Processing commands for cont...@bugs.debian.org: > clone 839260 -1 Bug #839260 [ghostscript] ghostscript: various sandbox bypasses Bug 839260 cloned as bug 839841 > retitle -1 ghostscript: .libfile doesn't check PermitFileReading array, > allowing remote file disclosure Bug #839841 [ghostscript] ghostscript: various sandbox bypasses Changed Bug title to 'ghostscript: .libfile doesn't check PermitFileReading array, allowing remote file disclosure' from 'ghostscript: various sandbox bypasses'. > forwarded -1 http://bugs.ghostscript.com/show_bug.cgi?id=697169 Bug #839841 [ghostscript] ghostscript: .libfile doesn't check PermitFileReading array, allowing remote file disclosure Set Bug forwarded-to-address to 'http://bugs.ghostscript.com/show_bug.cgi?id=697169'. > retitle 839260 ghostscript: various userparams allow %pipe% in paths, > allowing remote shell command execution Bug #839260 [ghostscript] ghostscript: various sandbox bypasses Changed Bug title to 'ghostscript: various userparams allow %pipe% in paths, allowing remote shell command execution' from 'ghostscript: various sandbox bypasses'. > forwarded 839260 http://bugs.ghostscript.com/show_bug.cgi?id=697178 Bug #839260 [ghostscript] ghostscript: various userparams allow %pipe% in paths, allowing remote shell command execution Set Bug forwarded-to-address to 'http://bugs.ghostscript.com/show_bug.cgi?id=697178'. > thanks Stopping processing here.
Please contact me if you need assistance. -- 839260: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839260 839841: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839841 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems