|
Message-ID: <4FC39533.4060909@redhat.com> Date: Mon, 28 May 2012 17:09:39 +0200 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Apache OpenOffice.Org Security Team" <ooo-security@...ubator.apache.org>, LibreOffice Security Team <officesecurity@...ts.freedesktop.org> CC: oss-security@...ts.openwall.com, Florian Weimer <fw@...eb.enyo.de>, Caolán McNamara <caolanm@...hat.com>, David Tardon <dtardon@...hat.com> Subject: Kind request to update upstream CVE-2012-2334 advisories they to reflect arbitrary code execution possibility too and OSS list notification Hello Apache OpenOffice.org, LibreOffice Security Teams, vendors, originally the CVE-2012-2334 security flaw has been described as follows: [1] http://www.openoffice.org/security/cves/CVE-2012-2334.html [2] http://www.libreoffice.org/advisories/cve-2012-2334/ during internal audit of relevant upstream patches: [3] http://cgit.freedesktop.org/libreoffice/core/commit/?id=28a6558f9d3ca2dda3191f8b5b3f2378ee2533da [4] http://cgit.freedesktop.org/libreoffice/core/commit/?id=512401decb286ba0fc3031939b8f7de8649c502e it has been observed by Florian Weimer that the [4] patch also corrected and integer overflow, being present in the SvxMSDffManager::GetFidclData() routine, which might lead under certain circumstances to possibility of arbitrary code execution too. Update CVE-2012-2334 flaw description is at: [5] https://bugzilla.redhat.com/show_bug.cgi?id=821803#c0 This post is intended to serve as kind request to OpenOffice.org and LibreOffice upstream, they to update their corresponding advisories ([1], [2]) to reflect this fact. For what is related against upstream patches -- upon testing we can confirm, the original ones were complete and this is in no way a new security flaw. But something, which got corrected upstream in previous release(s), and should mention possibility of arbitrary code execution too in order to properly describe this deficiency. OpenOffice.org / LibreOffice upstreams - please update your advisories to reflect this if possible yet. OSS vendors, please note this notification (for case you previously categorized fix for the CVE-2012-2334 flaw as something to be postponed due to lower impact). Credit for the discovery should go to: Florian Weimer of Red Hat Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team P.S.: Would you need further background details due this, contact me or Florian off list.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.