You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@openoffice.apache.org by or...@apache.org on 2015/10/28 19:05:50 UTC

svn commit: r1711087 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html

Author: orcmid
Date: Wed Oct 28 18:05:50 2015
New Revision: 1711087

URL: http://svn.apache.org/viewvc?rev=1711087&view=rev
Log:
Adjust description of the vulnerability to explain that it is about crafted documents

Modified:
    openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html

Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html
URL: http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html?rev=1711087&r1=1711086&r2=1711087&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html (original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2015-1774.html Wed Oct 28 18:05:50 2015
@@ -11,7 +11,7 @@
          wrapping for the site introduces HTML5 headers and formats.
          This version is modified to match the wrapping that is done as part
          of publishing this page and not rely on any particular styling
-         beyond <p> and <h1> through <h3>.
+         beyond <p>.
          -->
         <p>
             <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-1774">CVE-2015-1774</a>
@@ -30,9 +30,10 @@
         Updated October 28, 2015</p>
 
         <p>
-        A vulnerability in OpenOffice's HWP filter allows attackers to cause a
-        denial of service (memory corruption and application crash) and possible
-        execution of arbitrary code.
+        A vulnerability in OpenOffice's HWP filter allows attackers to craft
+        malicious documents that cause denial of service (memory
+        corruption and application crash) and possible execution of arbitrary
+        code.
     </p>
 
         <p>