From $URL : Timo Warns (Warns@Pre-Sense.DE) reported publicly that OpenOffice and LibreOffice (as well as other Office Suites) fail to appropriately warn users when a file with embedded content is opened. Additionally it is not possible to disable the opening of embedded content within files. This can be used to add tracking behavior to files or to deliver additional files that can potentially exploit other security issues when parsed to the user. Additionally if the file is converted (e.g. to a PDF) and then saved the converted file may contain a direct copy of the embedded data, thus if something sensitive if referenced (such as ~/.ssh/id_rsa) this information may then be exposed if the resulting file is shared.
One year later, the CVE id is still "reserved", without providing any details. ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. Do we need to take this that serious?
See https://bugs.gentoo.org/show_bug.cgi?id=447380 for discussion about possible fix in 4.2 series
There's nothing that the office team can do here. My suspicion is that if *anyone* had a clue what this bug actually meant precisely it would be fixed by now.
*** This bug has been marked as a duplicate of bug 447380 ***