LWN: Comments on "An odd vulnerability report for LibreOffice" https://lwn.net/Articles/461673/ This is a special feed containing comments posted to the individual LWN article titled "An odd vulnerability report for LibreOffice". en-us Sun, 26 Oct 2025 13:04:37 +0000 Sun, 26 Oct 2025 13:04:37 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net An odd vulnerability report for LibreOffice https://lwn.net/Articles/462132/ https://lwn.net/Articles/462132/ intgr <div class="FormattedComment"> <font class="QuotedText">&gt; It would be good for Bugzilla to have a MISFILED resolution</font><br> <p> Sounds like pointless bureaucracy. How about just reassigning the bug to the right component instead?<br> <p> </div> Fri, 07 Oct 2011 18:46:27 +0000 An odd vulnerability report for LibreOffice https://lwn.net/Articles/462126/ https://lwn.net/Articles/462126/ daglwn <div class="FormattedComment"> Or just change the component it's assigned to. Why is that so hard?<br> <p> </div> Fri, 07 Oct 2011 18:32:18 +0000 Rob Weir - "monitoring" list where the patches were posted 2+ months ago https://lwn.net/Articles/462061/ https://lwn.net/Articles/462061/ mmeeks <div class="FormattedComment"> Oh, and now I take a look at the public apache mail archive, I see this:<br> <p> <a href="http://mail-archives.apache.org/mod_mbox/incubator-ooo-dev/201107.mbox/%3CCAP-ksoi0dJtLbfGoHhAQ3OVfNT4zsxsDcrCOCGYy=eHaWPMS5g@mail.gmail.com%3E">http://mail-archives.apache.org/mod_mbox/incubator-ooo-de...</a><br> <p> from Rob Weir, and I quote:<br> <p> "As I understand it now, the OpenOffice.org currently directs visitors<br> to report vulnerability reports to securityteam@openoffice.org. This<br> address is currently being monitored."<br> <p> ie. Evidently, an AOO representative **was** added to the mailing list<br> <p> </div> Fri, 07 Oct 2011 13:42:40 +0000 An odd vulnerability report for LibreOffice https://lwn.net/Articles/461848/ https://lwn.net/Articles/461848/ epa The 'rules' document you mentioned defines NOTABUG as follows: <p> <i>The problem described is not a bug. An explaination of why this resolution has been chosen should be supplied.</i> <p> Comment 14 in the bug report simply says that this is not a security issue. <p> My point is that while it may not be a security issue, it <i>is</i> a bug, and that therefore the NOTABUG resolution, as defined in the explanation document you gave, is not appropriate. It is defined as meaning "The problem described is not a bug", which is not at all the same as "It is a bug, but not the particular kind of bug appropriate to this component in Bugzilla". <p> Still, as you say, it looks like the bug was dealt with in this case because it was already fixed upstream; it's just the Bugzilla entry which is misleading. <p> It would be good for Bugzilla to have a MISFILED resolution for reports filed against the wrong component or whatever. That would provide a way to close them without making a claim that "this is not a bug" or "we will not fix it". Thu, 06 Oct 2011 14:04:40 +0000 An odd vulnerability report for LibreOffice https://lwn.net/Articles/461829/ https://lwn.net/Articles/461829/ rwmj <div class="FormattedComment"> The "NOTABUG" designation does cause some consternation, because it sounds like we're saying it's "not a bug", which of course it is.<br> <p> Nevertheless, the resolution here is correct. The component is set to Security Response, and it is not a *security* bug. And you can see that an explanation was given in comment 14. This is all correct according to the rules:<br> <a href="https://bugzilla.redhat.com/page.cgi?id=fields.html#status">https://bugzilla.redhat.com/page.cgi?id=fields.html#status</a><br> <p> What should probably have happened is the bug was cloned to the LibreOffice component, and fixed there. It appears that wasn't done, but although I'm not certain about the timeline, it looks like since it was already fixed in LO, there was no need to clone the bug and just close it straight afterwards.<br> <p> So there you go, my strictly technical "by the book" explanation for this<br> </div> Thu, 06 Oct 2011 11:38:51 +0000 An odd vulnerability report for LibreOffice https://lwn.net/Articles/461821/ https://lwn.net/Articles/461821/ mmeeks <div class="FormattedComment"> <font class="QuotedText">&gt; One hopes that the press release is not the first time that the OOo </font><br> <font class="QuotedText">&gt; community is hearing about the vulnerability, but that seems to</font><br> <font class="QuotedText">&gt; be the case</font><br> <p> Of course not - it was disclosed (with patches) on the shared vulnerability mailing list; and at least one Apache Committer: Malte Timmerman was subscribed there.<br> <p> <font class="QuotedText">&gt; Perhaps the project was waiting until distributions were able to update</font><br> <font class="QuotedText">&gt; their LO packages (albeit silently)</font><br> <p> Of course - that is standard practice.<br> <p> <font class="QuotedText">&gt; There is no good reason that LO and AOO can't work together on</font><br> <font class="QuotedText">&gt; security issues, regardless of any other friction there may be</font><br> <font class="QuotedText">&gt; between the two.</font><br> <p> Some co-ordination is of course reasonable, however LibreOffice has developers actively working in this area - which involves fixing innumerable bugs of various risks. Few of these have associated CVE + circus.<br> </div> Thu, 06 Oct 2011 10:40:51 +0000 An odd vulnerability report for LibreOffice https://lwn.net/Articles/461812/ https://lwn.net/Articles/461812/ epa <blockquote>We do not consider a crash of a client application such as openoffice.org to be a security issue.</blockquote>Maybe it is a security issue, maybe not; but it is certainly a <i>bug</i>. I've been disappointed by this attitude from Red Hat in other cases too. If something crashes, it may not be the most important thing to fix, but there is no way it could be described as NOTABUG. Thu, 06 Oct 2011 09:19:45 +0000 An odd vulnerability report for LibreOffice https://lwn.net/Articles/461809/ https://lwn.net/Articles/461809/ mjw There is now also a new comment explaining why it was first thought to be a security issue and then not. Also included is a timeline that clearly mentions openoffice.org being notified weeks ago. Why the apache people weren't aware still is a bit of a mystery though (Assuming they are in control of openoffice.org now, maybe Oracle still haven't handed it all over? Or maybe the apache office project just don't have enough hackers to take care of security issues anymore?). <p> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=725668#c14">RHBZ725668#c14</a>: <blockquote>It initially appeared that this flaw may be exploitable similar to CVE-2010-3452, where an OOB Read caused Arbitrary Code Execution. However in the case of this particular flaw, the junk data read is just parsed into an internal representation of properties and the maximum harm this should cause in application crash (Denial Of Service). <p> Timeline: <ul> <li> Reported to securityteam@openoffice.org on 25-July-2011 <li> Recieved a reply (with tdf-security@lists.documentfoundation.org copied) on the same date <li> Release date changed with a few delays in between <li> Release on 5-Oct-2011 </ul> </blockquote> Thu, 06 Oct 2011 09:06:39 +0000 Collaborating In The Only Place Possible https://lwn.net/Articles/461802/ https://lwn.net/Articles/461802/ dgm <div class="FormattedComment"> <font class="QuotedText">&gt;it's hard to see what more they could have done.</font><br> <p> What about sending them a maliciously crafted doc file that runs a script that silently pushes the patch to the repository?<br> <p> See? it was not that hard!<br> </div> Thu, 06 Oct 2011 08:00:33 +0000 An odd vulnerability report for LibreOffice https://lwn.net/Articles/461799/ https://lwn.net/Articles/461799/ huzaifas <div class="FormattedComment"> It is not exploitable (atleast on linux) because its an OOB Read. It results in parsing of some out of bounds junk values.<br> </div> Thu, 06 Oct 2011 07:50:36 +0000 Debian & general comment https://lwn.net/Articles/461756/ https://lwn.net/Articles/461756/ steffen780 <div class="FormattedComment"> 3.3.4 has been in Gentoo-testing since 17Aug, stable on x86 on 4Sep *. Tho I'm not sure if Gentoo counts as a major distro.<br> More importantly, the LO project seriously needs to re-evaluate its policies on this. There's plenty of arguments for immediate as well as for delayed disclosure (I don't think that topic needs any further lengthy discussions), but afaik there's universal agreement that you always say when an update includes security fixes (or at least, like the kernel, say "this might include security fixes, everyone should update immediately"). Still, at least they fixed it.<br> <p> Oh and if the AOO-project still can't watch its security mailbox it should probably advice people to go to LO instead until they had time to get setup with their duplicate project...<br> <p> *: <a href="http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/app-office/libreoffice/ChangeLog?hideattic=0&amp;revision=1.166&amp;view=markup">http://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/a...</a><br> </div> Thu, 06 Oct 2011 02:56:36 +0000 Collaborating In The Only Place Possible https://lwn.net/Articles/461735/ https://lwn.net/Articles/461735/ webmink <blockquote><i> It's unfortunate that the "securityteam" mailing list didn't include any AOO folks</i></blockquote> <p>It definitely did - I was forwarded the e-mail confirming it. Given the LO developers were barred from joining the Apache security list when it formed as it's only open to hand-picked Apache committers, the securityteam mailing list is the only remaining place for collaboration. Given the LO developers posted the report <i>and</i> the patches to that list, it's hard to see what more they could have done. S. Wed, 05 Oct 2011 22:55:14 +0000 An odd vulnerability report for LibreOffice https://lwn.net/Articles/461731/ https://lwn.net/Articles/461731/ csamuel <div class="FormattedComment"> Ubuntu have pushed a 3.3.4 release for Natty today, though it's not yet listed as a USN and the changelog associated with it doesn't (obviously) list any security related bugs (unless the OOo bugzilla entry about a document that locks up OOo is it).<br> <p> * new upstream release (keeping the old tarball, only using patches) (LP: #849855)<br> - <a rel="nofollow" href="http://bugs.freedesktop.org/show_bug.cgi?id=38955">http://bugs.freedesktop.org/show_bug.cgi?id=38955</a><br> - <a rel="nofollow" href="http://bugs.freedesktop.org/show_bug.cgi?id=30550">http://bugs.freedesktop.org/show_bug.cgi?id=30550</a><br> - <a rel="nofollow" href="http://bugs.freedesktop.org/show_bug.cgi?id=37057">http://bugs.freedesktop.org/show_bug.cgi?id=37057</a><br> - <a rel="nofollow" href="https://issues.apache.org/ooo/show_bug.cgi?id=118018">https://issues.apache.org/ooo/show_bug.cgi?id=118018</a><br> - handle busted emf lengths<br> - fix regression in SvGlobalName::operator &lt;<br> - fix loss of init on merge<br> - valgrind: init some values<br> - merge these sprm finders and do it right<br> <p> </div> Wed, 05 Oct 2011 22:32:31 +0000 An odd vulnerability report for LibreOffice https://lwn.net/Articles/461732/ https://lwn.net/Articles/461732/ jake <div class="FormattedComment"> <font class="QuotedText">&gt; Looks like Red Hat bugzilla has all LO patches and a backport patch for OOo</font><br> <p> Interesting. I wonder why it's "CLOSED NOTABUG". That, at least, explains why I couldn't find it when I searched for OPEN bugs in the Red Hat bugzilla this morning.<br> <p> The comment:<br> <p> We do not consider a crash of a client application such as openoffice.org to be a security issue.<br> <p> seems a little strange too ... I guess Red Hat doesn't believe that it's an exploitable crash? I wonder what it bases that on ...<br> <p> jake<br> </div> Wed, 05 Oct 2011 22:32:07 +0000 An odd vulnerability report for LibreOffice https://lwn.net/Articles/461729/ https://lwn.net/Articles/461729/ mjw <div class="FormattedComment"> Looks like Red Hat bugzilla has all LO patches and a backport patch for OOo:<br> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2713">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2713</a><br> <p> It is somewhat odd that the apache people were unaware of the security report, since coordinating security issues using a list for all clones/forks/spoons at securityteam@openoffice.org was discussed on their own list:<br> <a href="http://mail-archives.apache.org/mod_mbox/incubator-ooo-dev/201107.mbox/%3c4E16BE53.4080408@documentfoundation.org%3e">http://mail-archives.apache.org/mod_mbox/incubator-ooo-de...</a><br> And I thought apache now owned the domain, but maybe they don't yet own the smtp services?<br> </div> Wed, 05 Oct 2011 22:16:31 +0000 Debian & general comment https://lwn.net/Articles/461727/ https://lwn.net/Articles/461727/ Curan <blockquote>As of this writing, only Debian has released a security update to address the problem, and that fix is only for OOo as Debian hasn't had a release that contains LO.</blockquote> <p>Well, even though it isn't released yet as a stable release, the LO versions in testing and unstable aren't affected either as <a href="http://packages.qa.debian.org/libr/libreoffice.html">they are 3.4.3-1 and 3.4.3-3</a>.</p> <p>Apart from that I really don't like the communications style. Bugs, including security issues, should be made public immediately. It would help users and administrators to take appropriate actions, including being e.g. extra careful about opening files, that might trigger the bug. I hope all LO devs and/or TDF members won't do this again. Better name a bug and allow all to take precautions than leave everybody in the dark with the risk, that some malware developer stumbles across something like this and can take advantage of it.</p> Wed, 05 Oct 2011 21:47:23 +0000