Processed: retitle 839846 to ghostscript: CVE-2016-7979: type confusion in .initialize_dsc_parser allows remote code execution ...
Processing commands for control@bugs.debian.org:
> retitle 839846 ghostscript: CVE-2016-7979: type confusion in .initialize_dsc_parser allows remote code execution
Bug #839846 [src:ghostscript] ghostscript: type confusion in .initialize_dsc_parser allows remote code execution
Changed Bug title to 'ghostscript: CVE-2016-7979: type confusion in .initialize_dsc_parser allows remote code execution' from 'ghostscript: type confusion in .initialize_dsc_parser allows remote code execution'.
> retitle 839845 ghostscript: CVE-2016-7978: reference leak in .setdevice allows use-after-free and remote code execution
Bug #839845 [src:ghostscript] ghostscript: reference leak in .setdevice allows use-after-free and remote code execution
Changed Bug title to 'ghostscript: CVE-2016-7978: reference leak in .setdevice allows use-after-free and remote code execution' from 'ghostscript: reference leak in .setdevice allows use-after-free and remote code execution'.
> retitle 839841 ghostscript: CVE-2016-7977: .libfile doesn't check PermitFileReading array, allowing remote file disclosure
Bug #839841 [ghostscript] ghostscript: .libfile doesn't check PermitFileReading array, allowing remote file disclosure
Changed Bug title to 'ghostscript: CVE-2016-7977: .libfile doesn't check PermitFileReading array, allowing remote file disclosure' from 'ghostscript: .libfile doesn't check PermitFileReading array, allowing remote file disclosure'.
> retitle 839260 ghostscript: CVE-2016-7976: various userparams allow %pipe% in paths, allowing remote shell command execution
Bug #839260 [ghostscript] ghostscript: various userparams allow %pipe% in paths, allowing remote shell command execution
Changed Bug title to 'ghostscript: CVE-2016-7976: various userparams allow %pipe% in paths, allowing remote shell command execution' from 'ghostscript: various userparams allow %pipe% in paths, allowing remote shell command execution'.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
839260: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839260
839841: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839841
839845: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839845
839846: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839846
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
Reply to: