CVE-2024-5261

NameCVE-2024-5261
DescriptionImproper Certificate Validation vulnerability in LibreOffice "LibreOfficeKit" mode disables TLS certification verification LibreOfficeKit can be used for accessing LibreOffice functionality through C/C++. Typically this is used by third party components to reuse LibreOffice as a library to convert, view or otherwise interact with documents. LibreOffice internally makes use of "curl" to fetch remote resources such as images hosted on webservers. In affected versions of LibreOffice, when used in LibreOfficeKit mode only, then curl's TLS certification verification was disabled (CURLOPT_SSL_VERIFYPEER of false) In the fixed versions curl operates in LibreOfficeKit mode the same as in standard mode with CURLOPT_SSL_VERIFYPEER of true. This issue affects LibreOffice before version 24.2.4.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libreoffice (PTS)bullseye1:7.0.4-4+deb11u10fixed
bullseye (security)1:7.0.4-4+deb11u11fixed
bookworm, bookworm (security)4:7.4.7-1+deb12u5fixed
sid, trixie4:24.8.3-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libreofficesourcebuster(not affected)
libreofficesourcebullseye(not affected)
libreofficesourcebookworm(not affected)
libreofficesource(unstable)4:24.2.4-1

Notes

[bookworm] - libreoffice <not-affected> (Vulnerable code not present)
[bullseye] - libreoffice <not-affected> (Vulnerable code not present)
[buster] - libreoffice <not-affected> (Vulnerable code not present)
https://www.libreoffice.org/about-us/security/advisories/cve-2024-5261/
https://cgit.freedesktop.org/libreoffice/core/commit/?id=fa4ceeb487f89671efc8bf533192bf237c35b51e

Search for package or bug name: Reporting problems