The software on show next week at the LibreOffice Conference in Bern
Berlin, August 28, 2014 - The Document Foundation announces LibreOffice
4.3.1, the first minor release of LibreOffice 4.3 "fresh" family, with
over 100 fixes (including patches for two CVEs, backported to
LibreOffice 4.2.6-secfix, which is also available for download now).
All LibreOffice users are invited to update their installation as soon
as possible to avoid security issues. This includes users who are
running LibreOffice 4.2.6 as originally released on August, 5th 2014.
LibreOffice 4.3.1 and LibreOffice 4.2.6 will be shown on stage at the
LibreOffice Conference in Bern, from September 3 to September 5, with a
large number of sessions about development, community, marketing and
migrations. The program of the event is available here:
https://conference.libreoffice.org/2014/program.
In addition to the sessions in English, there will be a track in German
focusing on open source adoptions in governments and enterprises in
Switzerland, Germany and Austria:
https://conference.libreoffice.org/2014/professional-user-track.
People interested in technical details about the release can access the
change log here: https://wiki.documentfoundation.org/Releases/4.3.1/RC1
(fixed in RC1) and
https://wiki.documentfoundation.org/Releases/4.3.1/RC2 (fixed in RC2).
CVEs patched in LibreOffice 4.3.1 and LibreOffice 4.2.6 are
CVE-2014-3524 "CSV Command Injection and DDE formulas" and CVE-2014-3575
"Arbitrary File Disclosure using crafted OLE objects".
Download LibreOffice
LibreOffice 4.3.1 and LibreOffice 4.2.6 are immediately available for
download from the following link: http://www.libreoffice.org/download/.
LibreOffice users, free software advocates and community members can
support The Document Foundation with a donation at
http://donate.libreoffice.org. Money collected will be used to grow the
infrastructure, and support marketing activities to increase the
awareness of the project, both at global and local level.
Short link to The Document Foundation blog: http://wp.me/p1byPE-v5.