Follow-up Comment #1, bug #66333 (group groff):

It is documented here:-

https://www.kb.cert.org/vuls/id/332928/

It appears the vulnerability was addressed in ghostscript 9.24 so if you have
a later version it is no longer necessary to employ the proscribed workaround.
However, debian don't seem to have got their act together and removed the
workaround - even in bookworm with gs 10.0.0!

I will see if I can work around it - the "workaround"!!



    _______________________________________________________

Reply to this item at:

  <https://savannah.gnu.org/bugs/?66333>

_______________________________________________
Message sent via Savannah
https://savannah.gnu.org/

Attachment: signature.asc
Description: PGP signature

Reply via email to