Your message dated Wed, 2 Jun 2010 00:22:27 +0100
with message-id <201006020022.32660.stu...@nanonanonano.net>
and subject line Re: Bug#584031: pyxplot: Security bugs in ghostscript
has caused the Debian Bug report #584031,
regarding pyxplot: Security bugs in ghostscript
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
584031: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=584031
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: pyxplot
Severity: grave
Tags: security
Justification: user security hole


Please note remote execute-any-code security bugs in ghostscript:

  http://bugs.debian.org/583183

This package depends on ghostscript, and may be affected. Please
evaluate the security of this package, and fix if needed.

Thanks,

Paul Szabo   p...@maths.usyd.edu.au   http://www.maths.usyd.edu.au/u/psz/
School of Mathematics and Statistics   University of Sydney    Australia


-- System Information:
Debian Release: 5.0.4
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-pk03.17-svr (SMP w/8 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash



--- End Message ---
--- Begin Message ---
pyxplot makes all its calls to gs from inside a temp directory that is only 
writable by the user who is running pyxplot; so it would seem that this is 
quite irrelevant to pyxplot.


-- 
Stuart Prescott                 www.nanoNANOnano.net

ph  +44 117 33 18387
fax +44 117 925 0612

Attachment: signature.asc
Description: This is a digitally signed message part.


--- End Message ---

Reply via email to