Date: Wed, 8 Mar 2023 01:21:07 GMT From: Don Lewis <truckman@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 4cc9e62c14ec - main - security/vuxml: openoffice 2022 vulnerabilities Message-ID: <202303080121.3281L7Yd056769@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by truckman: URL: https://cgit.FreeBSD.org/ports/commit/?id=4cc9e62c14ec4daaebce7350a190a26c4c387f3f commit 4cc9e62c14ec4daaebce7350a190a26c4c387f3f Author: Don Lewis <truckman@FreeBSD.org> AuthorDate: 2023-03-08 01:17:01 +0000 Commit: Don Lewis <truckman@FreeBSD.org> CommitDate: 2023-03-08 01:17:01 +0000 security/vuxml: openoffice 2022 vulnerabilities Belatedly document Apache OpenOffice vulnerabilities from 2022. The port was broken at the time. --- security/vuxml/vuln/2023.xml | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 2b17919a9eac..62b2600e5c4f 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,37 @@ + <vuln vid="6678211c-bd47-11ed-beb0-1c1b0d9ea7e6"> + <topic>Apache OpenOffice -- master password vulnerabilities</topic> + <affects> + <package> + <name>apache-openoffice</name> + <range><lt>4.1.13</lt></range> + </package> + <package> + <name>apache-openoffice-devel</name> + <range><lt>4.2.1678061694i,4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Apache Openoffice project reports:</p> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-37400"> + <p>Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26306 - LibreOffice</p> + </blockquote> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-37401"> + <p>Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the users stored config. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26307 - LibreOffice</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-37400</cvename> + <cvename>CVE-2022-37401</cvename> + <url>https://cwiki.apache.org/confluence/display/OOOUSERS/AOO+4.1.13+Release+Notes</url> + </references> + <dates> + <discovery>2022-02-25</discovery> + <entry>2023-03-08</entry> + </dates> + </vuln> + <vuln vid="f0798a6a-bbdb-11ed-ba99-080027f5fec9"> <topic>rack -- possible DoS vulnerability in multipart MIME parsing</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202303080121.3281L7Yd056769>