CVE-2022-26306

NameCVE-2022-26306
DescriptionLibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3368-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libreoffice (PTS)bullseye1:7.0.4-4+deb11u10fixed
bullseye (security)1:7.0.4-4+deb11u11fixed
bookworm, bookworm (security)4:7.4.7-1+deb12u5fixed
sid, trixie4:24.8.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libreofficesourcebuster1:6.1.5-3+deb10u8DLA-3368-1
libreofficesourcebullseye1:7.0.4-4+deb11u2
libreofficesource(unstable)1:7.3.3~rc1-2

Notes

https://www.libreoffice.org/about-us/security/advisories/cve-2022-26306

Search for package or bug name: Reporting problems