[Secure-testing-commits] r45081 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Wed Oct 5 18:20:52 UTC 2016
Author: carnil
Date: 2016-10-05 18:20:52 +0000 (Wed, 05 Oct 2016)
New Revision: 45081
Modified:
data/CVE/list
Log:
CVE-2016-7977/ghostcript assigned
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-10-05 18:18:10 UTC (rev 45080)
+++ data/CVE/list 2016-10-05 18:20:52 UTC (rev 45081)
@@ -10,12 +10,12 @@
NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697179#c0
NOTE: Patch: http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git;a=commitdiff;h=d5ad1e02
NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/10/05/7
-CVE-2016-XXXX [.libfile doesn't check PermitFileReading array, allowing remote file disclosure]
+CVE-2016-7977 [.libfile doesn't check PermitFileReading array, allowing remote file disclosure]
- ghostscript <unfixed> (high; bug #839841)
NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697169
NOTE: Reproducer: http://www.openwall.com/lists/oss-security/2016/09/29/28
- NOTE: Patch: http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git;a=commitdiff;h=cf046d2
- NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2016/10/05/7
+ NOTE: Patch: http://git.ghostscript.com/?p=user/chrisl/ghostpdl.git;h=cf046d2f0fa2c6973c6ca8d582a9b185cc4bd280
+ NOTE: http://www.openwall.com/lists/oss-security/2016/10/05/7
CVE-2016-7976 [various userparams allow %pipe% in paths, allowing remote shell command execution]
- ghostscript <unfixed> (high; bug #839260)
NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697178
@@ -1581,8 +1581,6 @@
RESERVED
CVE-2016-7978
RESERVED
-CVE-2016-7977
- RESERVED
CVE-2016-7975
RESERVED
CVE-2016-7974
More information about the Secure-testing-commits
mailing list