File _patchinfo of Package patchinfo.31887

<patchinfo incident="31887">
  <issue tracker="cve" id="2023-6185"/>
  <issue tracker="cve" id="2023-6186"/>
  <issue tracker="bnc" id="1217577">VUL-0: CVE-2023-6185: libreoffice: Improper input validation enabling arbitrary Gstreamer pipeline injection</issue>
  <issue tracker="bnc" id="1217578">VUL-0: CVE-2023-6186: libreoffice: Link targets allow arbitrary script execution</issue>
  <packager>dspinella</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for libreoffice</summary>
  <description>This update for libreoffice fixes the following issues:

- CVE-2023-6186: Fixed link targets allow arbitrary script execution (bsc#1217578).
- CVE-2023-6185: Fixed Improper input validation enabling arbitrary Gstreamer pipeline injection (bsc#1217577).
</description>
</patchinfo>
openSUSE Build Service is sponsored by