Your submission was sent successfully! Close

CVE-2022-26306

Published: 25 July 2022

LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
libreoffice
Launchpad, Ubuntu, Debian
bionic
Released (1:6.0.7-0ubuntu0.18.04.12)
focal
Released (1:6.4.7-0ubuntu0.20.04.5)
jammy Not vulnerable
(1:7.3.3-0ubuntu0.22.04.1)
kinetic Not vulnerable

trusty Ignored
(out of standard support)
upstream
Released (1:7.3.3~rc1-2)
xenial Needs triage

Patches:
upstream: https://github.com/LibreOffice/core/commit/ab77587ec300f5c30084471000663c46ddf25dad (7.2)
upstream: https://github.com/LibreOffice/core/commit/713296ecd30bab02d41fcd23f19afed28d916701 (6.4)
upstream: https://github.com/LibreOffice/core/commit/bfec3cf63ef43cc86e9a2fd90600d91b5fefe0c3 (6.1 pre)
upstream: https://github.com/LibreOffice/core/commit/55d3095f14e98e5d2aadddf392911ca2d2b6dca9 (6.1)