Processed: Re: Bug#839118: ghostscript: CVE-2013-5653: getenv and filenameforall ignore -dSAFER

2016-10-12 Thread Debian Bug Tracking System
Processing control commands: > severity -1 serious Bug #839118 [ghostscript] ghostscript: CVE-2013-5653: getenv and filenameforall ignore -dSAFER Severity set to 'serious' from 'normal' -- 839118: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839118 Debian Bug Tracking System Contact ow...@b

Bug#839118: ghostscript: CVE-2013-5653: getenv and filenameforall ignore -dSAFER

2016-10-12 Thread Salvatore Bonaccorso
Control: severity -1 serious Rationale for severity increase: We ship DSA-3691-1 in jessie containing the fix, and not having the security fix in stretch then would be a regression. Regards, Salvatore

Processing of ghostscript_9.06~dfsg-2+deb8u2_allonly.changes

2016-10-12 Thread Debian FTP Masters
ghostscript_9.06~dfsg-2+deb8u2_allonly.changes uploaded successfully to localhost along with the files: ghostscript_9.06~dfsg-2+deb8u2.dsc ghostscript_9.06~dfsg-2+deb8u2.debian.tar.xz ghostscript-doc_9.06~dfsg-2+deb8u2_all.deb libgs9-common_9.06~dfsg-2+deb8u2_all.deb Greetings, Y

Processing of ghostscript_9.06~dfsg-2+deb8u3_allonly.changes

2016-10-12 Thread Debian FTP Masters
ghostscript_9.06~dfsg-2+deb8u3_allonly.changes uploaded successfully to localhost along with the files: ghostscript_9.06~dfsg-2+deb8u3.dsc ghostscript_9.06~dfsg-2+deb8u3.debian.tar.xz ghostscript-doc_9.06~dfsg-2+deb8u3_all.deb libgs9-common_9.06~dfsg-2+deb8u3_all.deb Greetings, Y

ghostscript_9.06~dfsg-2+deb8u2_allonly.changes ACCEPTED into proposed-updates->stable-new

2016-10-12 Thread Debian FTP Masters
Mapping stable-security to proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 08 Oct 2016 13:30:08 +0200 Source: ghostscript Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common libgs-dev ghostscript-dbg Architecture: all source

ghostscript_9.06~dfsg-2+deb8u3_allonly.changes ACCEPTED into proposed-updates->stable-new

2016-10-12 Thread Debian FTP Masters
Mapping stable-security to proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 11 Oct 2016 19:35:21 +0200 Source: ghostscript Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common libgs-dev ghostscript-dbg Architecture: all source

Bug#839846: marked as done (ghostscript: CVE-2016-7979: type confusion in .initialize_dsc_parser allows remote code execution)

2016-10-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Oct 2016 22:17:11 + with message-id and subject line Bug#839846: fixed in ghostscript 9.06~dfsg-2+deb8u2 has caused the Debian Bug report #839846, regarding ghostscript: CVE-2016-7979: type confusion in .initialize_dsc_parser allows remote code execution to be marke

Bug#839118: marked as done (ghostscript: CVE-2013-5653: getenv and filenameforall ignore -dSAFER)

2016-10-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Oct 2016 22:17:11 + with message-id and subject line Bug#839118: fixed in ghostscript 9.06~dfsg-2+deb8u2 has caused the Debian Bug report #839118, regarding ghostscript: CVE-2013-5653: getenv and filenameforall ignore -dSAFER to be marked as done. This means that yo

Bug#839260: marked as done (ghostscript: CVE-2016-7976: various userparams allow %pipe% in paths, allowing remote shell command execution)

2016-10-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Oct 2016 22:17:11 + with message-id and subject line Bug#839260: fixed in ghostscript 9.06~dfsg-2+deb8u2 has caused the Debian Bug report #839260, regarding ghostscript: CVE-2016-7976: various userparams allow %pipe% in paths, allowing remote shell command execution

Bug#839845: marked as done (ghostscript: CVE-2016-7978: reference leak in .setdevice allows use-after-free and remote code execution)

2016-10-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Oct 2016 22:17:11 + with message-id and subject line Bug#839845: fixed in ghostscript 9.06~dfsg-2+deb8u2 has caused the Debian Bug report #839845, regarding ghostscript: CVE-2016-7978: reference leak in .setdevice allows use-after-free and remote code execution to b

Bug#839841: marked as done (ghostscript: CVE-2016-7977: .libfile doesn't check PermitFileReading array, allowing remote file disclosure)

2016-10-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Oct 2016 22:17:11 + with message-id and subject line Bug#839841: fixed in ghostscript 9.06~dfsg-2+deb8u2 has caused the Debian Bug report #839841, regarding ghostscript: CVE-2016-7977: .libfile doesn't check PermitFileReading array, allowing remote file disclosure t

Bug#840451: marked as done (ghostscript: CVE-2016-8602)

2016-10-12 Thread Debian Bug Tracking System
Your message dated Wed, 12 Oct 2016 22:17:31 + with message-id and subject line Bug#840451: fixed in ghostscript 9.06~dfsg-2+deb8u3 has caused the Debian Bug report #840451, regarding ghostscript: CVE-2016-8602 to be marked as done. This means that you claim that the problem has been dealt wi

ghostscript_9.06~dfsg-2+deb8u2_allonly.changes ACCEPTED into proposed-updates->stable-new, proposed-updates

2016-10-12 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Sat, 08 Oct 2016 13:30:08 +0200 Source: ghostscript Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common libgs-dev ghostscript-dbg Architecture: all source Version: 9.06~dfsg-2+deb8u2 Distribution: je

ghostscript_9.06~dfsg-2+deb8u3_allonly.changes ACCEPTED into proposed-updates->stable-new, proposed-updates

2016-10-12 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 11 Oct 2016 19:35:21 +0200 Source: ghostscript Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common libgs-dev ghostscript-dbg Architecture: all source Version: 9.06~dfsg-2+deb8u3 Distribution: je