CVE-2021-25636

NameCVE-2021-25636
DescriptionLibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to contain both "X509Data" and "KeyValue" children of the "KeyInfo" tag, which when opened caused LibreOffice to verify using the "KeyValue" but to report verification with the unrelated "X509Data" value. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.5.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libreoffice (PTS)buster1:6.1.5-3+deb10u7vulnerable
buster (security)1:6.1.5-3+deb10u4vulnerable
bullseye (security), bullseye1:7.0.4-4+deb11u1vulnerable
bookworm, sid1:7.4.0~rc3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libreofficesource(unstable)1:7.3.0-1

Notes

[bullseye] - libreoffice <no-dsa> (Minor issue)
[buster] - libreoffice <no-dsa> (Minor issue)
[stretch] - libreoffice <postponed> (Minor issue)
https://bugzilla.redhat.com/show_bug.cgi?id=2056955
https://www.libreoffice.org/about-us/security/advisories/CVE-2021-25636
Fixed by: https://github.com/LibreOffice/core/commit/b0404f80577de9ff69e58390c6f6ef949fdb0139

Search for package or bug name: Reporting problems