Cleartext Storage of Sensitive Information Affecting libreoffice-l10n-he package, versions <6.4.4.2-8.19.4


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.2% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cleartext Storage of Sensitive Information vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-SLES151-LIBREOFFICEL10NHE-2711508
  • published14 Apr 2022
  • disclosed4 Jun 2020

Introduced: 4 Jun 2020

CVE-2020-12801  (opens in a new tab)
CWE-312  (opens in a new tab)

How to fix?

Upgrade SLES:15.1 libreoffice-l10n-he to version 6.4.4.2-8.19.4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libreoffice-l10n-he package and not the libreoffice-l10n-he package as distributed by SLES. See How to fix? for SLES:15.1 relevant fixed versions and status.

If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was not LibreOffice's default ODF file format, then affected versions of LibreOffice default that subsequent saves of the document are unencrypted. This may lead to a user accidentally saving a MSOffice file format document unencrypted while believing it to be encrypted. This issue affects: LibreOffice 6-3 series versions prior to 6.3.6; 6-4 series versions prior to 6.4.3.

CVSS Scores

version 3.1