Debian Package Tracker
Register | Log in
Subscribe

ghostwriter

Distraction-free, themeable Markdown editor

Choose email to subscribe with

general
  • source: ghostwriter (main)
  • version: 2.1.1-1
  • maintainer: Sebastien CHAVAUX (DMD)
  • uploaders: ghost [DMD]
  • arch: amd64 arm64 armhf i386 mips64el mipsel
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 1.7.4-2
  • stable: 1.8.1-2
  • stable-bpo: 2.0.2-2~bpo11+1
  • testing: 2.1.1-1
  • unstable: 2.1.1-1
versioned links
  • 1.7.4-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.8.1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.0.2-2~bpo11+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.1.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • ghostwriter
action needed
A new upstream version is available: 2.1.2 high
A new upstream version 2.1.2 is available, you should consider packaging it.
Created: 2022-03-19 Last update: 2022-05-28 15:31
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2018-12-25 Last update: 2022-05-28 05:40
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2022-24724: cmark-gfm is GitHub's extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm's table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered.
Created: 2022-03-04 Last update: 2022-03-05 07:04
1 security issue in buster high

There is 1 open security issue in buster.

1 important issue:
  • CVE-2022-24724: cmark-gfm is GitHub's extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm's table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered.
Created: 2022-03-04 Last update: 2022-03-05 07:04
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2022-24724: cmark-gfm is GitHub's extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm's table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered.
Created: 2022-03-04 Last update: 2022-03-05 07:04
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2022-24724: cmark-gfm is GitHub's extended version of the C reference implementation of CommonMark. Prior to versions 0.29.0.gfm.3 and 0.28.3.gfm.21, an integer overflow in cmark-gfm's table row parsing `table.c:row_from_string` may lead to heap memory corruption when parsing tables who's marker rows contain more than UINT16_MAX columns. The impact of this heap corruption ranges from Information Leak to Arbitrary Code Execution depending on how and where `cmark-gfm` is used. If `cmark-gfm` is used for rendering remote user controlled markdown, this vulnerability may lead to Remote Code Execution (RCE) in applications employing affected versions of the `cmark-gfm` library. This vulnerability has been patched in the following cmark-gfm versions 0.29.0.gfm.3 and 0.28.3.gfm.21. A workaround is available. The vulnerability exists in the table markdown extensions of cmark-gfm. Disabling the table extension will prevent this vulnerability from being triggered.
Created: 2022-03-04 Last update: 2022-03-05 07:04
lintian reports 35 warnings normal
Lintian reports 35 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-01-27 Last update: 2021-11-05 04:32
AppStream hints: 1 warning normal
AppStream found metadata issues for packages:
  • ghostwriter: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2019-03-07 Last update: 2021-10-30 04:36
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.0).
Created: 2020-11-17 Last update: 2022-05-11 23:25
news
[rss feed]
  • [2022-01-03] ghostwriter 2.1.1-1 MIGRATED to testing (Debian testing watch)
  • [2021-12-29] Accepted ghostwriter 2.1.1-1 (source) into unstable (Sebastien CHAVAUX) (signed by: Adam Borowski)
  • [2021-12-06] Accepted ghostwriter 2.0.2-2~bpo11+1 (source amd64) into bullseye-backports, bullseye-backports (Debian FTP Masters) (signed by: Adam Borowski)
  • [2021-12-01] ghostwriter 2.1.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-11-25] Accepted ghostwriter 2.1.0-2 (source) into unstable (Sebastien CHAVAUX) (signed by: Adam Borowski)
  • [2021-11-05] ghostwriter 2.0.2-2 MIGRATED to testing (Debian testing watch)
  • [2021-10-30] Accepted ghostwriter 2.0.2-2 (source) into unstable (Sebastien CHAVAUX) (signed by: Adam Borowski)
  • [2021-10-29] Accepted ghostwriter 2.0.2-1 (source) into unstable (Sebastien CHAVAUX) (signed by: Adam Borowski)
  • [2020-11-29] ghostwriter 1.8.1-2 MIGRATED to testing (Debian testing watch)
  • [2020-11-24] Accepted ghostwriter 1.8.1-2 (source) into unstable (Sebastien CHAVAUX) (signed by: Bart Martens)
  • [2020-03-07] ghostwriter 1.8.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-03-02] Accepted ghostwriter 1.8.1-1 (source) into unstable (Sebastien CHAVAUX) (signed by: Adam Borowski)
  • [2020-01-10] ghostwriter 1.8.0-2 MIGRATED to testing (Debian testing watch)
  • [2019-07-27] Accepted ghostwriter 1.8.0-2 (source) into unstable (Sebastien CHAVAUX) (signed by: Bart Martens)
  • [2019-05-03] Accepted ghostwriter 1.8.0-1 (source) into experimental (Sebastien CHAVAUX) (signed by: Adam Borowski)
  • [2019-03-28] ghostwriter 1.7.4-2 MIGRATED to testing (Debian testing watch)
  • [2019-03-06] Accepted ghostwriter 1.7.4-2 (source amd64) into unstable (Sebastien CHAVAUX) (signed by: Bart Martens)
  • [2019-01-02] ghostwriter 1.7.4-1 MIGRATED to testing (Debian testing watch)
  • [2018-12-28] Accepted ghostwriter 1.7.4-1 (source) into unstable (Sebastien CHAVAUX) (signed by: Adam Borowski)
  • [2018-12-24] Accepted ghostwriter 1.7.3-1 (source amd64) into unstable, unstable (ghost)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 35)
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.1.1-1
  • 1 bug

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing