[Bug 270800] print/ghostscript10: please fix CVE-2023-28879 by updating to 10.01.1
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 270800] print/ghostscript10: please fix CVE-2023-28879 by updating to 10.01.1"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 270800] print/ghostscript10: please fix CVE-2023-28879 by updating to 10.01.1"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 270800] print/ghostscript10: please fix CVE-2023-28879 by updating to 10.01.1"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 270800] print/ghostscript10: please fix CVE-2023-28879 by updating to 10.01.1"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 12 Apr 2023 20:24:21 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=270800 Bug ID: 270800 Summary: print/ghostscript10: please fix CVE-2023-28879 by updating to 10.01.1 Product: Ports & Packages Version: Latest Hardware: Any URL: https://artifex.com/news/critical-security-vulnerabili ty-fixed-in-ghostscript OS: Any Status: New Keywords: security Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: mandree@FreeBSD.org CC: michael.osipov@siemens.com CC: michael.osipov@siemens.com Flags: maintainer-feedback?(michael.osipov@siemens.com) Please update to 10.01.1 which fixes CVE-2023-28879, and add a vulndb entry, see https://artifex.com/news/critical-security-vulnerability-fixed-in-ghostscript -- You are receiving this mail because: You are the assignee for the bug.