ANDREA   FERRARIS wrote
> Sorry for the wrong language, here You are the translation:
> 
> I think it's been known for weeks, published about a month ago and 
> rather serious because it allows the arbitrary execution of python 
> scripts without the user's knowledge when opening a malicious document.
> 
> The solution provided is the upgrade to version 6.2.5, which however 
> does not seem optimal, since it is the Fresh version of development,
> whereas if one wanted to remain on the production one, Steel 6.1.X, how 
> he should do?
> 
> Greetings,
> 
> 
>> Andrea Ferraris
>> 

        
CVE-2019-9847 , CVE-2019-9848,  and CVE-2019-9849 have all be corrected by
TDF for current "Fresh" 6.3.0 and "Still" 6.2.5 release builds. Follow the
TDF  Discuss mail list
<https://listarchives.documentfoundation.org/www/discuss/>   for any
security related issues.

Otherwise, sorry but the 6.1 branch is not supported by TDF, it is
End-of-Life effective  2019-05-29

The 6.3 branch was released 2019-08-08 and its 6.3.0 build is current
"Fresh" release

The 6.2 branch has now become the "Still" branch, with the patched 6.2.5
release available (and the 6.2.6 release candidate already built and
available for testing).

Meaning that  either users Linux distro must update their packaging, or
users must seek 3rd party support to continue to use a 6.1 or pre 6.2.5
build of LibreOffice.

But again this belongs on the Discuss mail list.






--
Sent from: 
http://document-foundation-mail-archive.969070.n3.nabble.com/Users-f1639498.html

-- 
To unsubscribe e-mail to: users+unsubscr...@global.libreoffice.org
Problems? https://www.libreoffice.org/get-help/mailing-lists/how-to-unsubscribe/
Posting guidelines + more: https://wiki.documentfoundation.org/Netiquette
List archive: https://listarchives.libreoffice.org/global/users/
Privacy Policy: https://www.documentfoundation.org/privacy

Reply via email to