Debian Bug report logs -
#858350
ghostscript: CVE-2017-7207
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Printing Team <debian-printing@lists.debian.org>
:
Bug#858350
; Package src:ghostscript
.
(Tue, 21 Mar 2017 15:06:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Debian Printing Team <debian-printing@lists.debian.org>
.
(Tue, 21 Mar 2017 15:06:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: ghostscript
Version: 9.06~dfsg-2
Severity: important
Tags: patch security upstream
Forwarded: https://bugs.ghostscript.com/show_bug.cgi?id=697676
Hi,
the following vulnerability was published for ghostscript.
CVE-2017-7207[0]:
| The mem_get_bits_rectangle function in Artifex Software, Inc.
| Ghostscript 9.20 allows remote attackers to cause a denial of service
| (NULL pointer dereference) via a crafted PostScript document.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-7207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
Marked as found in versions ghostscript/9.20~dfsg-1~exp1.
Request was from Jonas Smedegaard <dr@jones.dk>
to control@bugs.debian.org
.
(Tue, 21 Mar 2017 16:30:03 GMT) (full text, mbox, link).
Marked as fixed in versions ghostscript/9.20~dfsg-3.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Thu, 23 Mar 2017 18:45:02 GMT) (full text, mbox, link).
Marked Bug as done
Request was from Salvatore Bonaccorso <carnil@debian.org>
to control@bugs.debian.org
.
(Thu, 23 Mar 2017 18:45:03 GMT) (full text, mbox, link).
Notification sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Bug acknowledged by developer.
(Thu, 23 Mar 2017 18:45:04 GMT) (full text, mbox, link).
Message sent on
to Salvatore Bonaccorso <carnil@debian.org>
:
Bug#858350.
(Thu, 23 Mar 2017 18:45:06 GMT) (full text, mbox, link).
Message #16 received at 858350-submitter@bugs.debian.org (full text, mbox, reply):
# close the Debian Bug
close 858350 9.20~dfsg-3
thanks
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian Printing Team <debian-printing@lists.debian.org>
:
Bug#858350
; Package src:ghostscript
.
(Thu, 23 Mar 2017 20:27:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
Extra info received and forwarded to list. Copy sent to Debian Printing Team <debian-printing@lists.debian.org>
.
(Thu, 23 Mar 2017 20:27:03 GMT) (full text, mbox, link).
Message #21 received at 858350@bugs.debian.org (full text, mbox, reply):
hi Jonas
Thanks for fixing CVE-2017-7207 in unstable. Can you ask as well
release team for an unblock, so that the fix goes to stretch?
Btw, there was a wrong bug closer for this bug (using the upstream bug
number instead), thus closed this one manually.
Regards,
Salvatore
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian Printing Team <debian-printing@lists.debian.org>
:
Bug#858350
; Package src:ghostscript
.
(Thu, 23 Mar 2017 21:21:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Jonas Smedegaard <dr@jones.dk>
:
Extra info received and forwarded to list. Copy sent to Debian Printing Team <debian-printing@lists.debian.org>
.
(Thu, 23 Mar 2017 21:21:02 GMT) (full text, mbox, link).
Message #26 received at 858350@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi Salvatore,
Quoting Salvatore Bonaccorso (2017-03-23 21:25:33)
> Thanks for fixing CVE-2017-7207 in unstable. Can you ask as well
> release team for an unblock, so that the fix goes to stretch?
Yes, I will try...
> Btw, there was a wrong bug closer for this bug (using the upstream bug
> number instead), thus closed this one manually.
Ah, that's what happened. I did notice your closing the bug I believed
to already be closed. Sorry for that!
- Jonas
--
* Jonas Smedegaard - idealist & Internet-arkitekt
* Tlf.: +45 40843136 Website: http://dr.jones.dk/
[x] quote me freely [ ] ask before reusing [ ] keep private
[signature.asc (application/pgp-signature, inline)]
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org
.
(Fri, 28 Apr 2017 07:27:28 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 16:55:13 2019;
Machine Name:
beach
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.