This is an automated email from the ASF dual-hosted git repository.
git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git
The following commit(s) were added to refs/heads/asf-staging by this push:
new 4dc13516a8 git-site-role commit from build_staging.sh
4dc13516a8 is described below
commit 4dc13516a8f7fb17ee40957b645ea51a8af98e46
Author: jenkins <[email protected]>
AuthorDate: Thu Jul 24 18:09:22 2025 +0000
git-site-role commit from build_staging.sh
---
content/feed.xml | 4 +-
content/security/cves/CVE-2012-5639.html | 106 ++++++++-----------------------
2 files changed, 30 insertions(+), 80 deletions(-)
diff --git a/content/feed.xml b/content/feed.xml
index 52516b29f2..b4f4205dcf 100644
--- a/content/feed.xml
+++ b/content/feed.xml
@@ -6,8 +6,8 @@
<atom:link href="http://localhost:8820/feed.xml" rel="self"
type="application/rss+xml" />
<description>OpenOffice.org Feed</description>
<language>en-us</language>
- <pubDate>Thu, 24 Jul 2025 15:43:49 +0000</pubDate>
- <lastBuildDate>Thu, 24 Jul 2025 15:43:49 +0000</lastBuildDate>
+ <pubDate>Thu, 24 Jul 2025 18:07:22 +0000</pubDate>
+ <lastBuildDate>Thu, 24 Jul 2025 18:07:22 +0000</lastBuildDate>
</channel>
diff --git a/content/security/cves/CVE-2012-5639.html
b/content/security/cves/CVE-2012-5639.html
index cc4f71e9cb..64bad83b39 100644
--- a/content/security/cves/CVE-2012-5639.html
+++ b/content/security/cves/CVE-2012-5639.html
@@ -1,15 +1,13 @@
-
<!--#include virtual="/doctype.html" -->
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+ <title>CVE-2012-5639</title>
<link href="/css/ooo.css" rel="stylesheet" type="text/css">
- <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
- <title>CVE-2012-5639</title>
-
+
<script src="https://www.apachecon.com/event-images/snippet.js"></script>
</head>
@@ -22,86 +20,38 @@
<div id="clear"></div>
- <div id="content">
+ <div id="content">
+ <p><a
href="https://www.cve.org/CVERecord?id=CVE-2012-5639">CVE-2012-5639</a></p>
+ <p><a
href="https://www.openoffice.org/security/cves/CVE-2012-5639.html">Apache
OpenOffice Advisory</a></p>
+ <p style="text-align:center; font-size:largest">Loading internal /
external resource without warning.</p>
+ <p style="text-align:center;
+ font-size:larger">Fixed in Apache OpenOffice 4.1.15</p>
+ <p><strong>Description</strong></p>
+<p>In Apache OpenOffice and LibreOffice embedded content will be opened
automatically without that a warning is shown.</p>
+<p><strong>Severity: Moderate</strong></p>
+<p>There are no known exploits of this vulnerability.<br />
+A proof-of-concept demonstration exists.</p>
+<p>Thanks to the reporter for discovering this issue.</p>
+<p><strong>Vendor: The Apache Software Foundation</strong></p>
+<p><strong>Versions Affected</strong></p>
+<p>All Apache OpenOffice versions 4.1.14 and older are affected.<br />
+OpenOffice.org versions may also be affected.</p>
+<p><strong>Mitigation</strong></p>
+<p>Install Apache OpenOffice 4.1.15 for the latest maintenance and cumulative
security fixes. Use the Apache OpenOffice <a
href="https://www.openoffice.org/download/">download page</a>.</p>
+<p><strong>Acknowledgements</strong></p>
+<p>The Apache OpenOffice Security Team would like to thank Timo Warns and
Joachim Mammele for discovering and reporting this issue.</p>
+<p><strong>Further Information</strong></p>
+<p>For additional information and assistance, consult the <a
href="https://forum.openoffice.org/">Apache OpenOffice Community Forums</a> or
make requests to the <a
href="mailto:users@openoffice.apache.org">users@openoffice.apache.org</a>
public mailing list.</p>
+<p>The latest information on Apache OpenOffice security bulletins can be found
at the <a href="https://www.openoffice.org/security/bulletin.html">Bulletin
Archive</a> page.</p>
+
- <p>
- <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-5639">CVE-2012-5639</a>
- </p>
- <p>
- <a
href="https://www.openoffice.org/security/cves/CVE-2012-5639.html">Apache
OpenOffice Advisory</a>
- </p>
- <p style="text-align:center; font-size:largest">
- <strong>Loading internal / external resources without warning</strong>
- </p>
- <p style="text-align:center; font-size:larger">
- <strong>Fixed in Apache OpenOffice 4.1.15</strong>
- </p>
- <p>
- <strong>Description</strong>
- </p>
- <p>
- In Apache OpenOffice and LibreOffice embedded content will be opened
automatically without
- that a warning is shown.
- </p>
- <p>
- <strong>Severity: Moderate</strong>
- </p>
- <p>
- There are no known exploits of this vulnerability.
- <br />
- A proof-of-concept demonstration exists.
- </p>
- <p>
- Thanks to the reporter for discovering this issue.
- </p>
- <p>
- <strong>Vendor: The Apache Software Foundation</strong>
- </p>
- <p>
- <strong>Versions Affected</strong>
- </p>
- <p>
- All Apache OpenOffice versions 4.1.14 and older are affected.
- <br />
- OpenOffice.org versions may also be affected.
- </p>
- <p>
- <strong>Mitigation</strong>
- </p>
- <p>
- Install Apache OpenOffice 4.1.15 for the latest maintenance and
cumulative security fixes.
- Use the Apache OpenOffice <a
href="https://www.openoffice.org/download/"> download page</a>.
- </p>
- <p>
- <strong>Acknowledgments</strong>
- </p>
- <p>
- The Apache OpenOffice Security Team would like to thank Timo Warns and
- Joachim Mammele for discovering and reporting this attack vector.
- </p>
- <p>
- <strong>Further Information</strong>
- </p>
- <p>
- For additional information and assistance, consult the
- <a href="https://forum.openoffice.org/">Apache OpenOffice Community
Forums</a>
- or make requests to the
- <a
href="mailto:[email protected]">[email protected]</a>
- public mailing list.
- </p>
- <p>
- The latest information on Apache OpenOffice security bulletins can be
found at the
- <a href="https://www.openoffice.org/security/bulletin.html">Bulletin
Archive page</a>.
- </p>
- <hr />
+ <hr />
<p>
<a href="https://security.openoffice.org">Security Home</a>->
<a
href="https://www.openoffice.org/security/bulletin.html">Bulletin</a>->
- <a
href="https://www.openoffice.org/security/cves/CVE-2022-47502.html">CVE-2012-5639</a>
+ <a
href="https://www.openoffice.org/security/cves/CVE-2012-5639.html">CVE-2012-5639</a>
</p>
-
-
</div>
<!--#include virtual="/footer.html" -->
</body>