blob: 89b0b0039175f5dc63918d7463e9c53fd729ec3b (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
|
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="202212-04">
<title>LibreOffice: Arbitrary Code Execution</title>
<synopsis>A vulnerability has been discovered in LibreOffice which could result in arbitrary script execution via crafted links.</synopsis>
<product type="ebuild">libreoffice,libreoffice-bin</product>
<announced>2022-12-19</announced>
<revised count="1">2022-12-19</revised>
<bug>876869</bug>
<access>remote</access>
<affected>
<package name="app-office/libreoffice" auto="yes" arch="*">
<unaffected range="ge">7.3.6.2</unaffected>
<vulnerable range="lt">7.3.6.2</vulnerable>
</package>
<package name="app-office/libreoffice-bin" auto="yes" arch="*">
<unaffected range="ge">7.3.6.2</unaffected>
<vulnerable range="lt">7.3.6.2</vulnerable>
</package>
</affected>
<background>
<p>LibreOffice is a powerful office suite; its clean interface and powerful tools let you unleash your creativity and grow your productivity.</p>
</background>
<description>
<p>LibreOffice links using the vnd.libreoffice.command scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning.</p>
</description>
<impact type="high">
<p>An attacker able to coerce a victim into opening a crafted LibreOffice document and execute certain actions with it could achieve remote code execution.</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All LibreOffice users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/libreoffice-7.3.6.2"
</code>
<p>All LibreOffice binary users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/libreoffice-bin-7.3.6.2"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-3140">CVE-2022-3140</uri>
</references>
<metadata tag="requester" timestamp="2022-12-19T02:01:40.422783Z">ajak</metadata>
<metadata tag="submitter" timestamp="2022-12-19T02:01:40.427016Z">ajak</metadata>
</glsa>
|