diff options
author | Don Lewis <truckman@FreeBSD.org> | 2021-10-11 18:31:15 +0000 |
---|---|---|
committer | Don Lewis <truckman@FreeBSD.org> | 2021-10-11 18:33:34 +0000 |
commit | 4d5d4cbf1f950e7347f2fbaa4be21da7eae61ac8 (patch) | |
tree | a30a1db2479d87c361bfdf4782d37291b7d4366b | |
parent | 031ab1d1159e3e45be5df1f6a1f2871a51bb1ae7 (diff) |
security/vuxml: update editors/openoffice-{4,devel} latest entry
Add info about three just announced CVEs.
-rw-r--r-- | security/vuxml/vuln-2021.xml | 18 |
1 files changed, 15 insertions, 3 deletions
diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml index 241cf2a61d71..923903ffe18a 100644 --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -61,7 +61,7 @@ </vuln> <vuln vid="04d2cf7f-2942-11ec-b48c-1c1b0d9ea7e6"> - <topic>Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10</topic> + <topic>Apache OpenOffice multiple vulnerabilities. These issues affect Apache OpenOffice up to and including version 4.1.10</topic> <affects> <package> <name>apache-openoffice</name> @@ -74,15 +74,27 @@ </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>The Apache Openofffice project reports:</p> + <p>The Apache Openoffice project reports:</p> <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-33035"> <p>Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10</p> </blockquote> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-41830"> + <p>It is possible for an attacker to manipulate signed documents and macros to appear to come from a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25633 for the LibreOffice advisory </p> + </blockquote> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-41831"> + <p>It is possible for an attacker to manipulate the timestamp of signed documents. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25634 for the LibreOffice advisory.</p> + </blockquote> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-41832"> + <p>It is possible for an attacker to manipulate documents to appear to be signed by a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25635 for the LibreOffice advisory.</p> + </blockquote> </body> </description> <references> <cvename>CVE-2021-33035</cvename> - <url>Ihttps://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-33035</url> + <cvename>CVE-2021-41830</cvename> + <cvename>CVE-2021-41831</cvename> + <cvename>CVE-2021-41832</cvename> + <url>https://cwiki.apache.org/confluence/display/OOOUSERS/AOO+4.1.11+Release+Notes/#AOO4.1.11ReleaseNotes-Security</url> </references> <dates> <discovery>2021-05-04</discovery> |