[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Processed: Re: Bug#839260: ghostscript: various sandbox bypasses



Processing commands for control@bugs.debian.org:

> clone 839260 -1
Bug #839260 [ghostscript] ghostscript: various sandbox bypasses
Bug 839260 cloned as bug 839841
> retitle -1 ghostscript: .libfile doesn't check PermitFileReading array, allowing remote file disclosure
Bug #839841 [ghostscript] ghostscript: various sandbox bypasses
Changed Bug title to 'ghostscript: .libfile doesn't check PermitFileReading array, allowing remote file disclosure' from 'ghostscript: various sandbox bypasses'.
> forwarded -1 http://bugs.ghostscript.com/show_bug.cgi?id=697169
Bug #839841 [ghostscript] ghostscript: .libfile doesn't check PermitFileReading array, allowing remote file disclosure
Set Bug forwarded-to-address to 'http://bugs.ghostscript.com/show_bug.cgi?id=697169'.
> retitle 839260 ghostscript: various userparams allow %pipe% in paths, allowing remote shell command execution
Bug #839260 [ghostscript] ghostscript: various sandbox bypasses
Changed Bug title to 'ghostscript: various userparams allow %pipe% in paths, allowing remote shell command execution' from 'ghostscript: various sandbox bypasses'.
> forwarded 839260 http://bugs.ghostscript.com/show_bug.cgi?id=697178
Bug #839260 [ghostscript] ghostscript: various userparams allow %pipe% in paths, allowing remote shell command execution
Set Bug forwarded-to-address to 'http://bugs.ghostscript.com/show_bug.cgi?id=697178'.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
839260: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839260
839841: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839841
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems


Reply to: