You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@openoffice.apache.org by Marcus <ma...@wtnet.de> on 2016/09/01 19:38:12 UTC

Re: [REPORT] CVE-2016-1513 Security Advisory

Great to see that this issue is solved finally.

Thanks to everyone who was involved. I want to express a special thanks 
to the developers Patricia, Damjan and Ariel for creating the binary 
files and Dennis for his coordination.

:-)

Marcus



Am 08/30/2016 05:46 PM, schrieb Dennis E. Hamilton:
> [BCC PMC]
>
> Today, Version 2.0 of the Advisory for CVE-2016-1513 has been issued.
>
> There is now general availability of a Hotfix that can be downloaded and applied to installations of Apache OpenOffice 4.1.2.  The Hotfix details can be found at
> <http://archive.apache.org/dist/openoffice/4.1.2-patch1/hotfix.html>.
>
> Please review the README instructions before deciding to download and apply the Hotfix.
>
>   - Dennis
>
>> -----Original Message-----
>> From: Dennis E. Hamilton [mailto:orcmid@apache.org]
>> Sent: Thursday, July 21, 2016 09:43
>> To: dev@openoffice.apache.org
>> Subject: [REPORT] CVE-2016-1513 Security Advisory
>>
>> [BCC AOO Users; BCC AOO PMC]
>>
>> Today, advisory CVE-2016-1513 has been published with regard to
>> disclosure of a potentially-exploitable defect in crafted Impress
>> documents.  The advisory can be found at
>> <http://www.openoffice.org/security/cves/CVE-2016-1513.html>.
>>
>> There is no updated release at this time.  There is action underway.  We
>> can now discuss those actions and also seek assistance in the wider
>> community.
>>
> [ ... ]

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@openoffice.apache.org
For additional commands, e-mail: dev-help@openoffice.apache.org