Processing commands for cont...@bugs.debian.org: > # > # bts-link upstream status pull for source package ghostscript > # see http://lists.debian.org/debian-devel-announce/2006/05/msg00001.html > # > user bts-link-upstr...@lists.alioth.debian.org Setting user to bts-link-upstr...@lists.alioth.debian.org (was bts-link-de...@lists.alioth.debian.org). > # remote status report for #839260 (http://bugs.debian.org/839260) > # Bug title: ghostscript: CVE-2016-7976: various userparams allow %pipe% in > paths, allowing remote shell command execution > # * http://bugs.ghostscript.com/show_bug.cgi?id=697178 > # * remote status changed: (?) -> RESOLVED > # * remote resolution changed: (?) -> FIXED > # * closed upstream > tags 839260 + fixed-upstream Bug #839260 [ghostscript] ghostscript: CVE-2016-7976: various userparams allow %pipe% in paths, allowing remote shell command execution Added tag(s) fixed-upstream. > usertags 839260 + status-RESOLVED resolution-FIXED There were no usertags set. Usertags are now: resolution-FIXED status-RESOLVED. > # remote status report for #839841 (http://bugs.debian.org/839841) > # Bug title: ghostscript: CVE-2016-7977: .libfile doesn't check > PermitFileReading array, allowing remote file disclosure > # * http://bugs.ghostscript.com/show_bug.cgi?id=697169 > # * remote status changed: (?) -> RESOLVED > # * remote resolution changed: (?) -> FIXED > # * closed upstream > tags 839841 + fixed-upstream Bug #839841 [ghostscript] ghostscript: CVE-2016-7977: .libfile doesn't check PermitFileReading array, allowing remote file disclosure Added tag(s) fixed-upstream. > usertags 839841 + status-RESOLVED resolution-FIXED There were no usertags set. Usertags are now: status-RESOLVED resolution-FIXED. > thanks Stopping processing here.
Please contact me if you need assistance. -- 839260: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839260 839841: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839841 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems