openoffice-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From mar...@apache.org
Subject svn commit: r14828 - /dev/openoffice/4.1.2-patch1/hotfix.html
Date Mon, 15 Aug 2016 20:39:29 GMT
Author: marcus
Date: Mon Aug 15 20:39:29 2016
New Revision: 14828

Log:
Updated text

Modified:
    dev/openoffice/4.1.2-patch1/hotfix.html

Modified: dev/openoffice/4.1.2-patch1/hotfix.html
==============================================================================
--- dev/openoffice/4.1.2-patch1/hotfix.html (original)
+++ dev/openoffice/4.1.2-patch1/hotfix.html Mon Aug 15 20:39:29 2016
@@ -36,13 +36,11 @@
     entourage.initialize();
   </script>
 
-  <h1>CVE-2016-1513 - Memory Corruption Vulnerability (Impress Presentations)</h1>
+  <h1>Hotfix for CVE-2016-1513 - Memory Corruption Vulnerability (Impress Presentations)</h1>
 
   <h2>Table of Contents</h2>
 
     <ul>
-      <li><h3><a href="#description"	title="Description">Description</a></h3></li>
-      <li><h3><a href="#affected"	title="Affected software">Affected software</a></h3></li>
       <li><h3><a href="#resolution"	title="Resolution">Resolution</a></h3></li>
       <li><h3><a href="#download"	title="Download &amp; Installation">Download
&amp; Installation</a></h3></li>
       <li><h3><a href="#verify"		title="How to verify the download &amp;
installation?">How to verify the download &amp; installation?</a></h3></li>
@@ -56,28 +54,16 @@
 
     <br />
 
-  <h2 id="description">Description</h2>
-
-  <h3>CVE-2016-1513 - Memory Corruption Vulnerability (Impress Presentations)</h3>
-
-  <p>
-    See the official Apache OpenOffice security bulletin for <a href="http://www.openoffice.org/security/cves/CVE-2016-1513.html">CVE-2016-1513</a>.
-  </p>
-
-  <p>
-    Announced July 21, 2016
-  </p>
+  <h2 id="resolution">Resolution</h2>
 
-  <h2 id="affected">Affected software</h2>
+  <h3>This hotfix will resolve <a href="http://www.openoffice.org/security/cves/CVE-2016-1513.html">CVE-2016-1513</a>
(click the link for more details)</h3>
 
   <p>
-    Apache OpenOffice 4.1.2 and older on all platforms and all languages. OpenOffice.org
versions are also affected.
+    The official Apache OpenOffice security bulletin was announced on July 21, 2016. Affected
is Apache OpenOffice 4.1.2 and older on all platforms and all languages. OpenOffice.org versions
are also affected.
   </p>
 
-  <h2 id="resolution">Resolution</h2>
-
   <p>
-    The Apache OpenOffice project recommends to update to the latest version 4.1.2 and then
to install the hotfix. To resolve the issue you have to download the hotfix file for your
platform and follow the installation instructions.
+    The Apache OpenOffice project recommends to update to the latest version 4.1.2 and then
to download and install the ZIP hotfix file from the table below. Please follow the installation
instructions in the respective Readme file.
   </p>
 
   <h2 id="download">Download &amp; Installation</h2>
@@ -245,12 +231,14 @@
   <h2 id="verify">How to verify the download &amp; installation?</h2>
 
   <p>
-    If you want, in the table above you can also download a suitable hash value file to verify
that the file was downloaded correctly. For more information about how to do the verifification
see here:
+    If you want, in the table above you can also download suitable hash value and signature
files to verify that the ZIP file was downloaded correctly. For more information about how
to do the verifification see here:
     <a href="http://www.openoffice.org/download/checksums.html">How to verify the integrity
of the downloaded file?</a>
   </p>
+
   <p>
     To verify some basic data of the library files that are used by OpenOffice you can check
the following:
   </p>
+
   <br />
 
   <table>



Mime
View raw message