This is an automated email from the ASF dual-hosted git repository.

marcus pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git

commit dfd872b77575986c829a647052d1c30915fc6838
Author: Marcus <mar...@apache.org>
AuthorDate: Fri Mar 24 15:40:01 2023 +0100

    Security Bulletin for the Apache OpenOffice 4.1.14 Release
---
 content/security/bulletin.html | 8 ++++++++
 1 file changed, 8 insertions(+)

diff --git a/content/security/bulletin.html b/content/security/bulletin.html
index b68b4761f4..f16b151801 100644
--- a/content/security/bulletin.html
+++ b/content/security/bulletin.html
@@ -19,6 +19,14 @@
     subscribe to our <a href="alerts.html">security-alerts mailing 
list</a>.</strong>
   </p>
 
+  <h3>Fixed in Apache OpenOffice 4.1.14</h3>
+
+  <ul>
+    <li><a href="cves/CVE-2022-38745.html">CVE-2022-38745</a>: An empty class 
path may lead to run arbitrary Java code</li>
+    <li><a href="cves/CVE-2022-40674.html">CVE-2022-40674</a>: "Use after 
free" fixed in expat >= 2.4.9</li>
+    <li><a href="cves/CVE-2022-47502.html">CVE-2022-47502</a>: Macro URL 
arbitrary script execution without warning</li>
+  </ul>
+
   <h3>Fixed in Apache OpenOffice 4.1.13</h3>
 
   <ul>

Reply via email to