You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@openoffice.apache.org by ma...@apache.org on 2016/08/15 20:39:29 UTC

svn commit: r14828 - /dev/openoffice/4.1.2-patch1/hotfix.html

Author: marcus
Date: Mon Aug 15 20:39:29 2016
New Revision: 14828

Log:
Updated text

Modified:
    dev/openoffice/4.1.2-patch1/hotfix.html

Modified: dev/openoffice/4.1.2-patch1/hotfix.html
==============================================================================
--- dev/openoffice/4.1.2-patch1/hotfix.html (original)
+++ dev/openoffice/4.1.2-patch1/hotfix.html Mon Aug 15 20:39:29 2016
@@ -36,13 +36,11 @@
     entourage.initialize();
   </script>
 
-  <h1>CVE-2016-1513 - Memory Corruption Vulnerability (Impress Presentations)</h1>
+  <h1>Hotfix for CVE-2016-1513 - Memory Corruption Vulnerability (Impress Presentations)</h1>
 
   <h2>Table of Contents</h2>
 
     <ul>
-      <li><h3><a href="#description"	title="Description">Description</a></h3></li>
-      <li><h3><a href="#affected"	title="Affected software">Affected software</a></h3></li>
       <li><h3><a href="#resolution"	title="Resolution">Resolution</a></h3></li>
       <li><h3><a href="#download"	title="Download &amp; Installation">Download &amp; Installation</a></h3></li>
       <li><h3><a href="#verify"		title="How to verify the download &amp; installation?">How to verify the download &amp; installation?</a></h3></li>
@@ -56,28 +54,16 @@
 
     <br />
 
-  <h2 id="description">Description</h2>
-
-  <h3>CVE-2016-1513 - Memory Corruption Vulnerability (Impress Presentations)</h3>
-
-  <p>
-    See the official Apache OpenOffice security bulletin for <a href="http://www.openoffice.org/security/cves/CVE-2016-1513.html">CVE-2016-1513</a>.
-  </p>
-
-  <p>
-    Announced July 21, 2016
-  </p>
+  <h2 id="resolution">Resolution</h2>
 
-  <h2 id="affected">Affected software</h2>
+  <h3>This hotfix will resolve <a href="http://www.openoffice.org/security/cves/CVE-2016-1513.html">CVE-2016-1513</a> (click the link for more details)</h3>
 
   <p>
-    Apache OpenOffice 4.1.2 and older on all platforms and all languages. OpenOffice.org versions are also affected.
+    The official Apache OpenOffice security bulletin was announced on July 21, 2016. Affected is Apache OpenOffice 4.1.2 and older on all platforms and all languages. OpenOffice.org versions are also affected.
   </p>
 
-  <h2 id="resolution">Resolution</h2>
-
   <p>
-    The Apache OpenOffice project recommends to update to the latest version 4.1.2 and then to install the hotfix. To resolve the issue you have to download the hotfix file for your platform and follow the installation instructions.
+    The Apache OpenOffice project recommends to update to the latest version 4.1.2 and then to download and install the ZIP hotfix file from the table below. Please follow the installation instructions in the respective Readme file.
   </p>
 
   <h2 id="download">Download &amp; Installation</h2>
@@ -245,12 +231,14 @@
   <h2 id="verify">How to verify the download &amp; installation?</h2>
 
   <p>
-    If you want, in the table above you can also download a suitable hash value file to verify that the file was downloaded correctly. For more information about how to do the verifification see here:
+    If you want, in the table above you can also download suitable hash value and signature files to verify that the ZIP file was downloaded correctly. For more information about how to do the verifification see here:
     <a href="http://www.openoffice.org/download/checksums.html">How to verify the integrity of the downloaded file?</a>
   </p>
+
   <p>
     To verify some basic data of the library files that are used by OpenOffice you can check the following:
   </p>
+
   <br />
 
   <table>