LibreOffice: Arbitrary Code Execution — GLSA 202212-04

A vulnerability has been discovered in LibreOffice which could result in arbitrary script execution via crafted links.

Affected packages

app-office/libreoffice on all architectures
Affected versions < 7.3.6.2
Unaffected versions >= 7.3.6.2
app-office/libreoffice-bin on all architectures
Affected versions < 7.3.6.2
Unaffected versions >= 7.3.6.2

Background

LibreOffice is a powerful office suite; its clean interface and powerful tools let you unleash your creativity and grow your productivity.

Description

LibreOffice links using the vnd.libreoffice.command scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning.

Impact

An attacker able to coerce a victim into opening a crafted LibreOffice document and execute certain actions with it could achieve remote code execution.

Workaround

There is no known workaround at this time.

Resolution

All LibreOffice users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-office/libreoffice-7.3.6.2"
 

All LibreOffice binary users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-office/libreoffice-bin-7.3.6.2"
 

References

Release date
December 19, 2022

Latest revision
December 19, 2022: 1

Severity
high

Exploitable
remote

Bugzilla entries