Gentoo Archives: gentoo-announce

From: glsamaker@g.o
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202212-04 ] LibreOffice: Arbitrary Code Execution
Date: Mon, 19 Dec 2022 02:08:58
Message-Id: 167141530470.8.17905936317903131942@2ac734cbf5a7
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202212-04
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: LibreOffice: Arbitrary Code Execution
9 Date: December 19, 2022
10 Bugs: #876869
11 ID: 202212-04
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability has been discovered in LibreOffice which could result in
19 arbitrary script execution via crafted links.
20
21 Background
22 ==========
23
24 LibreOffice is a powerful office suite; its clean interface and powerful
25 tools let you unleash your creativity and grow your productivity.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 app-office/libreoffice < 7.3.6.2 >= 7.3.6.2
34 2 app-office/libreoffice-bin < 7.3.6.2 >= 7.3.6.2
35
36 Description
37 ===========
38
39 LibreOffice links using the vnd.libreoffice.command scheme could be
40 constructed to call internal macros with arbitrary arguments. Which when
41 clicked on, or activated by document events, could result in arbitrary
42 script execution without warning.
43
44 Impact
45 ======
46
47 An attacker able to coerce a victim into opening a crafted LibreOffice
48 document and execute certain actions with it could achieve remote code
49 execution.
50
51 Workaround
52 ==========
53
54 There is no known workaround at this time.
55
56 Resolution
57 ==========
58
59 All LibreOffice users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=app-office/libreoffice-7.3.6.2"
63
64 All LibreOffice binary users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=app-office/libreoffice-bin-7.3.6.2"
68
69 References
70 ==========
71
72 [ 1 ] CVE-2022-3140
73 https://nvd.nist.gov/vuln/detail/CVE-2022-3140
74
75 Availability
76 ============
77
78 This GLSA and any updates to it are available for viewing at
79 the Gentoo Security Website:
80
81 https://security.gentoo.org/glsa/202212-04
82
83 Concerns?
84 =========
85
86 Security is a primary focus of Gentoo Linux and ensuring the
87 confidentiality and security of our users' machines is of utmost
88 importance to us. Any security concerns should be addressed to
89 security@g.o or alternatively, you may file a bug at
90 https://bugs.gentoo.org.
91
92 License
93 =======
94
95 Copyright 2022 Gentoo Foundation, Inc; referenced text
96 belongs to its owner(s).
97
98 The contents of this document are licensed under the
99 Creative Commons - Attribution / Share Alike license.
100
101 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature