On Thursday 22 of March 2012 17:16:21 Rob Weir wrote:
> Please note, this is the official security bulletin, targeted for
> security professionals.  If you are an OpenOffice.org 3.3 user, and
> are able to apply the mentioned patch, then you are encouraged to do
> so.  If someone else supports or manages your desktop, then please
> forward this information to them.
> 
> Additional support is available on our Community Forums:
> 
> http://user.services.openoffice.org/
> 
> And via our ooo-users mailing list:
> 
> http://incubator.apache.org/openofficeorg/mailing-lists.html#users-mailing-
> list
> 
> Note:  This security patch for OpenOffice.org is made available to
> legacy OpenOffice.org users as a service by the Apache OpenOffice
> Project Management Committee.  The patch is made available under the
> Apache License, and due to its importance, we are releasing it outside
> of the standard release cycle.
> 
> -Rob
> 

Well... it's good news as there is an external patch.

But for Gentoo Linux users as OpenOffice-3.3.0 was delivered only as just 
binary 
file "OOo_3.3.0_Linux_x86-64_install-rpm-wJRE_en-US.tar.gz" from official 
OpenOffice.org site.

So now there is only fast and simple way to escape this vulnerability for 
Gentoo users - using current binary build of Apach Open Office 3.4 beta 
unpacked 
to "/opt" directory for example.

Reply via email to