Gentoo: GLSA-202212-04: LibreOffice: Arbitrary Code Execution
Summary
LibreOffice links using the vnd.libreoffice.command scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning.
Resolution
All LibreOffice users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/libreoffice-7.3.6.2"
All LibreOffice binary users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/libreoffice-bin-7.3.6.2"
References
[ 1 ] CVE-2022-3140 https://nvd.nist.gov/vuln/detail/CVE-2022-3140
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202212-04
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Background
LibreOffice is a powerful office suite; its clean interface and powerful tools let you unleash your creativity and grow your productivity.
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-office/libreoffice < 7.3.6.2 >= 7.3.6.2 2 app-office/libreoffice-bin < 7.3.6.2 >= 7.3.6.2
Impact
===== An attacker able to coerce a victim into opening a crafted LibreOffice document and execute certain actions with it could achieve remote code execution.
Workaround
There is no known workaround at this time.