User: bluedwarf
Date: 2007-09-17 18:18:18+0000
Added:
   ja/www/security/bulletin.html

Modified:
   ja/www/security/index.html

Log:
 Follow the English pages.
 

File Changes:

Directory: /ja/www/security/
============================

File [added]: bulletin.html
Url: 
http://ja.openoffice.org/source/browse/ja/www/security/bulletin.html?rev=1.1&content-type=text/vnd.viewcvs-markup
Added lines: 81
---------------
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" 
"http://www.w3.org/TR/html4/loose.dtd";>
<html lang="ja">
<head>

  <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">

  <meta http-equiv="Content-Style-Type" content="text/css">

<!--Styles for Screen Media-->
  <link rel="stylesheet" media="screen" href="/stylesheets/basic_sc.css">

  <link rel="stylesheet" media="screen" href="/stylesheets/docs_sc.css">

<!--Styles for Printer-->
  <link rel="stylesheet" media="print" href="/stylesheets/basic_pr.css">

  <link rel="stylesheet" media="print" href="/stylesheets/docs_pr.css">
  <title>OpenOffice.org セキュリティ情報</title>


</head>


<body>

<div>
<h1>OpenOffice.org セキュリティ情報</h1>

<div style="text-align: right;">[<a 
href="http://www.openoffice.org/security/bulletin.html";>Original</a>]<br>

</div>

<h3>
OpenOffice.org 2.3で修正された脆弱性
</h3>

<ul>
<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-2834.html";>CVE-2007-2834</a>:
 Manipulated TIFF files can lead to heap overflows and arbitrary code execution
</ul>

<h3>
OpenOffice.org 2.2.1で修正された脆弱性
</h3>

<ul>
<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-2754.html";>CVE-2007-2754</a>:
 Integer overflow and heap-based buffer overflow vulnerability in 3rd party 
module (freetype)
<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-0245.html";>CVE-2007-0245</a>:
 Manipulated RTF files can lead to heap overflows and arbitrary code execution
</ul>

<h3>
OpenOffice.org 2.2で修正された脆弱性
</h3>

<ul>
<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-0239.html";>CVE-2007-0239</a>:
 URL Handling Security Vulnerability (Linux/Solaris)
<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-0238";>CVE-2007-0238</a>: 
StarCalc Vulnerability
<li><a 
href="http://www.openoffice.org/security/cves/CVE-2007-2.html";>CVE-2007-002</a>:
 WordPerfect Import Vulnerability
</ul>

<h3>
OpenOffice.org 2.1で修正された脆弱性
</h3>

<ul>
<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-5870.html";>CVE-2006-5870</a>:
 WMF/EMF Processing Failures
</ul>

<h3>
OpenOffice.org 2.0.3で修正された脆弱性
</h3>

<ul>
<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-2199.html";>CVE-2006-2199</a>:
 Java Applets
<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-2198.html";>CVE-2006-2198</a>:
 Macro
<li><a 
href="http://www.openoffice.org/security/cves/CVE-2006-3117.html";>CVE-2006-3117</a>:
 File Format
</ul>

</div>

</body>
</html>

File [changed]: index.html
Url: 
http://ja.openoffice.org/source/browse/ja/www/security/index.html?r1=1.12&r2=1.13
Delta lines:  +2 -61
--------------------
--- index.html  2007-06-23 19:46:55+0000        1.12
+++ index.html  2007-09-17 18:18:16+0000        1.13
@@ -65,73 +65,14 @@
 
 
<p>あなたのレポートを受け取った後に、私たちは評価に取り組み、回答します(通常、次の営業日になります)。</p>
 
+<p>修正された脆弱性は<a href="bulletin.html">OpenOffice.org 
セキュリティ情報</a>として一覧にしてあります。</p>
+
 <p>*&nbsp;日本語で連絡を取りたい場合、<a 
href="mailto:[&#x30E1;&#x30FC;&#x30EB;&#x30A2;&#x30C9;&#x30EC;&#x30B9;&#x4FDD;&#x8B77;]";>こちら
 
([&#x30E1;&#x30FC;&#x30EB;&#x30A2;&#x30C9;&#x30EC;&#x30B9;&#x4FDD;&#x8B77;])</a>に連絡してください。<br>
 
 
セキュリティチームと連絡を取れるよう手助けさせて頂きます。</p>
 
-<h2>セキュリティ情報</h2>
-
-<h3>
-OpenOffice.org 2.2.1で修正された脆弱性
-</h3>
-
-<p>
-<a 
href="http://www.openoffice.org/security/cves/CVE-2007-2754.html";>CVE-2007-2754:
 Integer overflow and heap-based buffer overflow vulnerability in 3rd party 
module (freetype) </a> (英語)
-</p>
-
-<p>
-<a 
href="http://www.openoffice.org/security/cves/CVE-2007-0245.html";>CVE-2007-0245:
 Manipulated RTF files can lead to heap overflows and arbitrary code 
execution</a> (英語)
-</p>
-
-<h3>
-OpenOffice.org 2.2で修正された脆弱性
-</h3>
-
-<p>
-<a 
href="http://www.openoffice.org/security/cves/CVE-2007-0239.html";>CVE-2007-0239:
 URL Handling Security Vulnerability (Linux/Solaris)</a> (英語)
-</p>
-
-<p>
-<a href="http://www.openoffice.org/security/cves/CVE-2007-0238";>CVE-2007-0238: 
StarCalc Vulnerability</a> (英語)
-</p>
-
-<p>
-<a 
href="http://www.openoffice.org/security/cves/CVE-2007-2.html";>CVE-2007-002: 
WordPerfect Import Vulnerability</a> (英語)
-</p>
-
-<h3>
-OpenOffice.org 2.1で修正された脆弱性
-</h3>
-
-<p>
-<a 
href="http://www.openoffice.org/security/cves/CVE-2006-5870.html";>CVE-2006-5870:
 WMF/EMF Processing Failures</a> (英語)
-</p>
-
-<h3>
-その他
-</h3>
-
-<p>2006-06-29:セキュリティ報告 2006-06-29 <a 
href="http://www.openoffice.org/security/bulletin-20060629.html";>英
-語</a>、<a href="bulletin-20060629.html">日本語訳</a></p>
-
-<p>2006-06-06:Statement on Proof-of-Concept Macro Virus <a 
href="http://www.openoffice.org/press/statement-proof-of-concept-virus.html";>英
-語</a>、<a href="../marketing/pressrelease/20060607.txt">日
-本語訳</a></p>
-
-<p>
-
 </div>
 
-<hr>
-<div id="writers-and-designers">制
-作者:可知 豊<br>
-
-デザイン:小浦寛裕
-</div>
-
-<div id="html-page-id"> $Id: index.html,v 1.4 2006/06/06
-11:04:50 catch Exp $ </div>
-
 </body>
 </html>




---------------------------------------------------------------------
To unsubscribe, e-mail: 
[&#x30E1;&#x30FC;&#x30EB;&#x30A2;&#x30C9;&#x30EC;&#x30B9;&#x4FDD;&#x8B77;]
For additional commands, e-mail: 
[&#x30E1;&#x30FC;&#x30EB;&#x30A2;&#x30C9;&#x30EC;&#x30B9;&#x4FDD;&#x8B77;]

メールによる返信