User: bluedwarf Date: 2007-09-17 18:18:18+0000 Added: ja/www/security/bulletin.html
Modified: ja/www/security/index.html Log: Follow the English pages. File Changes: Directory: /ja/www/security/ ============================ File [added]: bulletin.html Url: http://ja.openoffice.org/source/browse/ja/www/security/bulletin.html?rev=1.1&content-type=text/vnd.viewcvs-markup Added lines: 81 --------------- <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <html lang="ja"> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <meta http-equiv="Content-Style-Type" content="text/css"> <!--Styles for Screen Media--> <link rel="stylesheet" media="screen" href="/stylesheets/basic_sc.css"> <link rel="stylesheet" media="screen" href="/stylesheets/docs_sc.css"> <!--Styles for Printer--> <link rel="stylesheet" media="print" href="/stylesheets/basic_pr.css"> <link rel="stylesheet" media="print" href="/stylesheets/docs_pr.css"> <title>OpenOffice.org ã»ãã¥ãªãã£æ å ±</title> </head> <body> <div> <h1>OpenOffice.org ã»ãã¥ãªãã£æ å ±</h1> <div style="text-align: right;">[<a href="http://www.openoffice.org/security/bulletin.html">Original</a>]<br> </div> <h3> OpenOffice.org 2.3ã§ä¿®æ£ãããèå¼±æ§ </h3> <ul> <li><a href="http://www.openoffice.org/security/cves/CVE-2007-2834.html">CVE-2007-2834</a>: Manipulated TIFF files can lead to heap overflows and arbitrary code execution </ul> <h3> OpenOffice.org 2.2.1ã§ä¿®æ£ãããèå¼±æ§ </h3> <ul> <li><a href="http://www.openoffice.org/security/cves/CVE-2007-2754.html">CVE-2007-2754</a>: Integer overflow and heap-based buffer overflow vulnerability in 3rd party module (freetype) <li><a href="http://www.openoffice.org/security/cves/CVE-2007-0245.html">CVE-2007-0245</a>: Manipulated RTF files can lead to heap overflows and arbitrary code execution </ul> <h3> OpenOffice.org 2.2ã§ä¿®æ£ãããèå¼±æ§ </h3> <ul> <li><a href="http://www.openoffice.org/security/cves/CVE-2007-0239.html">CVE-2007-0239</a>: URL Handling Security Vulnerability (Linux/Solaris) <li><a href="http://www.openoffice.org/security/cves/CVE-2007-0238">CVE-2007-0238</a>: StarCalc Vulnerability <li><a href="http://www.openoffice.org/security/cves/CVE-2007-2.html">CVE-2007-002</a>: WordPerfect Import Vulnerability </ul> <h3> OpenOffice.org 2.1ã§ä¿®æ£ãããèå¼±æ§ </h3> <ul> <li><a href="http://www.openoffice.org/security/cves/CVE-2006-5870.html">CVE-2006-5870</a>: WMF/EMF Processing Failures </ul> <h3> OpenOffice.org 2.0.3ã§ä¿®æ£ãããèå¼±æ§ </h3> <ul> <li><a href="http://www.openoffice.org/security/cves/CVE-2006-2199.html">CVE-2006-2199</a>: Java Applets <li><a href="http://www.openoffice.org/security/cves/CVE-2006-2198.html">CVE-2006-2198</a>: Macro <li><a href="http://www.openoffice.org/security/cves/CVE-2006-3117.html">CVE-2006-3117</a>: File Format </ul> </div> </body> </html> File [changed]: index.html Url: http://ja.openoffice.org/source/browse/ja/www/security/index.html?r1=1.12&r2=1.13 Delta lines: +2 -61 -------------------- --- index.html 2007-06-23 19:46:55+0000 1.12 +++ index.html 2007-09-17 18:18:16+0000 1.13 @@ -65,73 +65,14 @@ <p>ããªãã®ã¬ãã¼ããåãåã£ãå¾ã«ãç§ãã¡ã¯è©ä¾¡ã«åãçµã¿ãåçãã¾ã(éå¸¸ãæ¬¡ã®å¶æ¥æ¥ã«ãªãã¾ã)ã</p> +<p>ä¿®æ£ãããèå¼±æ§ã¯<a href="bulletin.html">OpenOffice.org ã»ãã¥ãªãã£æ å ±</a>ã¨ãã¦ä¸è¦§ã«ãã¦ããã¾ãã</p> + <p>* æ¥æ¬èªã§é£çµ¡ãåãããå ´åã<a href="mailto:[メールアドレス保護]">ãã¡ã ([メールアドレス保護])</a>ã«é£çµ¡ãã¦ãã ããã<br> ã»ãã¥ãªãã£ãã¼ã ã¨é£çµ¡ãåããããæå©ãããã¦é ãã¾ãã</p> -<h2>ã»ãã¥ãªãã£æ å ±</h2> - -<h3> -OpenOffice.org 2.2.1ã§ä¿®æ£ãããèå¼±æ§ -</h3> - -<p> -<a href="http://www.openoffice.org/security/cves/CVE-2007-2754.html">CVE-2007-2754: Integer overflow and heap-based buffer overflow vulnerability in 3rd party module (freetype) </a> (è±èª) -</p> - -<p> -<a href="http://www.openoffice.org/security/cves/CVE-2007-0245.html">CVE-2007-0245: Manipulated RTF files can lead to heap overflows and arbitrary code execution</a> (è±èª) -</p> - -<h3> -OpenOffice.org 2.2ã§ä¿®æ£ãããèå¼±æ§ -</h3> - -<p> -<a href="http://www.openoffice.org/security/cves/CVE-2007-0239.html">CVE-2007-0239: URL Handling Security Vulnerability (Linux/Solaris)</a> (è±èª) -</p> - -<p> -<a href="http://www.openoffice.org/security/cves/CVE-2007-0238">CVE-2007-0238: StarCalc Vulnerability</a> (è±èª) -</p> - -<p> -<a href="http://www.openoffice.org/security/cves/CVE-2007-2.html">CVE-2007-002: WordPerfect Import Vulnerability</a> (è±èª) -</p> - -<h3> -OpenOffice.org 2.1ã§ä¿®æ£ãããèå¼±æ§ -</h3> - -<p> -<a href="http://www.openoffice.org/security/cves/CVE-2006-5870.html">CVE-2006-5870: WMF/EMF Processing Failures</a> (è±èª) -</p> - -<h3> -ãã®ä» -</h3> - -<p>2006-06-29:ã»ãã¥ãªãã£å ±å 2006-06-29 <a href="http://www.openoffice.org/security/bulletin-20060629.html">è± -èª</a>ã<a href="bulletin-20060629.html">æ¥æ¬èªè¨³</a></p> - -<p>2006-06-06:Statement on Proof-of-Concept Macro Virus <a href="http://www.openoffice.org/press/statement-proof-of-concept-virus.html">è± -èª</a>ã<a href="../marketing/pressrelease/20060607.txt">æ¥ -æ¬èªè¨³</a></p> - -<p> - </div> -<hr> -<div id="writers-and-designers">å¶ -ä½è :å¯ç¥ è±<br> - -ãã¶ã¤ã³:å°æµ¦å¯è£ -</div> - -<div id="html-page-id"> $Id: index.html,v 1.4 2006/06/06 -11:04:50 catch Exp $ </div> - </body> </html> --------------------------------------------------------------------- To unsubscribe, e-mail: [メールアドレス保護] For additional commands, e-mail: [メールアドレス保護]
