CVE-2022-26306

NameCVE-2022-26306
DescriptionLibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3368-1, ELA-968-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libreoffice (PTS)jessie, jessie (lts)1:4.3.3-2+deb8u15vulnerable
stretch (security)1:5.2.7-1+deb9u11vulnerable
stretch (lts), stretch1:6.1.5-3~deb9u2fixed
buster1:6.1.5-3+deb10u7vulnerable
buster (security)1:6.1.5-3+deb10u11fixed
bullseye1:7.0.4-4+deb11u8fixed
bullseye (security)1:7.0.4-4+deb11u9fixed
bookworm4:7.4.7-1+deb12u1fixed
bookworm (security)4:7.4.7-1+deb12u2fixed
sid, trixie4:24.2.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libreofficesourcejessie(unfixed)end-of-life
libreofficesourcestretch1:6.1.5-3~deb9u1ELA-968-1
libreofficesourcebuster1:6.1.5-3+deb10u8DLA-3368-1
libreofficesourcebullseye1:7.0.4-4+deb11u2
libreofficesource(unstable)1:7.3.3~rc1-2

Notes

https://www.libreoffice.org/about-us/security/advisories/cve-2022-26306
[stretch] - libreoffice <no-dsa> (Minor issue)
[jessie] - libreoffice <end-of-life> (GUI/non-headless not supported)

Search for package or bug name: Reporting problems