Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 12 Apr 2023 20:24:21 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 270800] print/ghostscript10: please fix CVE-2023-28879 by updating to 10.01.1
Message-ID:  <bug-270800-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270800

            Bug ID: 270800
           Summary: print/ghostscript10: please fix CVE-2023-28879 by
                    updating to 10.01.1
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: https://artifex.com/news/critical-security-vulnerabili
                    ty-fixed-in-ghostscript
                OS: Any
            Status: New
          Keywords: security
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs@FreeBSD.org
          Reporter: mandree@FreeBSD.org
                CC: michael.osipov@siemens.com
                CC: michael.osipov@siemens.com
             Flags: maintainer-feedback?(michael.osipov@siemens.com)

Please update to 10.01.1 which fixes CVE-2023-28879, and add a vulndb entry,
see
https://artifex.com/news/critical-security-vulnerability-fixed-in-ghostscri=
pt

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-270800-7788>