This quote from the page mentioned by Rob: <quote>Linux and other platforms should consult their distro or OS vendor for patch instructions.</quote>
My distro doesn't support OpenOffice; most, I gather, don't. ----- Original Message ----- > From: NoOp <[email protected]> > To: [email protected] > Cc: > Sent: Friday, 23 March 2012 5:13 AM > Subject: Re: CVE-2012-0037: OpenOffice.org data leakage vulnerability > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > On 03/22/2012 06:16 AM, Rob Weir wrote: >> Please note, this is the official security bulletin, targeted for >> security professionals. If you are an OpenOffice.org 3.3 user, and >> are able to apply the mentioned patch, then you are encouraged to >> do so. If someone else supports or manages your desktop, then >> please forward this information to them. > ... > > Where are the linux patches? I could only find Window and Mac: > > <http://www.eng.lsu.edu/mirrors/apache//incubator/ooo/3.3/patches/cve-2012-0037/> > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.14 (GNU/Linux) > > iQEcBAEBAgAGBQJPa2vLAAoJEPZAvJ7lnWKq1cMIALpXfyGLZ0undlQrxiYF0eLu > 4cthvqZAs4KmsRgJ9QXh96BS519X5oBjUOflANSXAt/sLsxl5cGlq0mmjkBCbIzE > ihS8wNCjVKsEkQaU9XzKXFlo/rWOkXPc942+mo5L6jPzsOvfA6VJbdEgMqW0fOyd > UXqbZxKEnu3oj62dvDzeEwGE17SbJmCGI5r9LfaRrKQoYHUzU7vVkQYOYAnDdjGf > 83I8bceJbnr8yj+EpBFSh2hY7s1aH73jAuIrM1JeKn5Xo9fA5tHvO+lyPYQqpCpD > t+ZgVoxyRf4yXijHF0AURiahwEdzfk0OV8zisYrseLNzsjFlGzyL/LEAxHkwGCU= > =YKo/ > -----END PGP SIGNATURE----- > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: [email protected] > For additional commands, e-mail: [email protected] > --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
