LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Link | Tags |
---|---|
https://www.libreoffice.org/about-us/security/advisories/cve-2022-26306 | vendor advisory |
http://www.openwall.com/lists/oss-security/2022/08/13/1 | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2023/03/msg00022.html | third party advisory mailing list |