Processing commands for cont...@bugs.debian.org:
> unarchive 835434
Bug #835434 {Done: Didier 'OdyX' Raboud } [src:cups] cups:
FTBFS too much often (failing test)
Unarchived Bug 835434
> retitle 835434 cups: FTBFS randomly (failing test)
Bug #835434 {Done: Didier 'OdyX' Raboud } [src:cups] cups:
Processing commands for cont...@bugs.debian.org:
> found 840691 9.05~dfsg-6.3+deb7u3
Bug #840691 [libgs9] libgs9: security update DSA-3691-1 breaks zathura, evince,
... in jessie
Bug #842154 [libgs9] evince: Crashed while opening PS document
There is no source info for the package 'libgs9' at ver
Hi
I now have uploaded the version (see previously sent debdiff) to
security master and will release the regression update once all archs
have build the packages.
Regards,
Salvatore
On Fri, Oct 28, 2016 at 02:05:25PM +0200, Salvatore Bonaccorso wrote:
> Hi
>
> I now have uploaded the version (see previously sent debdiff) to
> security master and will release the regression update once all archs
> have build the packages.
>
Hi,
I have now also uploaded the wheezy packages us
Many apologies, Matteo. Because I read bug reports in debian-printing I
inadvertently sent the mail below there and not to you or the bug.
I have tried everything I can think of to reproduce your issue on Jessie
and unstable but without success. One last try! There is probably some
repetition of w
Hi,
I have released cups-filters 1.11.5 now, with the following changes:
- cups-browsed: Fixed several typos in the documentation (Bug
#1378).
- gstoraster, mupdftoraster, pdftops, sys5ippprinter: Use
execvp() and execvpe() to call programs so that the $PATH
ghostscript_9.06~dfsg-2+deb8u4_multi.changes uploaded successfully to localhost
along with the files:
ghostscript_9.06~dfsg-2+deb8u4.dsc
ghostscript_9.06~dfsg-2+deb8u4.debian.tar.xz
ghostscript-doc_9.06~dfsg-2+deb8u4_all.deb
libgs9-common_9.06~dfsg-2+deb8u4_all.deb
Greetings,
Your
> On Wed, Oct 19, 2016 at 8:57 PM, Roger Shimizu wrote:
>>
>> so you can use git-buildpackage to build the package:
>>gbp clone --pristine-tar https://github.com/rogers0/fxlinuxprint
>>cd fxlinuxprint
>>git checkout try_debian2
>>gbp buildpackage -uc -us --git-ignore-branch --git-p
Mapping stable-security to proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 27 Oct 2016 12:51:34 +0200
Source: ghostscript
Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common
libgs-dev ghostscript-dbg
Architecture: all source
ghostscript_9.19~dfsg-3.1_allonly.changes uploaded successfully to localhost
along with the files:
ghostscript_9.19~dfsg-3.1.dsc
ghostscript_9.19~dfsg-3.1.debian.tar.xz
ghostscript-doc_9.19~dfsg-3.1_all.deb
libgs9-common_9.19~dfsg-3.1_all.deb
Greetings,
Your Debian queue daemon (r
Your message dated Fri, 28 Oct 2016 18:20:44 +
with message-id
and subject line Bug#839260: fixed in ghostscript 9.19~dfsg-3.1
has caused the Debian Bug report #839260,
regarding ghostscript: CVE-2016-7976: various userparams allow %pipe% in paths,
allowing remote shell command execution
to b
Your message dated Fri, 28 Oct 2016 18:20:44 +
with message-id
and subject line Bug#839845: fixed in ghostscript 9.19~dfsg-3.1
has caused the Debian Bug report #839845,
regarding ghostscript: CVE-2016-7978: reference leak in .setdevice allows
use-after-free and remote code execution
to be mar
Your message dated Fri, 28 Oct 2016 18:20:44 +
with message-id
and subject line Bug#839841: fixed in ghostscript 9.19~dfsg-3.1
has caused the Debian Bug report #839841,
regarding ghostscript: CVE-2016-7977: .libfile doesn't check PermitFileReading
array, allowing remote file disclosure
to be
Your message dated Fri, 28 Oct 2016 18:20:44 +
with message-id
and subject line Bug#839118: fixed in ghostscript 9.19~dfsg-3.1
has caused the Debian Bug report #839118,
regarding ghostscript: CVE-2013-5653: getenv and filenameforall ignore -dSAFER
to be marked as done.
This means that you cla
Your message dated Fri, 28 Oct 2016 18:20:44 +
with message-id
and subject line Bug#840451: fixed in ghostscript 9.19~dfsg-3.1
has caused the Debian Bug report #840451,
regarding ghostscript: CVE-2016-8602
to be marked as done.
This means that you claim that the problem has been dealt with.
I
Your message dated Fri, 28 Oct 2016 18:20:44 +
with message-id
and subject line Bug#839846: fixed in ghostscript 9.19~dfsg-3.1
has caused the Debian Bug report #839846,
regarding ghostscript: CVE-2016-7979: type confusion in .initialize_dsc_parser
allows remote code execution
to be marked as
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Thu, 27 Oct 2016 13:25:52 +0200
Source: ghostscript
Binary: ghostscript ghostscript-x ghostscript-doc libgs9 libgs9-common
libgs-dev ghostscript-dbg
Architecture: all source
Version: 9.19~dfsg-3.1
Distribution: unstabl
17 matches
Mail list logo