Package: libreoffice / 1:7.0.4-4+deb11u10
Metadata
Package | Version | Patches format |
---|---|---|
libreoffice | 1:7.0.4-4+deb11u10 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 CVE 2022 26305 compare authors using Thumbprint.patch | (download) |
xmlsecurity/source/component/documentdigitalsignatures.cxx |
23 19 + 4 - 0 ! |
[patch 1/4] cve-2022-26305 compare authors using thumbprint |
0002 CVE 2022 26307 make hash encoding match decoding.patch | (download) |
officecfg/registry/schema/org/openoffice/Office/Common.xcs |
6 6 + 0 - 0 ! |
[patch 2/4] cve-2022-26307 make hash encoding match decoding Seeing as old versions of the hash may be in the users config, add a StorageVersion field to the office config Passwords section which defaults to 0 to indicate the old hash is in use. Try the old varient when StorageVersion is 0. When a new encoded master password it set write StorageVersion of 1 to indicate a new hash is in use and use the new style when StorageVersion is 1. |
0003 CVE 2022 26306 add Initialization Vectors to passwor.patch | (download) |
officecfg/registry/schema/org/openoffice/Office/Common.xcs |
10 10 + 0 - 0 ! |
[patch 3/4] cve-2022-26306 add initialization vectors to password storage old ones default to the current all zero case and continue to work as before |
0004 CVE 2022 2630 6 7 add infobar to prompt to refresh t.patch | (download) |
include/sfx2/strings.hrc |
2 2 + 0 - 0 ! |
add infobar to prompt to refresh to replace old format Reviewed-on: https://gerrit.libreoffice.org/c/core/+/131976 Tested-by: Jenkins |
fix e_book_client_connect_direct_sync sig.diff | (download) |
connectivity/source/drivers/evoab2/EApi.h |
2 1 + 1 - 0 ! |
--- |
ZDI CAN 17859.diff | (download) |
desktop/source/app/cmdlineargs.cxx |
10 9 + 1 - 0 ! |
these commands are always urls already Conflicts: wizards/source/scriptforge/SF_Session.xba |
hrk euro default.diff | (download) |
i18npool/source/localedata/data/hr_HR.xml |
5 2 + 3 - 0 ! |
[patch] resolves: tdf#150011 switch default currency hrk croatian Kuna to EUR Euro HR will join Euro area on 2023-01-01. |
avoid empty java.class.path.diff | (download) |
jvmfwk/plugins/sunmajor/pluginlib/sunjavaplugin.cxx |
16 13 + 3 - 0 ! |
avoid unnecessary empty -djava.class.path= |
CVE 2023 2255.diff | (download) |
embeddedobj/source/commonembedding/embedobj.cxx |
60 32 + 28 - 0 ! |
set referer on loading iframes so tools, options, security, options, "block any links from document not..." applies to their contents. |
sc stack parameter count.diff | (download) |
formula/source/core/api/token.cxx |
13 5 + 8 - 0 ! |
[patch] obtain actual 0-parameter count for or(), and() and 1-parameter functions MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit OR and AND for legacy infix notation are classified as binary operators but in fact are functions with parameter count. In case no argument is supplied, GetByte() returns 0 and for that case the implicit binary operator 2 parameters were wrongly assumed. Similar for functions expecting 1 parameter, without argument 1 was assumed. For "real" unary and binary operators the compiler already checks parameters. Omit OR and AND and 1-parameter functions from this implicit assumption and return the actual 0 count. |
escape url passed to gstreamer.diff | (download) |
avmedia/source/gstreamer/gstframegrabber.cxx |
14 9 + 5 - 0 ! |
escape url passed to gstreamer |
improve macro checks.diff | (download) |
include/sfx2/docmacromode.hxx |
7 5 + 2 - 0 ! |
--- |
floating frame targets unneeded protocols.diff | (download) |
include/tools/urlobj.hxx |
5 5 + 0 - 0 ! |
add some protocols that don't make sense as floating frame targets MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit |
warn about exotic protocols as well.diff | (download) |
sw/source/filter/html/htmlplug.cxx |
2 1 + 1 - 0 ! |
warn about exotic protocols as well MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit |
ignore LO special purpose hyperlinks per default.diff | (download) |
dbaccess/source/core/dataaccess/ModelImpl.cxx |
3 2 + 1 - 0 ! |
default to ignoring libreoffice special-purpose protocols in calc hyperlink MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit |
reuse AllowedLinkProtocolFromDocument 1.diff | (download) |
include/sfx2/objsh.hxx |
7 5 + 2 - 0 ! |
reuse allowedlinkprotocolfromdocument in writer MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit reorg calc hyperlink check to reuse elsewhere |
reuse AllowedLinkProtocolFromDocument 2.diff | (download) |
sd/source/ui/app/sdmod1.cxx |
29 18 + 11 - 0 ! |
reuse allowedlinkprotocolfromdocument in impress/draw MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit |
work around expired certificiate in test.diff | (download) |
desktop/qa/desktop_lib/test_desktop_lib.cxx |
6 4 + 2 - 0 ! |
--- |
add notify for script use.diff | (download) |
xmloff/source/draw/eventimp.cxx |
3 3 + 0 - 0 ! |
add notify for script use |
remove ability to trust not validated macro signatures in high security.diff | (download) |
sfx2/source/doc/docmacromode.cxx |
8 6 + 2 - 0 ! |
[patch] remove ability to trust not validated macro signatures in high security MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Giving the user the option to determine if they should trust an invalid signature in HIGH macro security doesn't make sense. CommonName of the signature is the most prominent feature presented and the CommonName of a certificate can be easily forged for an invalid signature, tricking the user into accepting an invalid signature. in the HIGH macro security setting only show the pop-up to enable/disable signed macro if the certificate signature can be validated. cherry-picked without UI/String altering bits for 24-2 |