libreoffice vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libreoffice package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Verification of Cryptographic Signature

<1:7.0.4-4+deb11u13
  • L
CVE-2025-1080

<1:7.0.4-4+deb11u13
  • L
CVE-2024-12426

<1:7.0.4-4+deb11u12
  • L
CVE-2024-12425

<1:7.0.4-4+deb11u12
  • H
Improper Verification of Cryptographic Signature

<1:7.0.4-4+deb11u11
  • L
CVE-2024-6472

<1:7.0.4-4+deb11u10
  • L
CVE-2024-3044

<1:7.0.4-4+deb11u9
  • H
Improper Preservation of Permissions

<1:7.0.4-4+deb11u8
  • H
CVE-2023-6185

<1:7.0.4-4+deb11u8
  • H
Improper Validation of Array Index

<1:7.0.4-4+deb11u7
  • M
CVE-2023-2255

<1:7.0.4-4+deb11u7
  • H
Insecure Default Initialization of Resource

<1:7.0.4-4+deb11u6
  • M
Arbitrary Argument Injection

<1:7.0.4-4+deb11u4
  • H
CVE-2022-26307

<1:7.0.4-4+deb11u2
  • H
Use of Insufficiently Random Values

<1:7.0.4-4+deb11u2
  • H
Improper Certificate Validation

<1:7.0.4-4+deb11u2
  • H
Improper Certificate Validation

<1:7.0.4-4+deb11u2
  • H
Improper Certificate Validation

<1:7.0.4-4+deb11u1
  • H
Improper Certificate Validation

<1:7.0.4-4+deb11u1
  • H
Buffer Overflow

<1:4.3.1-1
  • L
Improper Input Validation

<1:6.4.4-1
  • L
Information Exposure

<1:6.4.4-1
  • L
Missing Encryption of Sensitive Data

<1:6.4.3-1
  • H
Improper Encoding or Escaping of Output

<1:6.3.0-1
  • H
Directory Traversal

<1:6.3.1~rc2-1
  • C
Improper Input Validation

<1:6.3.0-1
  • C
Improper Input Validation

<1:6.3.0-1
  • H
Directory Traversal

<1:6.3.0-1
  • C
Improper Input Validation

<1:6.3.0~rc1-1
  • M
Information Exposure

<1:6.3.0~rc1-1
  • C
Directory Traversal

<1:6.1.3-1
  • H
Incorrect Calculation

<1:4.0.3-1
  • L
Improper Input Validation

*
  • L
Information Exposure

*
  • H
Out-of-bounds Write

<1:6.0.2-1
  • H
Use After Free

<1:6.0.1-1
  • C
CVE-2018-6871

<1:6.0.1-1
  • H
Out-of-bounds Write

<1:5.0.2-1
  • M
Information Exposure

<1:5.2.3-1
  • H
Out-of-bounds Write

<1:5.0.2-1
  • H
Out-of-bounds Write

<1:3.4.3-1
  • C
Out-of-bounds Write

<1:5.2.5-1
  • C
Out-of-bounds Write

<1:5.2.5-1
  • H
Out-of-bounds Read

<1:4.3.3-1
  • H
Improper Input Validation

<1:5.1.4~rc1-1
  • H
Out-of-Bounds

<1:5.0.5~rc1-1
  • H
Out-of-Bounds

<1:5.0.5~rc1-1
  • M
Numeric Errors

<1:5.0.1~rc1-1
  • M
Out-of-Bounds

<1:5.0.1~rc2-1
  • M
Numeric Errors

<1:5.0.1~rc1-1
  • M
Information Exposure

<1:5.0.1~rc1-1
  • M
Out-of-Bounds

<1:4.4.2-1
  • H
Improper Input Validation

<1:4.3.3-2
  • H
CVE-2014-3693

<1:4.3.3~rc2~git20141011-1
  • C
CVE-2014-0247

<1:4.2.5-1
  • L
Out-of-Bounds

<1:4.1.0-1
  • L
Out-of-Bounds

<1:3.4.3-1
  • L
CVE-2012-4233

<1:3.5.4+dfsg-3
  • H
Out-of-Bounds

<1:3.5.4-7
  • H
Numeric Errors

<1:3.4.5-1
  • M
Numeric Errors

<1:3.5.2~rc2-1
  • M
Out-of-Bounds

<1:3.4.3-1
  • H
Out-of-Bounds

<1:3.3.3-1