A vulnerability was found in LibreOffice prior to 6.2.6. LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. Reference: https://seclists.org/bugtraq/2019/Aug/28
Created libreoffice tracking bugs for this issue: Affects: fedora-all [bug 1744863]
External References: https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850
Patch: https://cgit.freedesktop.org/libreoffice/core/commit/?id=7942929685fafb0f9c82feb8da7279e5103c87f0
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1151 https://access.redhat.com/errata/RHSA-2020:1151
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-9850
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1598 https://access.redhat.com/errata/RHSA-2020:1598