ALT-BU-2021-4283-1
Branch sisyphus update bulletin.
Closed bugs
Обновить до bce91e0854a0ff1d0b2023f1f3a54077a36e3738
Package LibreOffice-still updated to version 7.1.6.2-alt1 for branch sisyphus in task 285147.
Closed vulnerabilities
BDU:2021-04999
Уязвимость пакета офисных программ LibreOffice, связанная с ошибками проверки криптографической подписи, позволяющая нарушителю проводить спуфинг атаки
BDU:2021-05337
Уязвимость пакета офисных программ LibreOffice, связанная с ошибками при формировании документов documentsignatures.xml, macrosignatures.xml, позволяющая нарушителю манипулировать подписанными документами
BDU:2022-05923
Уязвимость пакета офисных программ LibreOffice, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2021-25633
LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to combine multiple certificate data, which when opened caused LibreOffice to display a validly signed indicator but whose content was unrelated to the signature shown. This issue affects: The Document Foundation LibreOffice 7-0 versions prior to 7.0.6; 7-1 versions prior to 7.1.2.
Modified: 2024-11-21
CVE-2021-25634
LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to modify a digitally signed ODF document to insert an additional signing time timestamp which LibreOffice would incorrectly present as a valid signature signed at the bogus signing time. This issue affects: The Document Foundation LibreOffice 7-0 versions prior to 7.0.6; 7-1 versions prior to 7.1.2.
CVE-2021-25635
An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to self sign an ODF document, with a signature untrusted by the target, then modify it to change the signature algorithm to an invalid (or unknown to LibreOffice) algorithm and LibreOffice would incorrectly present such a signature with an unknown algorithm as a valid signature issued by a trusted person This issue affects LibreOffice: from 7.0 before 7.0.5, from 7.1 before 7.1.1.
Closed vulnerabilities
BDU:2021-04420
Уязвимость библиотеки протоколов SPF libspf2, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-20314
Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages.
- https://bugzilla.redhat.com/show_bug.cgi?id=1993070
- https://bugzilla.redhat.com/show_bug.cgi?id=1993070
- FEDORA-2021-aa8637c985
- FEDORA-2021-aa8637c985
- FEDORA-2021-994751581f
- FEDORA-2021-994751581f
- FEDORA-2021-044be3d54e
- FEDORA-2021-044be3d54e
- https://security.gentoo.org/glsa/202401-22
- https://security.gentoo.org/glsa/202401-22
Modified: 2024-11-21
CVE-2021-33912
libspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPF_record_expand_data in spf_expand.c. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- GLSA-202401-22
- GLSA-202401-22
Modified: 2024-11-21
CVE-2021-33913
libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the length of its leftmost label. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- GLSA-202401-22
- GLSA-202401-22