Date: Wed, 12 Apr 2023 20:24:21 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 270800] print/ghostscript10: please fix CVE-2023-28879 by updating to 10.01.1 Message-ID: <bug-270800-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270800 Bug ID: 270800 Summary: print/ghostscript10: please fix CVE-2023-28879 by updating to 10.01.1 Product: Ports & Packages Version: Latest Hardware: Any URL: https://artifex.com/news/critical-security-vulnerabili ty-fixed-in-ghostscript OS: Any Status: New Keywords: security Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: mandree@FreeBSD.org CC: michael.osipov@siemens.com CC: michael.osipov@siemens.com Flags: maintainer-feedback?(michael.osipov@siemens.com) Please update to 10.01.1 which fixes CVE-2023-28879, and add a vulndb entry, see https://artifex.com/news/critical-security-vulnerability-fixed-in-ghostscri= pt --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-270800-7788>