From: Joey Hess Date: Sun, 30 Aug 2009 21:48:14 +0000 (-0400) Subject: CVE X-Git-Tag: 3.14159265~91 X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/commitdiff_plain/8aeac3b6666eee4bcabf0e5c49bf1806d9410983 CVE --- diff --git a/debian/changelog b/debian/changelog index ee8e74027..4dd47d2dd 100644 --- a/debian/changelog +++ b/debian/changelog @@ -43,7 +43,7 @@ ikiwiki (3.1415926) unstable; urgency=high [ Josh Triplett ] * teximg: Replace the insufficient blacklist with the built-in security - mechanisms of TeX. + mechanisms of TeX. (CVE-2009-2944) -- Joey Hess Sun, 30 Aug 2009 15:20:46 -0400 diff --git a/doc/news/version_3.1415926.mdwn b/doc/news/version_3.1415926.mdwn index c914c83cd..d31812c8e 100644 --- a/doc/news/version_3.1415926.mdwn +++ b/doc/news/version_3.1415926.mdwn @@ -50,4 +50,4 @@ ikiwiki 3.1415926 released with [[!toggle text="these changes"]] larger in either dimension. * [ Josh Triplett ] * teximg: Replace the insufficient blacklist with the built-in security - mechanisms of TeX."""]] \ No newline at end of file + mechanisms of TeX. ([[!cve CVE-2009-2944]])"""]] diff --git a/doc/security.mdwn b/doc/security.mdwn index 200ae29e2..3924186c2 100644 --- a/doc/security.mdwn +++ b/doc/security.mdwn @@ -426,4 +426,4 @@ bypassed and used to read arbitrary files. This was fixed by enabling TeX configuration options that disallow unsafe TeX commands. The fix was released on 30 Aug 2009 in version 3.1415926, and was backported to stable in version 2.53.4. If you use the teximg plugin, -I recommend upgrading. +I recommend upgrading. ([[!cve CVE-2009-2944]])