From 7deea8c6cf688eb5ea7b64b149dc7876170909c4 Mon Sep 17 00:00:00 2001 From: MSVSphere Packaging Team Date: Wed, 8 Nov 2023 15:40:06 +0300 Subject: [PATCH] import libreoffice-7.1.8.1-11.el9 --- .gitignore | 1 - .libreoffice.metadata | 1 - SOURCES/0001-CVE-2022-38745.patch | 93 ++ ...on-t-use-Library_tl-in-URE-libraries.patch | 364 +++++++ ...parameter-count-for-OR-AND-and-1-par.patch | 77 ++ ...trap-should-not-depend-on-Library_co.patch | 32 + SOURCES/0001-disable-script-dump.patch | 99 ++ .../0001-set-Referer-on-loading-IFrames.patch | 91 ++ ...ty-belt-before-fishing-in-muddy-wate.patch | 72 ++ ...g-frames-under-managed-links-control.patch | 896 ++++++++++++++++++ ...-a-result-even-if-it-s-only-an-error.patch | 50 + ...me-script-macro-support-isn-t-needed.patch | 53 ++ ...140-Filter-out-unwanted-command-URIs.patch | 292 ++++++ ...CAD9408FBE9531C3E9F434A1EFAFEEAEA3.gpg.asc | 51 + SPECS/libreoffice.spec | 26 +- 15 files changed, 2195 insertions(+), 3 deletions(-) create mode 100644 SOURCES/0001-CVE-2022-38745.patch create mode 100644 SOURCES/0001-Don-t-use-Library_tl-in-URE-libraries.patch create mode 100644 SOURCES/0001-Obtain-actual-0-parameter-count-for-OR-AND-and-1-par.patch create mode 100644 SOURCES/0001-URE-Library_boostrap-should-not-depend-on-Library_co.patch create mode 100644 SOURCES/0001-disable-script-dump.patch create mode 100644 SOURCES/0001-set-Referer-on-loading-IFrames.patch create mode 100644 SOURCES/0002-Stack-check-safety-belt-before-fishing-in-muddy-wate.patch create mode 100644 SOURCES/0002-put-floating-frames-under-managed-links-control.patch create mode 100644 SOURCES/0003-Always-push-a-result-even-if-it-s-only-an-error.patch create mode 100644 SOURCES/0003-assume-IFrame-script-macro-support-isn-t-needed.patch create mode 100644 SOURCES/0005-CVE-2022-3140-Filter-out-unwanted-command-URIs.patch create mode 100644 SOURCES/gpgkey-C2839ECAD9408FBE9531C3E9F434A1EFAFEEAEA3.gpg.asc diff --git a/.gitignore b/.gitignore index 6b149d0..527f1de 100644 --- a/.gitignore +++ b/.gitignore @@ -3,7 +3,6 @@ SOURCES/185d60944ea767075d27247c3162b3bc-unowinreg.dll SOURCES/a7983f859eafb2677d7ff386a023bc40-xsltml_2.1.2.zip SOURCES/dtoa-20180411.tgz SOURCES/f543e6e2d7275557a839a164941c0a86e5f2c3f2a0042bfc434c88c6dde9e140-opens___.ttf -SOURCES/gpgkey-C2839ECAD9408FBE9531C3E9F434A1EFAFEEAEA3.gpg.asc SOURCES/libreoffice-7.1.8.1.tar.xz SOURCES/libreoffice-help-7.1.8.1.tar.xz SOURCES/libreoffice-translations-7.1.8.1.tar.xz diff --git a/.libreoffice.metadata b/.libreoffice.metadata index 8ff9125..1305b8b 100644 --- a/.libreoffice.metadata +++ b/.libreoffice.metadata @@ -3,7 +3,6 @@ 2d49e11b0b711970f494294dc3698f05eb294853 SOURCES/a7983f859eafb2677d7ff386a023bc40-xsltml_2.1.2.zip 083509db5ad9d1680830be9add727d58b54ca0d3 SOURCES/dtoa-20180411.tgz dd55efd721df8a013709e27836bdf26623e5320e SOURCES/f543e6e2d7275557a839a164941c0a86e5f2c3f2a0042bfc434c88c6dde9e140-opens___.ttf -7b5fd93d787fbc6d9c2d4025d543730ee8dc4559 SOURCES/gpgkey-C2839ECAD9408FBE9531C3E9F434A1EFAFEEAEA3.gpg.asc 58642377b80001f41884b2fff3d74fe66426b182 SOURCES/libreoffice-7.1.8.1.tar.xz 48afe3a1a30861904bf31b387d6bc56360f5ac19 SOURCES/libreoffice-help-7.1.8.1.tar.xz cb1238f7b182c8bfb16086d2eb9305b43b8a6d16 SOURCES/libreoffice-translations-7.1.8.1.tar.xz diff --git a/SOURCES/0001-CVE-2022-38745.patch b/SOURCES/0001-CVE-2022-38745.patch new file mode 100644 index 0000000..01dde2d --- /dev/null +++ b/SOURCES/0001-CVE-2022-38745.patch @@ -0,0 +1,93 @@ +From dbf825c25195e29a00228f31112c5aaa2102f692 Mon Sep 17 00:00:00 2001 +From: Stephan Bergmann +Date: Mon, 21 Feb 2022 11:55:21 +0100 +Subject: [PATCH] Avoid unnecessary empty -Djava.class.path= + +Change-Id: Idcfe7321077b60381c0273910b1faeb444ef1fd8 +Reviewed-on: https://gerrit.libreoffice.org/c/core/+/130242 +Tested-by: Jenkins +Reviewed-by: Stephan Bergmann +--- + .../plugins/sunmajor/pluginlib/sunjavaplugin.cxx | 16 +++++++++++++--- + jvmfwk/source/framework.cxx | 8 ++++++-- + jvmfwk/source/fwkbase.cxx | 3 +++ + 3 files changed, 22 insertions(+), 5 deletions(-) + +diff --git a/jvmfwk/plugins/sunmajor/pluginlib/sunjavaplugin.cxx b/jvmfwk/plugins/sunmajor/pluginlib/sunjavaplugin.cxx +index f47b0a3..843f6d1 100644 +--- a/jvmfwk/plugins/sunmajor/pluginlib/sunjavaplugin.cxx ++++ b/jvmfwk/plugins/sunmajor/pluginlib/sunjavaplugin.cxx +@@ -713,17 +713,22 @@ javaPluginError jfw_plugin_startJavaVirtualMachine( + // all versions below 1.5.1 + options.emplace_back("abort", reinterpret_cast(abort_handler)); + bool hasStackSize = false; ++#ifdef UNX ++ // Until java 1.5 we need to put a plugin.jar or javaplugin.jar (<1.4.2) ++ // in the class path in order to have applet support: ++ OString sAddPath = getPluginJarPath(pInfo->sVendor, pInfo->sLocation,pInfo->sVersion); ++#endif + for (int i = 0; i < cOptions; i++) + { + OString opt(arOptions[i].optionString); + #ifdef UNX +- // Until java 1.5 we need to put a plugin.jar or javaplugin.jar (<1.4.2) +- // in the class path in order to have applet support: + if (opt.startsWith("-Djava.class.path=")) + { +- OString sAddPath = getPluginJarPath(pInfo->sVendor, pInfo->sLocation,pInfo->sVersion); + if (!sAddPath.isEmpty()) ++ { + opt += OStringChar(SAL_PATHSEPARATOR) + sAddPath; ++ sAddPath.clear(); ++ } + } + #endif + if (opt == "-Xint") { +@@ -768,6 +773,11 @@ javaPluginError jfw_plugin_startJavaVirtualMachine( + } + #endif + } ++#ifdef UNX ++ if (!sAddPath.isEmpty()) { ++ options.emplace_back("-Djava.class.path=" + sAddPath, nullptr); ++ } ++#endif + + std::unique_ptr sarOptions(new JavaVMOption[options.size()]); + for (std::vector