CVE
parent
7021fc3646
commit
8aeac3b666
|
@ -43,7 +43,7 @@ ikiwiki (3.1415926) unstable; urgency=high
|
||||||
|
|
||||||
[ Josh Triplett ]
|
[ Josh Triplett ]
|
||||||
* teximg: Replace the insufficient blacklist with the built-in security
|
* teximg: Replace the insufficient blacklist with the built-in security
|
||||||
mechanisms of TeX.
|
mechanisms of TeX. (CVE-2009-2944)
|
||||||
|
|
||||||
-- Joey Hess <joeyh@debian.org> Sun, 30 Aug 2009 15:20:46 -0400
|
-- Joey Hess <joeyh@debian.org> Sun, 30 Aug 2009 15:20:46 -0400
|
||||||
|
|
||||||
|
|
|
@ -50,4 +50,4 @@ ikiwiki 3.1415926 released with [[!toggle text="these changes"]]
|
||||||
larger in either dimension.
|
larger in either dimension.
|
||||||
* [ Josh Triplett ]
|
* [ Josh Triplett ]
|
||||||
* teximg: Replace the insufficient blacklist with the built-in security
|
* teximg: Replace the insufficient blacklist with the built-in security
|
||||||
mechanisms of TeX."""]]
|
mechanisms of TeX. ([[!cve CVE-2009-2944]])"""]]
|
||||||
|
|
|
@ -426,4 +426,4 @@ bypassed and used to read arbitrary files. This was fixed by
|
||||||
enabling TeX configuration options that disallow unsafe TeX commands.
|
enabling TeX configuration options that disallow unsafe TeX commands.
|
||||||
The fix was released on 30 Aug 2009 in version 3.1415926, and was
|
The fix was released on 30 Aug 2009 in version 3.1415926, and was
|
||||||
backported to stable in version 2.53.4. If you use the teximg plugin,
|
backported to stable in version 2.53.4. If you use the teximg plugin,
|
||||||
I recommend upgrading.
|
I recommend upgrading. ([[!cve CVE-2009-2944]])
|
||||||
|
|
Loading…
Reference in New Issue