ALT-PU-2024-1179-2
Package LibreOffice-still updated to version 7.5.9.2-alt1.p10.1 for branch c10f1 in task 338266.
Closed vulnerabilities
BDU:2023-02967
Уязвимость модуля Spreadsheet пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код
BDU:2023-02968
Уязвимость компонента Floating Frames пакета офисных программ LibreOffice, позволяющая нарушителю выполнить спуфинговую атаку
BDU:2023-08655
Уязвимость пакета офисных программ LibreOffice, связанная с возможностью внедрения кода или данных, позволяющая нарушителю выполнить произвольный код
BDU:2023-08957
Уязвимость модуля Gstreamer пакета офисных программ LibreOffice, позволяющая нарушителю запускать произвольные плагины Gstreamer
Modified: 2024-11-21
CVE-2023-0950
Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1.
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3526-1] libreoffice security update
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3526-1] libreoffice security update
- GLSA-202311-15
- GLSA-202311-15
- DSA-5415
- DSA-5415
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950
Modified: 2024-11-21
CVE-2023-1183
A flaw was found in the Libreoffice package. An attacker can craft an odb containing a "database/script" file with a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker.
- http://www.openwall.com/lists/oss-security/2023/12/28/4
- http://www.openwall.com/lists/oss-security/2023/12/28/4
- http://www.openwall.com/lists/oss-security/2024/01/03/4
- http://www.openwall.com/lists/oss-security/2024/01/03/4
- https://access.redhat.com/security/cve/CVE-2023-1183
- https://access.redhat.com/security/cve/CVE-2023-1183
- RHBZ#2208506
- RHBZ#2208506
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-1183/
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-1183/
Modified: 2024-11-21
CVE-2023-2255
Improper access control in editor components of The Document Foundation LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used "floating frames" linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.7; 7.5 versions prior to 7.5.3.
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3526-1] libreoffice security update
- GLSA-202311-15
- DSA-5415
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-2255
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3526-1] libreoffice security update
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-2255
- DSA-5415
- GLSA-202311-15
Modified: 2024-11-21
CVE-2023-6185
Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.
- https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/
- https://www.debian.org/security/2023/dsa-5574
- https://www.debian.org/security/2023/dsa-5574
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185
Modified: 2024-11-21
CVE-2023-6186
Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.
- https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/
- https://www.debian.org/security/2023/dsa-5574
- https://www.debian.org/security/2023/dsa-5574
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186
Closed bugs
Обновить стабильную версию LibreOffice-still
Сломалась сборка Libreoffice-still