Advisories
Mandriva Advisories
|
![]() |
Problem Description |
The enscript program does not create temporary files in a secure
fashion and as such could be abused if enscript is run as root.
Updated Packages |
Mandrakelinux 7.1
3eab8fe4d7d2cd23b97536221e0fcfbf 7.1/RPMS/enscript-1.6.1-22.1mdk.i586.rpm 4648f17f6a409047f2adbcddb8c0ed35 7.1/SRPMS/enscript-1.6.1-22.1mdk.src.rpm
Mandrakelinux 7.2
497f83cde928d165173bc11b50de2cce 7.2/RPMS/enscript-1.6.1-22.1mdk.i586.rpm 4648f17f6a409047f2adbcddb8c0ed35 7.2/SRPMS/enscript-1.6.1-22.1mdk.src.rpm
Mandrakelinux 8.0
92600d81e8d2cde3bfee4512c0986a51 8.0/RPMS/enscript-1.6.1-22.1mdk.i586.rpm 4648f17f6a409047f2adbcddb8c0ed35 8.0/SRPMS/enscript-1.6.1-22.1mdk.src.rpm
Mandrakelinux 8.0/PPC
4e4a79ca2ba540e633bd09a8f3b2a8a2 ppc/8.0/RPMS/enscript-1.6.1-22.1mdk.ppc.rpm 4648f17f6a409047f2adbcddb8c0ed35 ppc/8.0/SRPMS/enscript-1.6.1-22.1mdk.src.rpm
Mandrakelinux 8.1
f30e305cd6b7050ab2088098a4ac0997 8.1/RPMS/enscript-1.6.1-22.1mdk.i586.rpm 4648f17f6a409047f2adbcddb8c0ed35 8.1/SRPMS/enscript-1.6.1-22.1mdk.src.rpm
Mandrakelinux 8.1/IA64
c787d13882ce88db37c26766406ce158 ia64/8.1/RPMS/enscript-1.6.1-22.1mdk.ia64.rpm 4648f17f6a409047f2adbcddb8c0ed35 ia64/8.1/SRPMS/enscript-1.6.1-22.1mdk.src.rpm
Corporate Server 1.0.1
3eab8fe4d7d2cd23b97536221e0fcfbf 1.0.1/RPMS/enscript-1.6.1-22.1mdk.i586.rpm 4648f17f6a409047f2adbcddb8c0ed35 1.0.1/SRPMS/enscript-1.6.1-22.1mdk.src.rpm
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.