This quote from the page mentioned by Rob:

<quote>Linux and other platforms should consult their distro or OS vendor for 
patch instructions.</quote>

My distro doesn't support OpenOffice; most, I gather, don't.



----- Original Message -----
> From: NoOp <[email protected]>
> To: [email protected]
> Cc: 
> Sent: Friday, 23 March 2012 5:13 AM
> Subject: Re: CVE-2012-0037: OpenOffice.org data leakage vulnerability
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> On 03/22/2012 06:16 AM, Rob Weir wrote:
>>  Please note, this is the official security bulletin, targeted for 
>>  security professionals.  If you are an OpenOffice.org 3.3 user, and
>>  are able to apply the mentioned patch, then you are encouraged to
>>  do so.  If someone else supports or manages your desktop, then 
>>  please forward this information to them.
> ...
> 
> Where are the linux patches? I could only find Window and Mac:
> 
> <http://www.eng.lsu.edu/mirrors/apache//incubator/ooo/3.3/patches/cve-2012-0037/>
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.14 (GNU/Linux)
> 
> iQEcBAEBAgAGBQJPa2vLAAoJEPZAvJ7lnWKq1cMIALpXfyGLZ0undlQrxiYF0eLu
> 4cthvqZAs4KmsRgJ9QXh96BS519X5oBjUOflANSXAt/sLsxl5cGlq0mmjkBCbIzE
> ihS8wNCjVKsEkQaU9XzKXFlo/rWOkXPc942+mo5L6jPzsOvfA6VJbdEgMqW0fOyd
> UXqbZxKEnu3oj62dvDzeEwGE17SbJmCGI5r9LfaRrKQoYHUzU7vVkQYOYAnDdjGf
> 83I8bceJbnr8yj+EpBFSh2hY7s1aH73jAuIrM1JeKn5Xo9fA5tHvO+lyPYQqpCpD
> t+ZgVoxyRf4yXijHF0AURiahwEdzfk0OV8zisYrseLNzsjFlGzyL/LEAxHkwGCU=
> =YKo/
> -----END PGP SIGNATURE-----
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [email protected]
> For additional commands, e-mail: [email protected]
>

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to