Processing control commands:
> severity -1 serious
Bug #839118 [ghostscript] ghostscript: CVE-2013-5653: getenv and filenameforall
ignore -dSAFER
Severity set to 'serious' from 'normal'
--
839118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839118
Debian Bug Tracking System
Contact ow...@b
Control: severity -1 serious
Rationale for severity increase: We ship DSA-3691-1 in jessie
containing the fix, and not having the security fix in stretch then
would be a regression.
Regards,
Salvatore
ghostscript_9.06~dfsg-2+deb8u2_allonly.changes uploaded successfully to
localhost
along with the files:
ghostscript_9.06~dfsg-2+deb8u2.dsc
ghostscript_9.06~dfsg-2+deb8u2.debian.tar.xz
ghostscript-doc_9.06~dfsg-2+deb8u2_all.deb
libgs9-common_9.06~dfsg-2+deb8u2_all.deb
Greetings,
Y
ghostscript_9.06~dfsg-2+deb8u3_allonly.changes uploaded successfully to
localhost
along with the files:
ghostscript_9.06~dfsg-2+deb8u3.dsc
ghostscript_9.06~dfsg-2+deb8u3.debian.tar.xz
ghostscript-doc_9.06~dfsg-2+deb8u3_all.deb
libgs9-common_9.06~dfsg-2+deb8u3_all.deb
Greetings,
Y
Mapping stable-security to proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 08 Oct 2016 13:30:08 +0200
Source: ghostscript
Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common
libgs-dev ghostscript-dbg
Architecture: all source
Mapping stable-security to proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 11 Oct 2016 19:35:21 +0200
Source: ghostscript
Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common
libgs-dev ghostscript-dbg
Architecture: all source
Your message dated Wed, 12 Oct 2016 22:17:11 +
with message-id
and subject line Bug#839846: fixed in ghostscript 9.06~dfsg-2+deb8u2
has caused the Debian Bug report #839846,
regarding ghostscript: CVE-2016-7979: type confusion in .initialize_dsc_parser
allows remote code execution
to be marke
Your message dated Wed, 12 Oct 2016 22:17:11 +
with message-id
and subject line Bug#839118: fixed in ghostscript 9.06~dfsg-2+deb8u2
has caused the Debian Bug report #839118,
regarding ghostscript: CVE-2013-5653: getenv and filenameforall ignore -dSAFER
to be marked as done.
This means that yo
Your message dated Wed, 12 Oct 2016 22:17:11 +
with message-id
and subject line Bug#839260: fixed in ghostscript 9.06~dfsg-2+deb8u2
has caused the Debian Bug report #839260,
regarding ghostscript: CVE-2016-7976: various userparams allow %pipe% in paths,
allowing remote shell command execution
Your message dated Wed, 12 Oct 2016 22:17:11 +
with message-id
and subject line Bug#839845: fixed in ghostscript 9.06~dfsg-2+deb8u2
has caused the Debian Bug report #839845,
regarding ghostscript: CVE-2016-7978: reference leak in .setdevice allows
use-after-free and remote code execution
to b
Your message dated Wed, 12 Oct 2016 22:17:11 +
with message-id
and subject line Bug#839841: fixed in ghostscript 9.06~dfsg-2+deb8u2
has caused the Debian Bug report #839841,
regarding ghostscript: CVE-2016-7977: .libfile doesn't check PermitFileReading
array, allowing remote file disclosure
t
Your message dated Wed, 12 Oct 2016 22:17:31 +
with message-id
and subject line Bug#840451: fixed in ghostscript 9.06~dfsg-2+deb8u3
has caused the Debian Bug report #840451,
regarding ghostscript: CVE-2016-8602
to be marked as done.
This means that you claim that the problem has been dealt wi
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 08 Oct 2016 13:30:08 +0200
Source: ghostscript
Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common
libgs-dev ghostscript-dbg
Architecture: all source
Version: 9.06~dfsg-2+deb8u2
Distribution: je
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 11 Oct 2016 19:35:21 +0200
Source: ghostscript
Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common
libgs-dev ghostscript-dbg
Architecture: all source
Version: 9.06~dfsg-2+deb8u3
Distribution: je
14 matches
Mail list logo