CVE
parent
7021fc3646
commit
8aeac3b666
|
@ -43,7 +43,7 @@ ikiwiki (3.1415926) unstable; urgency=high
|
|||
|
||||
[ Josh Triplett ]
|
||||
* teximg: Replace the insufficient blacklist with the built-in security
|
||||
mechanisms of TeX.
|
||||
mechanisms of TeX. (CVE-2009-2944)
|
||||
|
||||
-- Joey Hess <joeyh@debian.org> Sun, 30 Aug 2009 15:20:46 -0400
|
||||
|
||||
|
|
|
@ -50,4 +50,4 @@ ikiwiki 3.1415926 released with [[!toggle text="these changes"]]
|
|||
larger in either dimension.
|
||||
* [ Josh Triplett ]
|
||||
* teximg: Replace the insufficient blacklist with the built-in security
|
||||
mechanisms of TeX."""]]
|
||||
mechanisms of TeX. ([[!cve CVE-2009-2944]])"""]]
|
||||
|
|
|
@ -426,4 +426,4 @@ bypassed and used to read arbitrary files. This was fixed by
|
|||
enabling TeX configuration options that disallow unsafe TeX commands.
|
||||
The fix was released on 30 Aug 2009 in version 3.1415926, and was
|
||||
backported to stable in version 2.53.4. If you use the teximg plugin,
|
||||
I recommend upgrading.
|
||||
I recommend upgrading. ([[!cve CVE-2009-2944]])
|
||||
|
|
Loading…
Reference in New Issue