[Secure-testing-commits] r45081 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Wed Oct 5 18:20:52 UTC 2016


Author: carnil
Date: 2016-10-05 18:20:52 +0000 (Wed, 05 Oct 2016)
New Revision: 45081

Modified:
   data/CVE/list
Log:
CVE-2016-7977/ghostcript assigned

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-10-05 18:18:10 UTC (rev 45080)
+++ data/CVE/list	2016-10-05 18:20:52 UTC (rev 45081)
@@ -10,12 +10,12 @@
 	NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697179#c0
 	NOTE: Patch: http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git;a=commitdiff;h=d5ad1e02
 	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/10/05/7
-CVE-2016-XXXX [.libfile doesn't check PermitFileReading array, allowing remote file disclosure]
+CVE-2016-7977 [.libfile doesn't check PermitFileReading array, allowing remote file disclosure]
 	- ghostscript <unfixed> (high; bug #839841)
 	NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697169
 	NOTE: Reproducer: http://www.openwall.com/lists/oss-security/2016/09/29/28
-	NOTE: Patch: http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git;a=commitdiff;h=cf046d2
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/10/05/7
+	NOTE: Patch: http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git;h=cf046d2f0fa2c6973c6ca8d582a9b185cc4bd280
+	NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7
 CVE-2016-7976 [various userparams allow %pipe% in paths, allowing remote shell command execution]
 	- ghostscript <unfixed> (high; bug #839260)
 	NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697178
@@ -1581,8 +1581,6 @@
 	RESERVED
 CVE-2016-7978
 	RESERVED
-CVE-2016-7977
-	RESERVED
 CVE-2016-7975
 	RESERVED
 CVE-2016-7974




More information about the Secure-testing-commits mailing list