Date: Fri, 23 Feb 2018 22:00:38 +0000 (UTC) From: "Danilo G. Baio" <dbaio@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r462748 - head/security/vuxml Message-ID: <201802232200.w1NM0cen095771@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: dbaio Date: Fri Feb 23 22:00:38 2018 New Revision: 462748 URL: https://svnweb.freebsd.org/changeset/ports/462748 Log: security/vuxml: Document vulnerability in editors/libreoffice Security: CVE-2018-6871 PR: 225797 Submitted by: Vladimir Krstulja <vlad-fbsd@acheronmedia.com> Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Feb 23 21:30:50 2018 (r462747) +++ head/security/vuxml/vuln.xml Fri Feb 23 22:00:38 2018 (r462748) @@ -58,6 +58,46 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="289269f1-0def-11e8-99b0-d017c2987f9a"> + <topic>LibreOffice -- Remote arbitrary file disclosure vulnerability via WEBSERVICE formula</topic> + <affects> + <package> + <name>libreoffice</name> + <range><lt>5.4.5</lt></range> + <range><ge>6.0.0</ge><lt>6.0.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>LibreOffice reports:</p> + <blockquote cite="https://www.libreoffice.org/about-us/security/advisories/cve-2018-1055/"> + <p>LibreOffice Calc supports a WEBSERVICE function to obtain data by URL. + Vulnerable versions of LibreOffice allow WEBSERVICE to take a local file + URL (e.g file://) which can be used to inject local files into the + spreadsheet without warning the user. Subsequent formulas can operate on + that inserted data and construct a remote URL whose path leaks the local + data to a remote attacker.</p> + <p>In later versions of LibreOffice without this flaw, WEBSERVICE has now + been limited to accessing http and https URLs along with bringing + WEBSERVICE URLs under LibreOffice Calc's link management infrastructure.</p> + <p><strong>Note:</strong> This vulnerability has been identified upstream + as CVE-2018-1055, but NVD/Mitre are advising it's a reservation + duplicate of CVE-2018-6871 which should be used instead.</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.libreoffice.org/about-us/security/advisories/cve-2018-1055/</url> + <url>https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure</url> + <cvename>CVE-2018-6871</cvename> + <freebsdpr>ports/225797</freebsdpr> + </references> + <dates> + <discovery>2018-02-09</discovery> + <entry>2018-02-23</entry> + </dates> + </vuln> + <vuln vid="d5b6d151-1887-11e8-94f7-9c5c8e75236a"> <topic>squid -- Vulnerable to Denial of Service attack</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201802232200.w1NM0cen095771>