Author: pescetti
Date: Thu Aug 1 17:15:07 2013
New Revision: 1509335
URL: http://svn.apache.org/r1509335
Log:
Do not depend on w.a.o/dist/incubator URLs any longer, use the archives instead.
Modified:
openoffice/ooo-site/trunk/content/security/cves/CVE-2012-0037.html
openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html
Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2012-0037.html
URL:
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2012-0037.html?rev=1509335&r1=1509334&r2=1509335&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2012-0037.html
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2012-0037.html Thu Aug
1 17:15:07 2013
@@ -36,13 +36,13 @@ resources, an attacker would be able to
<p>OpenOffice.org 3.3.0 and 3.4 beta users can patch their
installation with the following patches. Download, unzip and follow the
instructions in the enclosed readme.pdf file.</p>
<ul>
- <li><a
href="http://www.apache.org/dyn/closer.cgi/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip">For
Windows installs</a>
-(<a
href="http://www.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip.md5">MD5</a>)
-(<a
href="http://www.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip.sha1">SHA1</a>)</li>
-
- <li><a
href="http://www.apache.org/dyn/closer.cgi/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip">For
MacOS installs</a>
-(<a
href="http://www.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip.md5">MD5</a>)
-(<a
href="http://www.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip.sha1">SHA1</a>)</li></li>
+ <li><a
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip">For
Windows installs</a>
+(<a
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip.md5">MD5</a>)
+(<a
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-win.zip.sha1">SHA1</a>)</li>
+
+ <li><a
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip">For
MacOS installs</a>
+(<a
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip.md5">MD5</a>)
+(<a
href="http://archive.apache.org/dist/incubator/ooo/3.3/patches/cve-2012-0037/CVE-2012-0037-mac.zip.sha1">SHA1</a>)</li></li>
<li>Linux and other platforms should consult their distro or OS
vendor for patch instructions.</li>
</ul>
@@ -56,7 +56,7 @@ We have provided MD5 and SHA1 hashes of
<p>
The MD5 and SHA1 hashes can be verified using Unix tools like sha1, sha1sum or
md5sum.
<p>
-The PGP signatures can be verified using PGP or GPG. First download the <a
href="http://www.apache.org/dist/incubator/ooo/KEYS">KEYS</a> file, as well as
the asc signature file for the particular patch from above. Make sure you get
these files from the main distribution directory, rather than from a mirror.
Then verify the signatures as follows:
+The PGP signatures can be verified using PGP or GPG. First download the <a
href="http://www.apache.org/dist/openoffice/KEYS">KEYS</a> file, as well as the
asc signature file for the particular patch from above. Make sure you get these
files from the main distribution directory, rather than from a mirror. Then
verify the signatures as follows:
<p>
<code>
% pgpk -a KEYS <br>
Modified: openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html
URL:
http://svn.apache.org/viewvc/openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html?rev=1509335&r1=1509334&r2=1509335&view=diff
==============================================================================
--- openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html
(original)
+++ openoffice/ooo-site/trunk/content/security/cves/CVE-2013-1571.html Thu Aug
1 17:15:07 2013
@@ -37,7 +37,7 @@ As reported on June 18th there is a <a h
<h4>Mitigation</h4>
<p>SDK users should update their installations by replacing
/docs/java/ref/index.html with this
- <a
href="http://www.apache.org/dyn/aoo-closer.cgi/incubator/ooo/3.4.1/source/cve-2013-1571.zip">patched
version</a>.
+ <a
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip">patched
version</a>.
Download, unzip and follow the instructions in the enclosed README
file.</p>
<p>Users with earlier versions of the SDK (pre 3.4.1) should <a
href="http://www.download.openoffice.org/download/other.html#tested-sdk">upgrade
to the current version</a> and then apply the patch. Alternative, they can
download and run
@@ -48,13 +48,13 @@ As reported on June 18th there is a <a h
<h4>Verifying the Integrity of Downloaded Files</h4>
<p>
-We have provided <a
href="http://www.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.md5">MD5</a>
and <a
href="http://www.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.sha256">SHA256</a>
hashes of these patches,
- as well as a <a
href="http://www.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.asc">GPG/PGP
detached digital signature</a>, for those who wish to verify the
+We have provided <a
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.md5">MD5</a>
and <a
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.sha256">SHA256</a>
hashes of these patches,
+ as well as a <a
href="http://archive.apache.org/dist/incubator/ooo/3.4.1/source/cve-2013-1571.zip.asc">GPG/PGP
detached digital signature</a>, for those who wish to verify the
integrity of this file.
<p>
The MD5 and SHA256 hashes can be verified using Unix tools like md5sum or
sha256sum.
<p>
-The PGP signatures can be verified using PGP or GPG. First download the <a
href="http://www.apache.org/dist/incubator/ooo/KEYS">KEYS</a> file, as well as
the asc signature file for the particular patch from above. Make sure you get
these files from the main distribution directory, rather than from a mirror.
Then verify the signatures as follows:
+The PGP signatures can be verified using PGP or GPG. First download the <a
href="http://www.apache.org/dist/openoffice/KEYS">KEYS</a> file, as well as the
asc signature file for the particular patch from above. Make sure you get these
files from the main distribution directory, rather than from a mirror. Then
verify the signatures as follows:
<p>
<code>
% pgpk -a KEYS <br>