CVE-2022-26306
Published: 25 July 2022
LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.
Priority
Status
Package | Release | Status |
---|---|---|
libreoffice Launchpad, Ubuntu, Debian |
jammy |
Not vulnerable
(1:7.3.3-0ubuntu0.22.04.1)
|
lunar |
Not vulnerable
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Released
(1:7.3.3~rc1-2)
|
|
bionic |
Released
(1:6.0.7-0ubuntu0.18.04.12)
|
|
focal |
Released
(1:6.4.7-0ubuntu0.20.04.5)
|
|
kinetic |
Not vulnerable
|
|
xenial |
Ignored
(end of standard support)
|
|
Patches: upstream: https://github.com/LibreOffice/core/commit/ab77587ec300f5c30084471000663c46ddf25dad (7.2) upstream: https://github.com/LibreOffice/core/commit/713296ecd30bab02d41fcd23f19afed28d916701 (6.4) upstream: https://github.com/LibreOffice/core/commit/bfec3cf63ef43cc86e9a2fd90600d91b5fefe0c3 (6.1 pre) upstream: https://github.com/LibreOffice/core/commit/55d3095f14e98e5d2aadddf392911ca2d2b6dca9 (6.1) |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |