Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2022-26305

Published: 25 July 2022

An Improper Certificate Validation vulnerability in LibreOffice existed where determining if a macro was signed by a trusted author was done by only matching the serial number and issuer string of the used certificate with that of a trusted certificate. This is not sufficient to verify that the macro was actually signed with the certificate. An adversary could therefore create an arbitrary certificate with a serial number and an issuer string identical to a trusted certificate which LibreOffice would present as belonging to the trusted author, potentially leading to the user to execute arbitrary code contained in macros improperly trusted. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.

Priority

Medium

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
libreoffice
Launchpad, Ubuntu, Debian
bionic
Released (1:6.0.7-0ubuntu0.18.04.12)
focal
Released (1:6.4.7-0ubuntu0.20.04.5)
jammy Not vulnerable
(1:7.3.3-0ubuntu0.22.04.1)
kinetic Not vulnerable

lunar Not vulnerable

trusty Ignored
(end of standard support)
upstream
Released (1:7.3.2~rc2-1)
xenial Ignored
(end of standard support)
Patches:
upstream: https://github.com/LibreOffice/core/commit/a7aaa78acea4c1d51283c2fce54ff9f5339026f8
upstream: https://github.com/LibreOffice/core/commit/bae5503ac47ac2faa4c4365f86a00543e43a149a
upstream: https://github.com/LibreOffice/core/commit/0ce93b38af84453aba8002c098ac168b0fadfc97
upstream: https://github.com/LibreOffice/core/commit/2c8c221b88f2e2bb5b29a6c1bcce1ea75e98136a

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity High
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H