*** This bug is a security vulnerability ***

Public security bug reported:

CVE-2024-12425: "Path traversal leading to arbitrary .ttf file write"
https://www.libreoffice.org/about-us/security/advisories/cve-2024-12425/
https://ubuntu.com/security/CVE-2024-12425


CVE-2024-12426: "URL fetching can be used to exfiltrate arbitrary INI file 
values and environment variables"
https://www.libreoffice.org/about-us/security/advisories/cve-2024-12426/
https://ubuntu.com/security/CVE-2024-12426

** Affects: libreoffice (Ubuntu)
     Importance: Undecided
         Status: Fix Released

** Affects: libreoffice (Ubuntu Focal)
     Importance: Undecided
         Status: New

** Affects: libreoffice (Ubuntu Jammy)
     Importance: Undecided
         Status: New

** Affects: libreoffice (Ubuntu Noble)
     Importance: Undecided
         Status: New

** Affects: libreoffice (Ubuntu Oracular)
     Importance: Undecided
         Status: New

** Affects: libreoffice (Ubuntu Plucky)
     Importance: Undecided
         Status: Fix Released

** Information type changed from Public to Public Security

** Also affects: libreoffice (Ubuntu Plucky)
   Importance: Undecided
       Status: New

** Also affects: libreoffice (Ubuntu Focal)
   Importance: Undecided
       Status: New

** Also affects: libreoffice (Ubuntu Oracular)
   Importance: Undecided
       Status: New

** Also affects: libreoffice (Ubuntu Noble)
   Importance: Undecided
       Status: New

** Also affects: libreoffice (Ubuntu Jammy)
   Importance: Undecided
       Status: New

** Changed in: libreoffice (Ubuntu Plucky)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to libreoffice in Ubuntu.
https://bugs.launchpad.net/bugs/2095307

Title:
  CVE-2024-12425 and CVE-2024-12426

Status in libreoffice package in Ubuntu:
  Fix Released
Status in libreoffice source package in Focal:
  New
Status in libreoffice source package in Jammy:
  New
Status in libreoffice source package in Noble:
  New
Status in libreoffice source package in Oracular:
  New
Status in libreoffice source package in Plucky:
  Fix Released

Bug description:
  CVE-2024-12425: "Path traversal leading to arbitrary .ttf file write"
  https://www.libreoffice.org/about-us/security/advisories/cve-2024-12425/
  https://ubuntu.com/security/CVE-2024-12425

  
  CVE-2024-12426: "URL fetching can be used to exfiltrate arbitrary INI file 
values and environment variables"
  https://www.libreoffice.org/about-us/security/advisories/cve-2024-12426/
  https://ubuntu.com/security/CVE-2024-12426

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/2095307/+subscriptions


-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to