CVE-2022-26306
Publication date 25 July 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.
Status
Package | Ubuntu Release | Status |
---|---|---|
libreoffice | ||
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Fixed 1:6.4.7-0ubuntu0.20.04.5
|
|
18.04 LTS bionic |
Fixed 1:6.0.7-0ubuntu0.18.04.12
|
|
16.04 LTS xenial | Ignored end of standard support | |
14.04 LTS trusty | Ignored end of standard support |
Patch details
Package | Patch details |
---|---|
libreoffice |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-5661-1
- LibreOffice vulnerabilities
- 6 October 2022
- USN-5694-1
- LibreOffice vulnerabilities
- 20 October 2022