the file could be written to a new file whose location 
was determined by the
+     attacker.
+    </p>
+    <p>
+      <strong>Severity: Moderate</strong>
+    </p>
+    <p>
+      There are no known exploits of this vulnerability.
+      <br />
+      A proof-of-concept demonstration exists.
+    </p>
+    <p>
+      Thanks to the reporter for discovering this issue.
+    </p>
+    <p>
+      <strong>Vendor: The Apache Software Foundation</strong>
+    </p>
+    <p>
+      <strong>Versions Affected</strong>
+    </p>
+    <p>
+      All Apache OpenOffice versions 4.1.14 and older are affected.
+      <br />
+      OpenOffice.org versions may also be affected.
+    </p>
+    <p>
+      <strong>Mitigation</strong>
+    </p>
+    <p>
+      Install Apache OpenOffice 4.1.15 for the latest maintenance and 
cumulative security fixes.
+      Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";> download page</a>.
+    </p>
+    <p>
+      <strong>Acknowledgments</strong>
+    </p>
+    <p>
+      The Apache OpenOffice Security Team would like to thank Gregor Kopf of 
Secfault Security
+      GmbH (Germany) for discovering and reporting this attack vector and Fred 
Toussi for kindly
+      providing a solution to this issue within HSQLDB.
+
+    </p>
+    <p>
+      <strong>Further Information</strong>
+    </p>
+    <p>
+      For additional information and assistance, consult the
+      <a href="https://forum.openoffice.org/";>Apache OpenOffice Community 
Forums</a>
+      or make requests to the
+      <a 
href="mailto:us...@openoffice.apache.org";>us...@openoffice.apache.org</a>
+      public mailing list.
+    </p>
+    <p>
+      The latest information on Apache OpenOffice security bulletins can be 
found at the
+      <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive page</a>.
+    </p>
+    <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2023-1183.html";>2023-1183</a>
+    </p>
+  
+      
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2023-47804.html 
b/content/security/cves/CVE-2023-47804.html
new file mode 100644
index 0000000000..ba7a509464
--- /dev/null
+++ b/content/security/cves/CVE-2023-47804.html
@@ -0,0 +1,113 @@
+
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
+    <title>CVE-2023-47804</title>
+  
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+    <div id="content">
+      
+      
+    <p>
+      <a 
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-47804";>CVE-2023-47804</a>
+    </p>
+    <p>
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2023-47804.html";>Apache 
OpenOffice Advisory</a>
+    </p>
+    <p style="text-align:center; font-size:largest">
+      <strong>Macro URL arbitrary script execution</strong>
+    </p>
+    <p style="text-align:center; font-size:larger">
+      <strong>Fixed in Apache OpenOffice 4.1.15</strong>
+    </p>
+    <p>
+      <strong>Description</strong>
+    </p>
+    <p>
+     Apache OpenOffice documents can contain links that call internal macros 
with arbitrary
+     arguments. Several URI Schemes are defined for this purpose. Links can be 
activated by
+     clicks, or by automatic document events. The execution of such links must 
be subject to
+     user approval. In the affected versions of Apache OpenOffice, approval 
for certain links
+     is not requested; when activated, such links could therefore result in 
arbitrary script
+     execution. This is a corner case of
+     <a 
href="https://www.openoffice.org/security/cves/CVE-2022-47502.html";>2022-47502</a>.
+    </p>
+    <p>
+      <strong>Severity: Moderate</strong>
+    </p>
+    <p>
+      There are no known exploits of this vulnerability.
+      <br />
+      A proof-of-concept demonstration exists.
+    </p>
+    <p>
+      Thanks to the reporter for discovering this issue.
+    </p>
+    <p>
+      <strong>Vendor: The Apache Software Foundation</strong>
+    </p>
+    <p>
+      <strong>Versions Affected</strong>
+    </p>
+    <p>
+      All Apache OpenOffice versions 4.1.14 and older are affected.
+      <br />
+      OpenOffice.org versions may also be affected.
+    </p>
+    <p>
+      <strong>Mitigation</strong>
+    </p>
+    <p>
+      Install Apache OpenOffice 4.1.15 for the latest maintenance and 
cumulative security fixes.
+      Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";> download page</a>.
+    </p>
+    <p>
+      <strong>Acknowledgments</strong>
+    </p>
+    <p>
+      The Apache OpenOffice Security Team would like to thank Amel BOUZIANE- 
LEBLOND (aka Icare
+      Bug Bounty Hunter) for discovering and reporting this attack vector.
+    </p>
+    <p>
+      <strong>Further Information</strong>
+    </p>
+    <p>
+      For additional information and assistance, consult the
+      <a href="https://forum.openoffice.org/";>Apache OpenOffice Community 
Forums</a>
+      or make requests to the
+      <a 
href="mailto:us...@openoffice.apache.org";>us...@openoffice.apache.org</a>
+      public mailing list.
+    </p>
+    <p>
+      The latest information on Apache OpenOffice security bulletins can be 
found at the
+      <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive page</a>.
+    </p>
+    <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2023-47804.html";>2023-47804</a>
+    </p>
+  
+      
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>

Reply via email to