incubator-ooo-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Ariel Constenla-Haile <>
Subject Re: CVE-2012-0037: data leakage vulnerability
Date Mon, 23 Apr 2012 21:00:59 GMT

Hi Gary, *,

a little background: I'm the one who is currently building the RC Linux

On Mon, Apr 23, 2012 at 11:58:36AM -0700, NoOp wrote:
> On 04/22/2012 05:36 AM, Dennis E. Hamilton wrote:
> > Although free-standing Linux patches remain unavailable for
> > pre-Apache OpenOffice distributions, a platform distribution
> > containing the repair has appeared.
> > 
> > Here is how the Mandriva update was announced: 
> > <>.
> >
> >  Mandriva issued patched versions of their supported distributions
> > for, LibreOffice, and the common library that is the
> > source of the vulnerability.  There are separate Mandriva advisories
> > for each.
> > 
> > - Dennis
> ...
> Good for them. They distributed those versions of OOo & have taken a
> responsible action. Just as Mandriva distributed those versions to
> users, OOo (now AOO) distributed 3.3 and 3.4 Beta (and
> earlier), on all platforms:the ones with the existing vulnerability.
> AOO continue to distribute 3.3.0, (3.2.1, 3.2.0 for some languages):
> So we must assume that *all* of those versions on that page have been
> patched... 

AFAIK Windows and MacOS versions are not patched.

> otherwise AOO continue to provide packages with a 'important'
> security vulnerability. Based on that 'assumption', I'll download &
> reinstall 3.3.0 from that page & reinstall over my existing OOo 3.3.0
> (deb, rmp, and Windows) versions. I'll then have a fully patched 3.3.0
> version... right? If that is not the case, then I suggest that AOO
> either pull those versions that have not been patched, or at the very
> least provide a strong warning that the code has an 'important' security
> vulnerability, on the download pages:
> and any other place where the program can be downloaded from directly
> (i.e., SF).
> A "responsible" distributor of such code might take a hint from:
> "Java SE 6 Update 31
> This release includes security fixes. Learn more"
> and only provide unpatched code in a different location, with a warning:
> "WARNING: These older versions of the JRE and JDK are provided to help
> developers debug issues in older systems. They are not updated with the
> latest security patches and are not recommended for use in production."

Warning: I did little testing on the following, so backup the library
(and your data) before doing your own tests.

AFAIK the solution is rather simple, because the library with the
vulnerability is a UNO component, so it uses stable interfaces: you can
simply copy the library from the AOO RC1 in your OOo 3.3 installation.
The library is /opt/

Note that libraries in Linux used to have a postfix that was removed in
AOO, so adjust the library name (and before, do a backup):

Do the back-up:
Linux 64 bits:
]$ sudo mv /opt/ /opt/
Linux 32 bits:
]$ sudo mv /opt/ /opt/

Copy the library:
In Linux 64 bits
]$ sudo cp -fv /opt/
In Linux 32 bits
]$ sudo cp -fv /opt/

My tests worked fine on Linux 32 and 64 bits.
More people testing is welcome.

Ariel Constenla-Haile
La Plata, Argentina

View raw message