Name | CVE-2022-26306 |
Description | LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3368-1, ELA-968-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libreoffice (PTS) | jessie, jessie (lts) | 1:4.3.3-2+deb8u15 | vulnerable |
| stretch (security) | 1:5.2.7-1+deb9u11 | vulnerable |
| stretch (lts), stretch | 1:6.1.5-3+deb9u5 | fixed |
| buster, buster (lts) | 1:6.1.5-3+deb10u14 | fixed |
| buster (security) | 1:6.1.5-3+deb10u12 | fixed |
| bullseye | 1:7.0.4-4+deb11u10 | fixed |
| bullseye (security) | 1:7.0.4-4+deb11u11 | fixed |
| bookworm | 4:7.4.7-1+deb12u4 | fixed |
| bookworm (security) | 4:7.4.7-1+deb12u5 | fixed |
| sid, trixie | 4:24.8.2-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://www.libreoffice.org/about-us/security/advisories/cve-2022-26306
[stretch] - libreoffice <no-dsa> (Minor issue)
[jessie] - libreoffice <ignored> (GUI/non-headless not supported)