master
Joey Hess 2009-08-30 17:48:14 -04:00
parent 7021fc3646
commit 8aeac3b666
3 changed files with 3 additions and 3 deletions

2
debian/changelog vendored
View File

@ -43,7 +43,7 @@ ikiwiki (3.1415926) unstable; urgency=high
[ Josh Triplett ] [ Josh Triplett ]
* teximg: Replace the insufficient blacklist with the built-in security * teximg: Replace the insufficient blacklist with the built-in security
mechanisms of TeX. mechanisms of TeX. (CVE-2009-2944)
-- Joey Hess <joeyh@debian.org> Sun, 30 Aug 2009 15:20:46 -0400 -- Joey Hess <joeyh@debian.org> Sun, 30 Aug 2009 15:20:46 -0400

View File

@ -50,4 +50,4 @@ ikiwiki 3.1415926 released with [[!toggle text="these changes"]]
larger in either dimension. larger in either dimension.
* [ Josh Triplett ] * [ Josh Triplett ]
* teximg: Replace the insufficient blacklist with the built-in security * teximg: Replace the insufficient blacklist with the built-in security
mechanisms of TeX."""]] mechanisms of TeX. ([[!cve CVE-2009-2944]])"""]]

View File

@ -426,4 +426,4 @@ bypassed and used to read arbitrary files. This was fixed by
enabling TeX configuration options that disallow unsafe TeX commands. enabling TeX configuration options that disallow unsafe TeX commands.
The fix was released on 30 Aug 2009 in version 3.1415926, and was The fix was released on 30 Aug 2009 in version 3.1415926, and was
backported to stable in version 2.53.4. If you use the teximg plugin, backported to stable in version 2.53.4. If you use the teximg plugin,
I recommend upgrading. I recommend upgrading. ([[!cve CVE-2009-2944]])