Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP5:GA
patchinfo.31887
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.31887
<patchinfo incident="31887"> <issue tracker="cve" id="2023-6185"/> <issue tracker="cve" id="2023-6186"/> <issue tracker="bnc" id="1217577">VUL-0: CVE-2023-6185: libreoffice: Improper input validation enabling arbitrary Gstreamer pipeline injection</issue> <issue tracker="bnc" id="1217578">VUL-0: CVE-2023-6186: libreoffice: Link targets allow arbitrary script execution</issue> <packager>dspinella</packager> <rating>important</rating> <category>security</category> <summary>Security update for libreoffice</summary> <description>This update for libreoffice fixes the following issues: - CVE-2023-6186: Fixed link targets allow arbitrary script execution (bsc#1217578). - CVE-2023-6185: Fixed Improper input validation enabling arbitrary Gstreamer pipeline injection (bsc#1217577). </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor