* New upstream version (3.0.1.2):
– cups-x2go{,.conf}: port to File::Temp. Use Text::ParseWords to split up the ps2pdf command line correctly. Don’t use system() but IPC::Open2::open2(). Capture the ps2pdf program’s stdout and write it to the temporary file handle “manually”. Should fix problems reported by Jan Bi on IRC.
– cups-x2go: fix commented out second ps2pdf definition to output PDF data to stdout.
* New upstream version (3.0.1.3):
– cups-x2go: import tempfile() function from File::Temp module.
– cups-x2go: only repeat the last X, not the whole “.pdfX” string (or the like.)
– cups-x2go: actually print “real” executed command instead of the “original” one with placeholders.
– cups-x2go: read output from ghostscript, don’t write a filehandle to the temporary file. Fixes a hanging ghostscript call and… well… random junk, instead of a “real” PDF file.
– cups-x2go: use parentheses around function arguments.
– cups-x2go: fix binmode() call, :raw layer is implicit.
– cups-x2go: fix print call… Does not allow to separate parameters with a comma.
– cups-x2go: add correct :raw layer to binmode calls.
– cups-x2go: fix tiny typo.
– cups-x2go: read data from GS and STDIN in chunks of 8 kbytes, instead of everything at once. Handles large print jobs gracefully.
– cups-x2go: add parentheses to close() calls.
– cups-x2go: delete PDF and title temporary files automatically.
– cups-x2go: unlink PS temporary file on-demand in END block. Also move closelog to END block, because we want to print diagnosis messages in the END block.
– cups-x2go: don’t use unlink() explicitly. Trust File::Temp and our END block to clean up correctly.
– cups-x2go: there is no continue in perl for stepping forward a loop. Still not. I keep forgetting that. Use next. (Partly) Fixes: #887.
– cups-x2go: use the same temp file template for PS, PDF and title files. Use appropriate suffixes if necessary when generating PDF and title temp files. (Fully) Fixes: #887.
Update to 3.0.1.1:
– Add a short README that provides some getting started information.
Update to 3.0.1.1:
– Add a short README that provides some getting started information.
Monthly Archives: June 2015
Fedora EPEL 6 Security Update: rubygem-extlib-0.9.16-1.el6
Resolved Bugs
917234 – CVE-2013-1802 Ruby Gem extlib: YAML parameter parsing vulnerability [epel-all]<br
Update to 0.9.16
Fedora EPEL 5 Security Update: drupal6-6.36-1.el5
Resolved Bugs
1232971 – drupal6-6.36 is available<br
– Release 6.36 is a security fix release
– Upstream release notes: https://www.drupal.org/drupal-6.36-release-notes
Fedora EPEL 6 Security Update: drupal7-7.38-1.el6
Resolved Bugs
1232972 – drupal7-7.38 is available<br
– Release 7.38 is a security fix release
– Upstream release notes: https://www.drupal.org/drupal-7.38-release-notes
Fedora EPEL 5 Security Update: rubygem-extlib-0.9.16-1.el5
Resolved Bugs
917234 – CVE-2013-1802 Ruby Gem extlib: YAML parameter parsing vulnerability [epel-all]<br
Update to 0.9.16
Fedora EPEL 6 Security Update: drupal6-6.36-1.el6
Resolved Bugs
1232971 – drupal6-6.36 is available<br
– Release 6.36 is a security fix release
– Upstream release notes: https://www.drupal.org/drupal-6.36-release-notes
CVE-2015-4197
Cisco NX-OS 5.2(5) on Nexus 7000 devices allows remote attackers to cause a denial of service (device crash) by sending a malformed LLDP packet on the local network, aka Bug ID CSCud89415.
CVE-2015-4198
Cross-site scripting (XSS) vulnerability in the web framework on Cisco Web Security Appliance (WSA) devices with software 8.5.0-497 allows remote attackers to inject arbitrary web script or HTML via an unspecified HTTP header, aka Bug ID CSCuu24409.
CVE-2015-4202
Cisco IOS 12.2SCH on uBR10000 router Cable Modem Termination Systems (CMTS) does not properly restrict access to the IP Detail Record (IPDR) service, which allows remote attackers to obtain potentially sensitive MAC address and network-utilization information via crafted IPDR packets, aka Bug ID CSCua39203.
ABH WORLD SQL Injection
Sites developed by ABH WORLD suffer from a remote SQL injection vulnerability.