[Secure-testing-commits] r45720 - data/CVE
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Fri Oct 28 17:47:02 UTC 2016
Author: carnil
Date: 2016-10-28 17:47:02 +0000 (Fri, 28 Oct 2016)
New Revision: 45720
Modified:
data/CVE/list
Log:
Add fixed version for ghostscript upload to unstable
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2016-10-28 17:04:05 UTC (rev 45719)
+++ data/CVE/list 2016-10-28 17:47:02 UTC (rev 45720)
@@ -1547,7 +1547,7 @@
CVE-2016-8602 [type confusion]
RESERVED
{DSA-3691-1 DLA-674-1}
- - ghostscript <unfixed> (bug #840451)
+ - ghostscript 9.19~dfsg-3.1 (bug #840451)
NOTE: http://bugs.ghostscript.com/show_bug.cgi?id=697203
NOTE: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=f5c7555c30393e64ec1f5ab0dfae5b55b3b3fc78
CVE-2016-8601 [do_blockdev_direct_IO invalid memory access]
@@ -1794,7 +1794,7 @@
CVE-2016-7979 [type confusion in .initialize_dsc_parser allows remote code execution]
RESERVED
{DSA-3691-1 DLA-674-1}
- - ghostscript <unfixed> (bug #839846)
+ - ghostscript 9.19~dfsg-3.1 (bug #839846)
NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697190
NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697190#c0
NOTE: Patch: http://git.ghostscript.com/?p=ghostpdl.git;h=875a0095f37626a721c7ff57d606a0f95af03913
@@ -1803,7 +1803,7 @@
CVE-2016-7978 [reference leak in .setdevice allows use-after-free and remote code execution]
RESERVED
{DSA-3691-1 DLA-674-1}
- - ghostscript <unfixed> (bug #839845)
+ - ghostscript 9.19~dfsg-3.1 (bug #839845)
NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697179
NOTE: Reproducer: http://bugs.ghostscript.com/show_bug.cgi?id=697179#c0
NOTE: Patch: http://git.ghostscript.com/?p=ghostpdl.git;h=6f749c0c44e7b9e09737b9f29edf29925a34f0cf
@@ -1811,7 +1811,7 @@
CVE-2016-7977 [.libfile doesn't check PermitFileReading array, allowing remote file disclosure]
RESERVED
{DSA-3691-1 DLA-674-1}
- - ghostscript <unfixed> (high; bug #839841)
+ - ghostscript 9.19~dfsg-3.1 (high; bug #839841)
NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697169
NOTE: Reproducer: http://www.openwall.com/lists/oss-security/2016/09/29/28
NOTE: Patch: http://git.ghostscript.com/?p=ghostpdl.git;h=8abd22010eb4db0fb1b10e430d5f5d83e015ef70
@@ -1819,7 +1819,7 @@
CVE-2016-7976 [various userparams allow %pipe% in paths, allowing remote shell command execution]
RESERVED
{DSA-3691-1 DLA-674-1}
- - ghostscript <unfixed> (high; bug #839260)
+ - ghostscript 9.19~dfsg-3.1 (high; bug #839260)
NOTE: Upstream bug: http://bugs.ghostscript.com/show_bug.cgi?id=697178
NOTE: Reproducer: http://www.openwall.com/lists/oss-security/2016/09/30/8
NOTE: Patch: http://git.ghostscript.com/?p=ghostpdl.git;h=6d444c273da5499a4cd72f21cb6d4c9a5256807d
@@ -84262,7 +84262,7 @@
CVE-2013-5653 [Ghostscript information disclosure through getenv, filenameforall]
RESERVED
{DSA-3691-1 DLA-674-1}
- - ghostscript <unfixed> (low; bug #839118)
+ - ghostscript 9.19~dfsg-3.1 (low; bug #839118)
NOTE: http://bugs.ghostscript.com/show_bug.cgi?id=694724
NOTE: http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ab109aaeb3ddba59518b036fb288402a65cf7ce8
CVE-2013-5652
More information about the Secure-testing-commits
mailing list