summaryrefslogtreecommitdiff
path: root/metadata/glsa/glsa-202212-04.xml
diff options
context:
space:
mode:
authorV3n3RiX <venerix@koprulu.sector>2022-12-19 07:47:44 +0000
committerV3n3RiX <venerix@koprulu.sector>2022-12-19 07:47:44 +0000
commitfcefa9aa213e0ff26901b351fccd47393113ae5d (patch)
tree16ff06e1d47c8dc06b954f726f24cd6f941e3596 /metadata/glsa/glsa-202212-04.xml
parent8bb75334c4b9f91e9f95784e986ed31b4bc11f92 (diff)
gentoo auto-resync : 19:12:2022 - 07:47:44
Diffstat (limited to 'metadata/glsa/glsa-202212-04.xml')
-rw-r--r--metadata/glsa/glsa-202212-04.xml53
1 files changed, 53 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202212-04.xml b/metadata/glsa/glsa-202212-04.xml
new file mode 100644
index 000000000000..89b0b0039175
--- /dev/null
+++ b/metadata/glsa/glsa-202212-04.xml
@@ -0,0 +1,53 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202212-04">
+ <title>LibreOffice: Arbitrary Code Execution</title>
+ <synopsis>A vulnerability has been discovered in LibreOffice which could result in arbitrary script execution via crafted links.</synopsis>
+ <product type="ebuild">libreoffice,libreoffice-bin</product>
+ <announced>2022-12-19</announced>
+ <revised count="1">2022-12-19</revised>
+ <bug>876869</bug>
+ <access>remote</access>
+ <affected>
+ <package name="app-office/libreoffice" auto="yes" arch="*">
+ <unaffected range="ge">7.3.6.2</unaffected>
+ <vulnerable range="lt">7.3.6.2</vulnerable>
+ </package>
+ <package name="app-office/libreoffice-bin" auto="yes" arch="*">
+ <unaffected range="ge">7.3.6.2</unaffected>
+ <vulnerable range="lt">7.3.6.2</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>LibreOffice is a powerful office suite; its clean interface and powerful tools let you unleash your creativity and grow your productivity.</p>
+ </background>
+ <description>
+ <p>LibreOffice links using the vnd.libreoffice.command scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning.</p>
+ </description>
+ <impact type="high">
+ <p>An attacker able to coerce a victim into opening a crafted LibreOffice document and execute certain actions with it could achieve remote code execution.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All LibreOffice users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-office/libreoffice-7.3.6.2"
+ </code>
+
+ <p>All LibreOffice binary users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-office/libreoffice-bin-7.3.6.2"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-3140">CVE-2022-3140</uri>
+ </references>
+ <metadata tag="requester" timestamp="2022-12-19T02:01:40.422783Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2022-12-19T02:01:40.427016Z">ajak</metadata>
+</glsa> \ No newline at end of file