On Thursday 22 of March 2012 17:16:21 Rob Weir wrote: > Please note, this is the official security bulletin, targeted for > security professionals. If you are an OpenOffice.org 3.3 user, and > are able to apply the mentioned patch, then you are encouraged to do > so. If someone else supports or manages your desktop, then please > forward this information to them. > > Additional support is available on our Community Forums: > > http://user.services.openoffice.org/ > > And via our ooo-users mailing list: > > http://incubator.apache.org/openofficeorg/mailing-lists.html#users-mailing- > list > > Note: This security patch for OpenOffice.org is made available to > legacy OpenOffice.org users as a service by the Apache OpenOffice > Project Management Committee. The patch is made available under the > Apache License, and due to its importance, we are releasing it outside > of the standard release cycle. > > -Rob >
Well... it's good news as there is an external patch. But for Gentoo Linux users as OpenOffice-3.3.0 was delivered only as just binary file "OOo_3.3.0_Linux_x86-64_install-rpm-wJRE_en-US.tar.gz" from official OpenOffice.org site. So now there is only fast and simple way to escape this vulnerability for Gentoo users - using current binary build of Apach Open Office 3.4 beta unpacked to "/opt" directory for example.