View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/ghostscript
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2018-10-01 14:38:06 UTC 2018-10-01
DSC file for 9.25~dfsg+1-0ubuntu0.16.04.1

Author: Ubuntu Git Importer
Author Date: 2018-10-01 14:38:06 UTC

DSC file for 9.25~dfsg+1-0ubuntu0.16.04.1

applied/ubuntu/bionic-security 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-applied version 9.25~dfsg+1-0ubuntu0.18.04.1 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2018-09-27 11:27:17 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.18.04.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 23474dd37da636400f0bcb473d16120d7a2de479
Unapplied parent: 4528dac6e86ae0d40c0d27b01b05e441759f1e73

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: refreshed from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/libgs9.symbols: updated with new symbols.

ubuntu/bionic-updates 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.18.04.1 to ubuntu/bioni...

Author: Marc Deslauriers
Author Date: 2018-09-27 11:27:17 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.18.04.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 8a511f785d464def81b2000e067e114d1cf467de

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: refreshed from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/libgs9.symbols: updated with new symbols.

ubuntu/trusty-security 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.1 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2018-09-27 13:46:18 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e18dde5ad234fbd4a53414af088dac596b93fceb

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.
    - debian/rules: use bundled lcms2 as trusty version is too old.

ubuntu/trusty-updates 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.1 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2018-09-27 13:46:18 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e18dde5ad234fbd4a53414af088dac596b93fceb

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.
    - debian/rules: use bundled lcms2 as trusty version is too old.

applied/ubuntu/trusty-updates 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.1 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2018-09-27 13:46:18 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 57379f4d93802c230875d0bd9f15e471b2c6edad
Unapplied parent: aa6f3e20916c9d647f97cb27d41e520c68df7b61

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.
    - debian/rules: use bundled lcms2 as trusty version is too old.

ubuntu/bionic-devel 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.18.04.1 to ubuntu/bioni...

Author: Marc Deslauriers
Author Date: 2018-09-27 11:27:17 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.18.04.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 8a511f785d464def81b2000e067e114d1cf467de

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: refreshed from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/libgs9.symbols: updated with new symbols.

applied/ubuntu/xenial-devel 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.1 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2018-09-27 12:16:57 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: dbe7b66450d5b18c3c02883870e72e807968c0ea
Unapplied parent: ec692fd50c4bbce1196925b7eb4c6a567d80e588

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.

applied/ubuntu/trusty-devel 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.1 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2018-09-27 13:46:18 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 57379f4d93802c230875d0bd9f15e471b2c6edad
Unapplied parent: aa6f3e20916c9d647f97cb27d41e520c68df7b61

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.
    - debian/rules: use bundled lcms2 as trusty version is too old.

ubuntu/trusty-devel 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.1 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2018-09-27 13:46:18 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.1 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: e18dde5ad234fbd4a53414af088dac596b93fceb

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.
    - debian/rules: use bundled lcms2 as trusty version is too old.

ubuntu/xenial-security 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.1 to ubuntu/xenia...

Author: Marc Deslauriers
Author Date: 2018-09-27 12:16:57 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 18afd64d8fa4f5a8f04b850285118051830f69d3

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.

applied/ubuntu/trusty-security 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.1 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2018-09-27 13:46:18 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.1 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: 57379f4d93802c230875d0bd9f15e471b2c6edad
Unapplied parent: aa6f3e20916c9d647f97cb27d41e520c68df7b61

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.
    - debian/rules: use bundled lcms2 as trusty version is too old.

applied/ubuntu/bionic-updates 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-applied version 9.25~dfsg+1-0ubuntu0.18.04.1 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2018-09-27 11:27:17 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.18.04.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 23474dd37da636400f0bcb473d16120d7a2de479
Unapplied parent: 4528dac6e86ae0d40c0d27b01b05e441759f1e73

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: refreshed from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/libgs9.symbols: updated with new symbols.

ubuntu/xenial-updates 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.1 to ubuntu/xenia...

Author: Marc Deslauriers
Author Date: 2018-09-27 12:16:57 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 18afd64d8fa4f5a8f04b850285118051830f69d3

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.

applied/ubuntu/xenial-updates 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.1 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2018-09-27 12:16:57 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: dbe7b66450d5b18c3c02883870e72e807968c0ea
Unapplied parent: ec692fd50c4bbce1196925b7eb4c6a567d80e588

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.

ubuntu/bionic-security 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.18.04.1 to ubuntu/bioni...

Author: Marc Deslauriers
Author Date: 2018-09-27 11:27:17 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.18.04.1 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 8a511f785d464def81b2000e067e114d1cf467de

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: refreshed from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/libgs9.symbols: updated with new symbols.

applied/ubuntu/bionic-devel 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-applied version 9.25~dfsg+1-0ubuntu0.18.04.1 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2018-09-27 11:27:17 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.18.04.1 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 23474dd37da636400f0bcb473d16120d7a2de479
Unapplied parent: 4528dac6e86ae0d40c0d27b01b05e441759f1e73

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: refreshed from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/libgs9.symbols: updated with new symbols.

applied/ubuntu/xenial-security 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.1 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2018-09-27 12:16:57 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.1 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: dbe7b66450d5b18c3c02883870e72e807968c0ea
Unapplied parent: ec692fd50c4bbce1196925b7eb4c6a567d80e588

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.

ubuntu/xenial-devel 2018-10-01 12:03:12 UTC 2018-10-01
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.1 to ubuntu/xenia...

Author: Marc Deslauriers
Author Date: 2018-09-27 12:16:57 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.1 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 18afd64d8fa4f5a8f04b850285118051830f69d3

New changelog entries:
  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.

importer/debian/dsc 2018-09-15 16:43:48 UTC 2018-09-15
DSC file for 9.25~dfsg-2

Author: Ubuntu Git Importer
Author Date: 2018-09-15 16:43:48 UTC

DSC file for 9.25~dfsg-2

debian/buster 2018-09-15 16:30:18 UTC 2018-09-15
Import patches-unapplied version 9.25~dfsg-2 to debian/sid

Author: Jonas Smedegaard
Author Date: 2018-09-15 12:18:15 UTC

Import patches-unapplied version 9.25~dfsg-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d63cadca3975beef87119b7f022541e62c8c1069

New changelog entries:
  * Add/correct bug-closures for previous releases 9.25~dfsg-1,
    9.25~dfsg-1~exp1, 9.24~~rc2~dfsg-1, 9.21~dfsg-1.
  * Set urgency=high due to recent CVE fixes.

applied/debian/buster 2018-09-15 16:30:18 UTC 2018-09-15
Import patches-applied version 9.25~dfsg-2 to applied/debian/sid

Author: Jonas Smedegaard
Author Date: 2018-09-15 12:18:15 UTC

Import patches-applied version 9.25~dfsg-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 1ff4abfef5f93c6b6206b41ed8bda90281989cd9
Unapplied parent: da1bc21b29f12640e000ed59ff587bdd44b301af

New changelog entries:
  * Add/correct bug-closures for previous releases 9.25~dfsg-1,
    9.25~dfsg-1~exp1, 9.24~~rc2~dfsg-1, 9.21~dfsg-1.
  * Set urgency=high due to recent CVE fixes.

applied/debian/sid 2018-09-15 16:30:18 UTC 2018-09-15
Import patches-applied version 9.25~dfsg-2 to applied/debian/sid

Author: Jonas Smedegaard
Author Date: 2018-09-15 12:18:15 UTC

Import patches-applied version 9.25~dfsg-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 1ff4abfef5f93c6b6206b41ed8bda90281989cd9
Unapplied parent: da1bc21b29f12640e000ed59ff587bdd44b301af

New changelog entries:
  * Add/correct bug-closures for previous releases 9.25~dfsg-1,
    9.25~dfsg-1~exp1, 9.24~~rc2~dfsg-1, 9.21~dfsg-1.
  * Set urgency=high due to recent CVE fixes.

debian/sid 2018-09-15 16:30:18 UTC 2018-09-15
Import patches-unapplied version 9.25~dfsg-2 to debian/sid

Author: Jonas Smedegaard
Author Date: 2018-09-15 12:18:15 UTC

Import patches-unapplied version 9.25~dfsg-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: d63cadca3975beef87119b7f022541e62c8c1069

New changelog entries:
  * Add/correct bug-closures for previous releases 9.25~dfsg-1,
    9.25~dfsg-1~exp1, 9.24~~rc2~dfsg-1, 9.21~dfsg-1.
  * Set urgency=high due to recent CVE fixes.

debian/experimental 2018-09-14 22:26:12 UTC 2018-09-14
Import patches-unapplied version 9.25~dfsg-1~exp1 to debian/experimental

Author: Jonas Smedegaard
Author Date: 2018-09-14 16:39:11 UTC

Import patches-unapplied version 9.25~dfsg-1~exp1 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: d3067f0a675a1be6543ed36a378c177c5bff410a

New changelog entries:
  [ upstream ]
  * New bugfix release(s).
    Closes: Bug#907703, #908300, #908303, #908304, #908305
    (CVE-2018-16509, CVE-2018-16543, CVE-2018-16510, CVE-2018-16585).
    Thanks to Salvatore Bonaccorso.
  * Update copyright info:
    + Stop exclude image containing non-DFSG ICC profile when
      repackaging upstream source: Fixed upstream.
    + Fix cover license FTL.
  * Set Rules-Requires-Root: no.
  * Update symbols:
    + Drop commented out obsolete symbols.
    + Flag as optional symbols not declared in public header files.
  * Avoid privacy breach linking documentation to jquery:
    + Add patch 2009 to use local jquery.
    + Add symlink from relative link to system-shared jquery library.
    + Have ghostscript-doc depend on libjs-jquery.
  * Avoid privacy breach linking documentation to font:
    + Avoid linking to remote fonts in documentation.
  * Avoid privacy breach linking documentation with Google:
    + Strip googletagmanager code from documentation.

applied/debian/experimental 2018-09-14 22:26:12 UTC 2018-09-14
Import patches-applied version 9.25~dfsg-1~exp1 to applied/debian/experimental

Author: Jonas Smedegaard
Author Date: 2018-09-14 16:39:11 UTC

Import patches-applied version 9.25~dfsg-1~exp1 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: f1d3b85780d550666c3f18775a9782ddeea3c0c9
Unapplied parent: 593521da86f7ed59a29763557141a2bc914c5c3f

New changelog entries:
  [ upstream ]
  * New bugfix release(s).
    Closes: Bug#907703, #908300, #908303, #908304, #908305
    (CVE-2018-16509, CVE-2018-16543, CVE-2018-16510, CVE-2018-16585).
    Thanks to Salvatore Bonaccorso.
  * Update copyright info:
    + Stop exclude image containing non-DFSG ICC profile when
      repackaging upstream source: Fixed upstream.
    + Fix cover license FTL.
  * Set Rules-Requires-Root: no.
  * Update symbols:
    + Drop commented out obsolete symbols.
    + Flag as optional symbols not declared in public header files.
  * Avoid privacy breach linking documentation to jquery:
    + Add patch 2009 to use local jquery.
    + Add symlink from relative link to system-shared jquery library.
    + Have ghostscript-doc depend on libjs-jquery.
  * Avoid privacy breach linking documentation to font:
    + Avoid linking to remote fonts in documentation.
  * Avoid privacy breach linking documentation with Google:
    + Strip googletagmanager code from documentation.

ubuntu/devel 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 67a6f88ffdd2514bd8e8ea08bdf8cd67ff04cf37

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/cosmic-devel 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 67a6f88ffdd2514bd8e8ea08bdf8cd67ff04cf37

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/cosmic-proposed 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 67a6f88ffdd2514bd8e8ea08bdf8cd67ff04cf37

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/devel 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-...

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 8537fa03cb840bafc5f040b1dfb3fec6816c6c4f
Unapplied parent: 1c475491322882c1ea333d99bef5081b4799c162

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/cosmic-devel 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-...

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 8537fa03cb840bafc5f040b1dfb3fec6816c6c4f
Unapplied parent: 1c475491322882c1ea333d99bef5081b4799c162

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/cosmic-proposed 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-...

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 8537fa03cb840bafc5f040b1dfb3fec6816c6c4f
Unapplied parent: 1c475491322882c1ea333d99bef5081b4799c162

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/cosmic 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-...

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 8537fa03cb840bafc5f040b1dfb3fec6816c6c4f
Unapplied parent: 1c475491322882c1ea333d99bef5081b4799c162

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/cosmic 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 67a6f88ffdd2514bd8e8ea08bdf8cd67ff04cf37

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/debian/stretch 2018-07-14 10:55:30 UTC 2018-07-14
Import patches-applied version 9.20~dfsg-3.2+deb9u2 to applied/debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2018-04-29 08:58:15 UTC

Import patches-applied version 9.20~dfsg-3.2+deb9u2 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 2df7b15261599cc7f29751f21dccb9a881a57af8
Unapplied parent: edfb2027dd51be1f696a926e1d0dced4e778f193

New changelog entries:
  * Non-maintainer upload.
  * Segfault with fuzzing file in gxht_thresh_image_init
  * Buffer overflow in fill_threshold_buffer (CVE-2016-10317)
    (Closes: #860869)
  * pdfwrite - Guard against trying to output an infinite number
    (CVE-2018-10194) (Closes: #896069)

debian/stretch 2018-07-14 10:55:30 UTC 2018-07-14
Import patches-unapplied version 9.20~dfsg-3.2+deb9u2 to debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2018-04-29 08:58:15 UTC

Import patches-unapplied version 9.20~dfsg-3.2+deb9u2 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: 29230b3e0abfd80c787f96716163552f4f5f2e67

New changelog entries:
  * Non-maintainer upload.
  * Segfault with fuzzing file in gxht_thresh_image_init
  * Buffer overflow in fill_threshold_buffer (CVE-2016-10317)
    (Closes: #860869)
  * pdfwrite - Guard against trying to output an infinite number
    (CVE-2018-10194) (Closes: #896069)

debian/jessie 2018-06-23 17:11:31 UTC 2018-06-23
Import patches-unapplied version 9.06~dfsg-2+deb8u7 to debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2018-04-29 09:58:34 UTC

Import patches-unapplied version 9.06~dfsg-2+deb8u7 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: 917507a4c9a20532b0dea730759d702f3ae1114b

New changelog entries:
  * Non-maintainer upload.
  * Segfault with fuzzing file in gxht_thresh_image_init
  * Buffer overflow in fill_threshold_buffer (CVE-2016-10317)
    (Closes: #860869)
  * pdfwrite - Guard against trying to output an infinite number
    (CVE-2018-10194) (Closes: #896069)

applied/debian/jessie 2018-06-23 17:11:31 UTC 2018-06-23
Import patches-applied version 9.06~dfsg-2+deb8u7 to applied/debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2018-04-29 09:58:34 UTC

Import patches-applied version 9.06~dfsg-2+deb8u7 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: f3b14e29112bf3b040c10f5cd4fc8449b02ac1ad
Unapplied parent: 5db5e955c01be3a1426d5b5599d3380b8202241d

New changelog entries:
  * Non-maintainer upload.
  * Segfault with fuzzing file in gxht_thresh_image_init
  * Buffer overflow in fill_threshold_buffer (CVE-2016-10317)
    (Closes: #860869)
  * pdfwrite - Guard against trying to output an infinite number
    (CVE-2018-10194) (Closes: #896069)

ubuntu/artful-updates 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

applied/ubuntu/artful-updates 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

ubuntu/artful-devel 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

applied/ubuntu/artful-devel 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

applied/ubuntu/artful-security 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

ubuntu/artful-security 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

importer/ubuntu/pristine-tar 2018-04-04 12:59:35 UTC 2018-04-04
pristine-tar data for ghostscript_9.22~dfsg+1.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-04 12:59:35 UTC

pristine-tar data for ghostscript_9.22~dfsg+1.orig.tar.xz

importer/debian/pristine-tar 2018-04-04 06:01:57 UTC 2018-04-04
pristine-tar data for ghostscript_9.22~dfsg.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-04 06:01:57 UTC

pristine-tar data for ghostscript_9.22~dfsg.orig.tar.xz

ubuntu/bionic 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 516297b89f58a8151e8b7f73b3f5b2bcc670c407

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/bionic-proposed 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 516297b89f58a8151e8b7f73b3f5b2bcc670c407

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/bionic 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-...

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 27718e9264c34de3de6202c0784a2da7cce56916
Unapplied parent: 194da0bc7420d2b168069211f89bf959e78eeb62

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/bionic-proposed 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-...

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 27718e9264c34de3de6202c0784a2da7cce56916
Unapplied parent: 194da0bc7420d2b168069211f89bf959e78eeb62

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/artful-proposed 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-...

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 5e666f10924159d823a049f8c8a845414838a23d
Unapplied parent: 91c7402d8aa53ed0f95ca8905886d97872fc397b

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/artful 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 7d35ddbba538415fb0b0a0d53890e3aea5f8a878

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/artful-proposed 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 7d35ddbba538415fb0b0a0d53890e3aea5f8a878

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/artful 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-...

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 5e666f10924159d823a049f8c8a845414838a23d
Unapplied parent: 91c7402d8aa53ed0f95ca8905886d97872fc397b

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-updates 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-devel 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-security 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-updates 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-devel 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-security 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/yakkety-security 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/yakkety-devel 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/yakkety-devel 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/yakkety-updates 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/yakkety-security 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/yakkety-updates 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/precise-security 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

ubuntu/precise-devel 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-devel 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

ubuntu/precise-security 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

ubuntu/precise-updates 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-updates 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/zesty 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty...

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 9554d00244f2b020d91077a8466122dfab86324e
Unapplied parent: d5b8d2ce5402553d13edaeb44258b55347330f38

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

ubuntu/zesty 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: b74d140153e04ec188365976c921f8bca5acd060

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

applied/ubuntu/zesty-proposed 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty...

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 9554d00244f2b020d91077a8466122dfab86324e
Unapplied parent: d5b8d2ce5402553d13edaeb44258b55347330f38

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

ubuntu/zesty-proposed 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: b74d140153e04ec188365976c921f8bca5acd060

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

applied/ubuntu/yakkety-proposed 2016-11-17 21:03:20 UTC 2016-11-17
Import patches-applied version 9.19~dfsg+1-0ubuntu6.1 to applied/ubuntu/yakke...

Author: Till Kamppeter
Author Date: 2016-11-14 19:37:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.1 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 60b9fa94c2c2ac35e197d89f5730d287122d2c93
Unapplied parent: 42bfd89a157befabc1c41b4caf1013f20ec70498

New changelog entries:
  * debian/patches/020161028~0726780_gdevcups-pwgraster-bitmap-always-without-margins.patch:
    "cups" output device: When creating PWG Raster output, always output
    the bitmap of the full page, ignoring any unprintable margins suggested
    by the PPD file (LP: #1637583).

ubuntu/yakkety-proposed 2016-11-17 21:03:20 UTC 2016-11-17
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.1 to ubuntu/yakkety-pro...

Author: Till Kamppeter
Author Date: 2016-11-14 19:37:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.1 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: f603943b777bc1c1985e4f288dca15fe264be933

New changelog entries:
  * debian/patches/020161028~0726780_gdevcups-pwgraster-bitmap-always-without-margins.patch:
    "cups" output device: When creating PWG Raster output, always output
    the bitmap of the full page, ignoring any unprintable margins suggested
    by the PPD file (LP: #1637583).

ubuntu/yakkety 2016-09-30 19:14:47 UTC 2016-09-30
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6 to ubuntu/yakkety-proposed

Author: Gunnar Hjalmarsson
Author Date: 2016-09-22 08:50:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: f75f177d159e8f648fb24a4a839ab558f7fe62ec

New changelog entries:
  * debian/rules:
    + Revert the dependency change in 9.19~dfsg+1-0ubuntu3
      (LP: #1625734, LP: #1626245).

applied/ubuntu/yakkety 2016-09-30 19:14:47 UTC 2016-09-30
Import patches-applied version 9.19~dfsg+1-0ubuntu6 to applied/ubuntu/yakkety...

Author: Gunnar Hjalmarsson
Author Date: 2016-09-22 08:50:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 945849eca21b5baa4ae47957b5961907898fbf65
Unapplied parent: c68ba3fbf317aff3070e6757e5cf85b7ee4ba5bd

New changelog entries:
  * debian/rules:
    + Revert the dependency change in 9.19~dfsg+1-0ubuntu3
      (LP: #1625734, LP: #1626245).

ubuntu/xenial-proposed 2016-02-29 11:09:14 UTC 2016-02-29
Import patches-unapplied version 9.18~dfsg~0-0ubuntu2 to ubuntu/xenial-proposed

Author: Sebastien Bacher
Author Date: 2016-02-29 10:35:03 UTC

Import patches-unapplied version 9.18~dfsg~0-0ubuntu2 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: c9e4971f438585f19e53c27c3bbe8b0d6614ecc2

New changelog entries:
  * Backport change from Debian
    "Add patch cherry-picked upstream to fix add gserrors.h to the
     installed files for the so-install target."

applied/ubuntu/xenial-proposed 2016-02-29 11:09:14 UTC 2016-02-29
Import patches-applied version 9.18~dfsg~0-0ubuntu2 to applied/ubuntu/xenial-...

Author: Sebastien Bacher
Author Date: 2016-02-29 10:35:03 UTC

Import patches-applied version 9.18~dfsg~0-0ubuntu2 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 2768f9c006f74d74715adafc6f79351d255e4148
Unapplied parent: 6d06cf635f7a7493af314a901c976921a64c6468

New changelog entries:
  * Backport change from Debian
    "Add patch cherry-picked upstream to fix add gserrors.h to the
     installed files for the so-install target."

applied/ubuntu/xenial 2016-02-29 11:09:14 UTC 2016-02-29
Import patches-applied version 9.18~dfsg~0-0ubuntu2 to applied/ubuntu/xenial-...

Author: Sebastien Bacher
Author Date: 2016-02-29 10:35:03 UTC

Import patches-applied version 9.18~dfsg~0-0ubuntu2 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 2768f9c006f74d74715adafc6f79351d255e4148
Unapplied parent: 6d06cf635f7a7493af314a901c976921a64c6468

New changelog entries:
  * Backport change from Debian
    "Add patch cherry-picked upstream to fix add gserrors.h to the
     installed files for the so-install target."

ubuntu/xenial 2016-02-29 11:09:14 UTC 2016-02-29
Import patches-unapplied version 9.18~dfsg~0-0ubuntu2 to ubuntu/xenial-proposed

Author: Sebastien Bacher
Author Date: 2016-02-29 10:35:03 UTC

Import patches-unapplied version 9.18~dfsg~0-0ubuntu2 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: c9e4971f438585f19e53c27c3bbe8b0d6614ecc2

New changelog entries:
  * Backport change from Debian
    "Add patch cherry-picked upstream to fix add gserrors.h to the
     installed files for the so-install target."

ubuntu/wily-devel 2015-09-19 17:08:24 UTC 2015-09-19
Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Author: Till Kamppeter
Author Date: 2015-09-19 16:51:09 UTC

Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 7901a0dde15c5c47562203e6a250d09f7aa81f46

New changelog entries:
  * debian/rules: Demote texlive-lang-cjk from Recommends: to Suggests:
    as it pulls in a large amount of unneeded packages (LP: #1449875).

applied/ubuntu/wily-proposed 2015-09-19 17:08:24 UTC 2015-09-19
Import patches-applied version 9.16~dfsg~0-0ubuntu3 to applied/ubuntu/wily-pr...

Author: Till Kamppeter
Author Date: 2015-09-19 16:51:09 UTC

Import patches-applied version 9.16~dfsg~0-0ubuntu3 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 05e8bcc89aa38c2750ad8266191c20e5b49bc50b
Unapplied parent: 3d9bb732c2ad9f6d4bc1b936c1fd687d64a1cc5e

New changelog entries:
  * debian/rules: Demote texlive-lang-cjk from Recommends: to Suggests:
    as it pulls in a large amount of unneeded packages (LP: #1449875).

applied/ubuntu/wily-devel 2015-09-19 17:08:24 UTC 2015-09-19
Import patches-applied version 9.16~dfsg~0-0ubuntu3 to applied/ubuntu/wily-pr...

Author: Till Kamppeter
Author Date: 2015-09-19 16:51:09 UTC

Import patches-applied version 9.16~dfsg~0-0ubuntu3 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 05e8bcc89aa38c2750ad8266191c20e5b49bc50b
Unapplied parent: 3d9bb732c2ad9f6d4bc1b936c1fd687d64a1cc5e

New changelog entries:
  * debian/rules: Demote texlive-lang-cjk from Recommends: to Suggests:
    as it pulls in a large amount of unneeded packages (LP: #1449875).

applied/ubuntu/wily 2015-09-19 17:08:24 UTC 2015-09-19
Import patches-applied version 9.16~dfsg~0-0ubuntu3 to applied/ubuntu/wily-pr...

Author: Till Kamppeter
Author Date: 2015-09-19 16:51:09 UTC

Import patches-applied version 9.16~dfsg~0-0ubuntu3 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 05e8bcc89aa38c2750ad8266191c20e5b49bc50b
Unapplied parent: 3d9bb732c2ad9f6d4bc1b936c1fd687d64a1cc5e

New changelog entries:
  * debian/rules: Demote texlive-lang-cjk from Recommends: to Suggests:
    as it pulls in a large amount of unneeded packages (LP: #1449875).

ubuntu/wily 2015-09-19 17:08:24 UTC 2015-09-19
Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Author: Till Kamppeter
Author Date: 2015-09-19 16:51:09 UTC

Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 7901a0dde15c5c47562203e6a250d09f7aa81f46

New changelog entries:
  * debian/rules: Demote texlive-lang-cjk from Recommends: to Suggests:
    as it pulls in a large amount of unneeded packages (LP: #1449875).

ubuntu/wily-proposed 2015-09-19 17:08:24 UTC 2015-09-19
Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Author: Till Kamppeter
Author Date: 2015-09-19 16:51:09 UTC

Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 7901a0dde15c5c47562203e6a250d09f7aa81f46

New changelog entries:
  * debian/rules: Demote texlive-lang-cjk from Recommends: to Suggests:
    as it pulls in a large amount of unneeded packages (LP: #1449875).

applied/debian/wheezy 2015-09-05 16:54:32 UTC 2015-09-05
Import patches-applied version 9.05~dfsg-6.3+deb7u2 to applied/debian/wheezy

Author: Salvatore Bonaccorso
Author Date: 2015-08-01 06:14:20 UTC

Import patches-applied version 9.05~dfsg-6.3+deb7u2 to applied/debian/wheezy

Imported using git-ubuntu import.

Changelog parent: e0c135729eac791730410d1072c7048a9bf31f11
Unapplied parent: 6430fd046ff1804e22d43b8c84000ca96cf50139

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Add CVE-2015-3228.patch patch.
    CVE-2015-3228: Integer overflow in gs_heap_alloc_bytes() (Closes: #793489)

debian/wheezy 2015-09-05 16:54:32 UTC 2015-09-05
Import patches-unapplied version 9.05~dfsg-6.3+deb7u2 to debian/wheezy

Author: Salvatore Bonaccorso
Author Date: 2015-08-01 06:14:20 UTC

Import patches-unapplied version 9.05~dfsg-6.3+deb7u2 to debian/wheezy

Imported using git-ubuntu import.

Changelog parent: 455e0e2c41ab69e5669ae4d78873603725ffdac7

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Add CVE-2015-3228.patch patch.
    CVE-2015-3228: Integer overflow in gs_heap_alloc_bytes() (Closes: #793489)

ubuntu/vivid-updates 2015-07-30 12:28:41 UTC 2015-07-30
Import patches-unapplied version 9.15+dfsg-0ubuntu2.1 to ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2015-07-29 20:00:29 UTC

Import patches-unapplied version 9.15+dfsg-0ubuntu2.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: f2fe76f030efc0540c88d08d6aea11d6548856cb

New changelog entries:
  * SECURITY UPDATE: integer overflow in gs_heap_alloc_bytes()
    - debian/patches/CVE-2015-3228.patch: added sanity check to
      base/gsmalloc.c.
    - CVE-2015-3228

applied/ubuntu/vivid-updates 2015-07-30 12:28:41 UTC 2015-07-30
Import patches-applied version 9.15+dfsg-0ubuntu2.1 to applied/ubuntu/vivid-s...

Author: Marc Deslauriers
Author Date: 2015-07-29 20:00:29 UTC

Import patches-applied version 9.15+dfsg-0ubuntu2.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: f573ce2d4487b65492045338d8d12e662cfdbcd7
Unapplied parent: 885ec94ea5b04394f17db23674a90fac75c18590

New changelog entries:
  * SECURITY UPDATE: integer overflow in gs_heap_alloc_bytes()
    - debian/patches/CVE-2015-3228.patch: added sanity check to
      base/gsmalloc.c.
    - CVE-2015-3228

applied/ubuntu/vivid-security 2015-07-30 12:28:41 UTC 2015-07-30
Import patches-applied version 9.15+dfsg-0ubuntu2.1 to applied/ubuntu/vivid-s...

Author: Marc Deslauriers
Author Date: 2015-07-29 20:00:29 UTC

Import patches-applied version 9.15+dfsg-0ubuntu2.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: f573ce2d4487b65492045338d8d12e662cfdbcd7
Unapplied parent: 885ec94ea5b04394f17db23674a90fac75c18590

New changelog entries:
  * SECURITY UPDATE: integer overflow in gs_heap_alloc_bytes()
    - debian/patches/CVE-2015-3228.patch: added sanity check to
      base/gsmalloc.c.
    - CVE-2015-3228

applied/ubuntu/vivid-devel 2015-07-30 12:28:41 UTC 2015-07-30
Import patches-applied version 9.15+dfsg-0ubuntu2.1 to applied/ubuntu/vivid-s...

Author: Marc Deslauriers
Author Date: 2015-07-29 20:00:29 UTC

Import patches-applied version 9.15+dfsg-0ubuntu2.1 to applied/ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: f573ce2d4487b65492045338d8d12e662cfdbcd7
Unapplied parent: 885ec94ea5b04394f17db23674a90fac75c18590

New changelog entries:
  * SECURITY UPDATE: integer overflow in gs_heap_alloc_bytes()
    - debian/patches/CVE-2015-3228.patch: added sanity check to
      base/gsmalloc.c.
    - CVE-2015-3228

ubuntu/vivid-devel 2015-07-30 12:28:41 UTC 2015-07-30
Import patches-unapplied version 9.15+dfsg-0ubuntu2.1 to ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2015-07-29 20:00:29 UTC

Import patches-unapplied version 9.15+dfsg-0ubuntu2.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: f2fe76f030efc0540c88d08d6aea11d6548856cb

New changelog entries:
  * SECURITY UPDATE: integer overflow in gs_heap_alloc_bytes()
    - debian/patches/CVE-2015-3228.patch: added sanity check to
      base/gsmalloc.c.
    - CVE-2015-3228

ubuntu/vivid-security 2015-07-30 12:28:41 UTC 2015-07-30
Import patches-unapplied version 9.15+dfsg-0ubuntu2.1 to ubuntu/vivid-security

Author: Marc Deslauriers
Author Date: 2015-07-29 20:00:29 UTC

Import patches-unapplied version 9.15+dfsg-0ubuntu2.1 to ubuntu/vivid-security

Imported using git-ubuntu import.

Changelog parent: f2fe76f030efc0540c88d08d6aea11d6548856cb

New changelog entries:
  * SECURITY UPDATE: integer overflow in gs_heap_alloc_bytes()
    - debian/patches/CVE-2015-3228.patch: added sanity check to
      base/gsmalloc.c.
    - CVE-2015-3228

applied/ubuntu/vivid-proposed 2015-04-14 09:48:33 UTC 2015-04-14
Import patches-applied version 9.15+dfsg-0ubuntu2 to applied/ubuntu/vivid-pro...

Author: Till Kamppeter
Author Date: 2015-04-13 21:37:51 UTC

Import patches-applied version 9.15+dfsg-0ubuntu2 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 3cac667532ac41fdc30c067455ad7b29c86e6671
Unapplied parent: c0eea1890cd9fdac50a7957da5b5182fcfb8b1ce

New changelog entries:
  * 020150413_3e71154_pdfwrite_optimise_pdf_foget_resource_with_charproc_resources.patch:
    Fixed a long delay caused when Ghostscript converts PostScript files to PDF
    where the PostScript comes from evince when printing a displayed DjVu file
    (LP: #525161, Upstream bug #695778).

applied/ubuntu/vivid 2015-04-14 09:48:33 UTC 2015-04-14
Import patches-applied version 9.15+dfsg-0ubuntu2 to applied/ubuntu/vivid-pro...

Author: Till Kamppeter
Author Date: 2015-04-13 21:37:51 UTC

Import patches-applied version 9.15+dfsg-0ubuntu2 to applied/ubuntu/vivid-proposed

Imported using git-ubuntu import.

Changelog parent: 3cac667532ac41fdc30c067455ad7b29c86e6671
Unapplied parent: c0eea1890cd9fdac50a7957da5b5182fcfb8b1ce

New changelog entries:
  * 020150413_3e71154_pdfwrite_optimise_pdf_foget_resource_with_charproc_resources.patch:
    Fixed a long delay caused when Ghostscript converts PostScript files to PDF
    where the PostScript comes from evince when printing a displayed DjVu file
    (LP: #525161, Upstream bug #695778).

1100 of 216 results

Other repositories

Name Last Modified
lp:ubuntu/+source/ghostscript 2018-10-01
11 of 1 result
You can't create new repositories for ghostscript in Ubuntu.