This is an automated email from the ASF dual-hosted git repository.

marcus pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git

commit 53b36e8e39fe292623634a660b8464b03d022117
Author: Marcus <mar...@apache.org>
AuthorDate: Thu Dec 28 14:37:56 2023 +0100

    Security Bulletin for the Apache OpenOffice 4.1.15 Release
---
 content/security/bulletin.html | 9 +++++++++
 1 file changed, 9 insertions(+)

diff --git a/content/security/bulletin.html b/content/security/bulletin.html
index f16b151801..5a0d27a403 100644
--- a/content/security/bulletin.html
+++ b/content/security/bulletin.html
@@ -19,6 +19,15 @@
     subscribe to our <a href="alerts.html">security-alerts mailing 
list</a>.</strong>
   </p>
 
+  <h3>Fixed in Apache OpenOffice 4.1.15</h3>
+
+  <ul>
+    <li><a href="cves/CVE-2012-5639.html">CVE-2012-5639</a>: Loading internal 
/ external resource without warning.</li>
+    <li><a href="cves/CVE-2022-43680.html">CVE-2022-43680</a>: "Use after 
free" fixed in expat >= 2.4.9</li>
+    <li><a href="cves/CVE-2023-1183.html">CVE-2023-1183</a>: Arbitrary file 
write in Base</li>
+    <li><a href="cves/CVE-2023-47804.html">CVE-2023-47804</a>: Macro URL 
arbitrary script execution</li>
+  </ul>
+
   <h3>Fixed in Apache OpenOffice 4.1.14</h3>
 
   <ul>

Reply via email to