A vulnerability has been discovered in LibreOffice which could result in arbitrary script execution via crafted links.
Package | app-office/libreoffice on all architectures |
---|---|
Affected versions | < 7.3.6.2 |
Unaffected versions | >= 7.3.6.2 |
Package | app-office/libreoffice-bin on all architectures |
---|---|
Affected versions | < 7.3.6.2 |
Unaffected versions | >= 7.3.6.2 |
LibreOffice is a powerful office suite; its clean interface and powerful tools let you unleash your creativity and grow your productivity.
LibreOffice links using the vnd.libreoffice.command scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning.
An attacker able to coerce a victim into opening a crafted LibreOffice document and execute certain actions with it could achieve remote code execution.
There is no known workaround at this time.
All LibreOffice users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-office/libreoffice-7.3.6.2"
All LibreOffice binary users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-office/libreoffice-bin-7.3.6.2"
Release date
December 19, 2022
Latest revision
December 19, 2022: 1
Severity
high
Exploitable
remote
Bugzilla entries