View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/ghostscript
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/debian/dsc 2019-04-04 22:50:37 UTC 2019-04-04
DSC file for 9.27~dfsg-1

Author: Ubuntu Git Importer
Author Date: 2019-04-04 22:50:37 UTC

DSC file for 9.27~dfsg-1

debian/buster 2019-04-04 22:31:03 UTC 2019-04-04
Import patches-unapplied version 9.27~dfsg-1 to debian/sid

Author: Jonas Smedegaard
Author Date: 2019-04-04 18:17:20 UTC

Import patches-unapplied version 9.27~dfsg-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: c78e88b60cf9b5ac0251f48fe48689630b90939a

New changelog entries:
  [ upstream ]
  * New release.
    Closes: Bug#925256, 925257 (CVE-2019-3835, CVE-2019-3838).
    Thanks to Salvatore Bonaccorso.
  * Set urgency=high, due to CVE fix.
  [ Jonas Smedegaard ]
  * Drop patches cherry-picked upstream now applied.
  * Unfuzz patches.
  * Build-depend versioned on libjbig2dec0-dev
    (not unversioned on libjbig2dec-dev).
  * Use dpkg-provided snippet
    (not additional explicit dpkg-parsechangelog call)
    to resolve when build is targeted experimental suite.
  * Revert to again split ABI at ~ (not a)."
  * Update copyright info: Extend coverage for main upstream author.
  * Update testsuite to catch new error message.
  * Update symbols:
    + 18 private symbols dropped.
    + 51 private symbols dropped.

debian/sid 2019-04-04 22:31:03 UTC 2019-04-04
Import patches-unapplied version 9.27~dfsg-1 to debian/sid

Author: Jonas Smedegaard
Author Date: 2019-04-04 18:17:20 UTC

Import patches-unapplied version 9.27~dfsg-1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: c78e88b60cf9b5ac0251f48fe48689630b90939a

New changelog entries:
  [ upstream ]
  * New release.
    Closes: Bug#925256, 925257 (CVE-2019-3835, CVE-2019-3838).
    Thanks to Salvatore Bonaccorso.
  * Set urgency=high, due to CVE fix.
  [ Jonas Smedegaard ]
  * Drop patches cherry-picked upstream now applied.
  * Unfuzz patches.
  * Build-depend versioned on libjbig2dec0-dev
    (not unversioned on libjbig2dec-dev).
  * Use dpkg-provided snippet
    (not additional explicit dpkg-parsechangelog call)
    to resolve when build is targeted experimental suite.
  * Revert to again split ABI at ~ (not a)."
  * Update copyright info: Extend coverage for main upstream author.
  * Update testsuite to catch new error message.
  * Update symbols:
    + 18 private symbols dropped.
    + 51 private symbols dropped.

applied/debian/sid 2019-04-04 22:31:03 UTC 2019-04-04
Import patches-applied version 9.27~dfsg-1 to applied/debian/sid

Author: Jonas Smedegaard
Author Date: 2019-04-04 18:17:20 UTC

Import patches-applied version 9.27~dfsg-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 18f78c9f29c6bd31d745b08e4cf60d2c319a8f2e
Unapplied parent: 63202496b02f96f5f64e9f2464672a7014af9c20

New changelog entries:
  [ upstream ]
  * New release.
    Closes: Bug#925256, 925257 (CVE-2019-3835, CVE-2019-3838).
    Thanks to Salvatore Bonaccorso.
  * Set urgency=high, due to CVE fix.
  [ Jonas Smedegaard ]
  * Drop patches cherry-picked upstream now applied.
  * Unfuzz patches.
  * Build-depend versioned on libjbig2dec0-dev
    (not unversioned on libjbig2dec-dev).
  * Use dpkg-provided snippet
    (not additional explicit dpkg-parsechangelog call)
    to resolve when build is targeted experimental suite.
  * Revert to again split ABI at ~ (not a)."
  * Update copyright info: Extend coverage for main upstream author.
  * Update testsuite to catch new error message.
  * Update symbols:
    + 18 private symbols dropped.
    + 51 private symbols dropped.

applied/debian/buster 2019-04-04 22:31:03 UTC 2019-04-04
Import patches-applied version 9.27~dfsg-1 to applied/debian/sid

Author: Jonas Smedegaard
Author Date: 2019-04-04 18:17:20 UTC

Import patches-applied version 9.27~dfsg-1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 18f78c9f29c6bd31d745b08e4cf60d2c319a8f2e
Unapplied parent: 63202496b02f96f5f64e9f2464672a7014af9c20

New changelog entries:
  [ upstream ]
  * New release.
    Closes: Bug#925256, 925257 (CVE-2019-3835, CVE-2019-3838).
    Thanks to Salvatore Bonaccorso.
  * Set urgency=high, due to CVE fix.
  [ Jonas Smedegaard ]
  * Drop patches cherry-picked upstream now applied.
  * Unfuzz patches.
  * Build-depend versioned on libjbig2dec0-dev
    (not unversioned on libjbig2dec-dev).
  * Use dpkg-provided snippet
    (not additional explicit dpkg-parsechangelog call)
    to resolve when build is targeted experimental suite.
  * Revert to again split ABI at ~ (not a)."
  * Update copyright info: Extend coverage for main upstream author.
  * Update testsuite to catch new error message.
  * Update symbols:
    + 18 private symbols dropped.
    + 51 private symbols dropped.

debian/experimental 2019-03-28 16:26:23 UTC 2019-03-28
Import patches-unapplied version 9.27~~rc1~dfsg-2 to debian/experimental

Author: Jonas Smedegaard
Author Date: 2019-03-28 12:02:16 UTC

Import patches-unapplied version 9.27~~rc1~dfsg-2 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 70399bbe07ba5a13ea0690ed06ad75af7d196d2f

New changelog entries:
  * Add patch cherry-picked upstream to fix sefault with 'so' build.
  * Tighten build-dependency on libfreetype6-dev.
  * Revert to not ignore testsuite failures even when targeted experimental.
  * Update testsuite to catch new error message.

applied/debian/experimental 2019-03-28 16:26:23 UTC 2019-03-28
Import patches-applied version 9.27~~rc1~dfsg-2 to applied/debian/experimental

Author: Jonas Smedegaard
Author Date: 2019-03-28 12:02:16 UTC

Import patches-applied version 9.27~~rc1~dfsg-2 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 49e4ec846e41263383650513892bd65610a165f1
Unapplied parent: b58da01bff87d320a33717caba55bc0fc6f1389b

New changelog entries:
  * Add patch cherry-picked upstream to fix sefault with 'so' build.
  * Tighten build-dependency on libfreetype6-dev.
  * Revert to not ignore testsuite failures even when targeted experimental.
  * Update testsuite to catch new error message.

importer/ubuntu/dsc 2019-03-21 17:53:30 UTC 2019-03-21
DSC file for 9.26~dfsg+0-0ubuntu7

Author: Ubuntu Git Importer
Author Date: 2019-03-21 17:53:30 UTC

DSC file for 9.26~dfsg+0-0ubuntu7

applied/ubuntu/disco-proposed 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-p...

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: b9ccd2bbc96563f1fe22825171ba7f8af42e3a45
Unapplied parent: 91742d40be9cbee8403d64db71a08681ef164653

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/disco 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-p...

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: b9ccd2bbc96563f1fe22825171ba7f8af42e3a45
Unapplied parent: 91742d40be9cbee8403d64db71a08681ef164653

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/disco-devel 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 34810fcdc24441d6176a62c966cdb35382ca1c99

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/disco-devel 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-p...

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: b9ccd2bbc96563f1fe22825171ba7f8af42e3a45
Unapplied parent: 91742d40be9cbee8403d64db71a08681ef164653

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/disco 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 34810fcdc24441d6176a62c966cdb35382ca1c99

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/devel 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-p...

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: b9ccd2bbc96563f1fe22825171ba7f8af42e3a45
Unapplied parent: 91742d40be9cbee8403d64db71a08681ef164653

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/devel 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 34810fcdc24441d6176a62c966cdb35382ca1c99

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/disco-proposed 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 34810fcdc24441d6176a62c966cdb35382ca1c99

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/bionic-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:15 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.8 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: b412672317574dcd6f2b32c6b1d67c154dae9d51
Unapplied parent: 8caf6815cf0473ae3a79e855122768557fb26ef4

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/bionic-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.8 to ubuntu/bioni...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:15 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.8 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 0142167941fe89a5ac40c905ddb9878a57aafb60

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/cosmic-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.8 to ubuntu/cosmi...

Author: Marc Deslauriers
Author Date: 2019-03-19 12:14:22 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.8 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 392b445382eeccca5a10145267c43a0f778985be

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/xenial-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:50 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.8 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: f8fdb58b2c8a5b167bf06ad56aaaf754621f46bc
Unapplied parent: b1018e1b15ee8fb70a3e2404bc141c8fd7d1b0aa

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/xenial-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:50 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.8 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: f8fdb58b2c8a5b167bf06ad56aaaf754621f46bc
Unapplied parent: b1018e1b15ee8fb70a3e2404bc141c8fd7d1b0aa

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/bionic-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.8 to ubuntu/bioni...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:15 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.8 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 0142167941fe89a5ac40c905ddb9878a57aafb60

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/cosmic-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 12:14:22 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.8 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: b35d375d3cac07a5840c2757b9b446518c892d04
Unapplied parent: 1fe75a124451f803cdbbe759df78861f02ae6658

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/trusty-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: df2b9a0a5dc8c290aa3479cb4fdde0ffac3063f8
Unapplied parent: 587b866de23f0f782533294f5da00aaaeebf35e0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: cc3bfa49fb782465af01f897a5773b6d3d3b68d0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/xenial-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:50 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.8 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: f8fdb58b2c8a5b167bf06ad56aaaf754621f46bc
Unapplied parent: b1018e1b15ee8fb70a3e2404bc141c8fd7d1b0aa

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/cosmic-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.8 to ubuntu/cosmi...

Author: Marc Deslauriers
Author Date: 2019-03-19 12:14:22 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.8 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 392b445382eeccca5a10145267c43a0f778985be

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/trusty-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: df2b9a0a5dc8c290aa3479cb4fdde0ffac3063f8
Unapplied parent: 587b866de23f0f782533294f5da00aaaeebf35e0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/cosmic-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 12:14:22 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.8 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: b35d375d3cac07a5840c2757b9b446518c892d04
Unapplied parent: 1fe75a124451f803cdbbe759df78861f02ae6658

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/bionic-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.8 to ubuntu/bioni...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:15 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.8 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 0142167941fe89a5ac40c905ddb9878a57aafb60

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/bionic-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:15 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.8 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: b412672317574dcd6f2b32c6b1d67c154dae9d51
Unapplied parent: 8caf6815cf0473ae3a79e855122768557fb26ef4

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/trusty-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: df2b9a0a5dc8c290aa3479cb4fdde0ffac3063f8
Unapplied parent: 587b866de23f0f782533294f5da00aaaeebf35e0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/xenial-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.8 to ubuntu/xenia...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:50 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.8 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 91ef2e8b78da9e23add130cc8c390f22c9ba3cac

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/xenial-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.8 to ubuntu/xenia...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:50 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.8 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 91ef2e8b78da9e23add130cc8c390f22c9ba3cac

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/bionic-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:15 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.8 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: b412672317574dcd6f2b32c6b1d67c154dae9d51
Unapplied parent: 8caf6815cf0473ae3a79e855122768557fb26ef4

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/cosmic-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 12:14:22 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.8 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: b35d375d3cac07a5840c2757b9b446518c892d04
Unapplied parent: 1fe75a124451f803cdbbe759df78861f02ae6658

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/xenial-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.8 to ubuntu/xenia...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:03:50 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.8 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 91ef2e8b78da9e23add130cc8c390f22c9ba3cac

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: cc3bfa49fb782465af01f897a5773b6d3d3b68d0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/cosmic-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.8 to ubuntu/cosmi...

Author: Marc Deslauriers
Author Date: 2019-03-19 12:14:22 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.8 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 392b445382eeccca5a10145267c43a0f778985be

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: cc3bfa49fb782465af01f897a5773b6d3d3b68d0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/debian/stretch 2019-02-16 17:05:49 UTC 2019-02-16
Import patches-applied version 9.26a~dfsg-0+deb9u1 to applied/debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2019-01-24 21:49:29 UTC

Import patches-applied version 9.26a~dfsg-0+deb9u1 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 6c17fafbf45070d101d44a16d78ba5893c52ffb4
Unapplied parent: 8bc2a2f2b15eb9a173177c3881bb9a286ed0d5a7

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * New upstream version 9.26a~dfsg
    + Includes fix for CVE-2019-6116
  * Temporarily split ABI at ~ (not a).
  * Update symbols: 1 private added
  * Non-maintainer upload by the Security Team.
  * Add patches cherry-picked upstream to fix segfault with certain PDFs with
    -dLastPage=1. (Closes: #915832)
  * Non-maintainer upload by the Security Team.
  * New upstream version 9.26~dfsg
    + Includes fixes for the following security vulnerabilities:
      CVE-2018-19409 CVE-2018-19475 CVE-2018-19476 CVE-2018-19477
  * Drop patches cherry-picked upstream now applied
  * Unfuzz patch 2009.
  * Update symbols: 12 private added.
  * Non-maintainer upload by the Security Team.
  * New upstream version 9.25~dfsg
    + Fixes regression using ps2ascii after fix for CVE-2018-17183
      (Closes: #909076)
    + status operator honour SAFER option (CVE-2018-11645)
  * Drop patches applied upstream
  * Rebase 2001_docdir_fix_for_debian.patch for 9.25
  * Rebase 2010_add_build_timestamp_setting.patch for 9.25
  * Add patches cherry-picked upstream to fix execution issues.
    + Implement .currentoutputdevice operator
    + Change "executeonly" to throw typecheck on gstatetype and
      devicetype objects
    + Undefine some additional internal operators.
    + Fix handling of .needinput if used from interpreter
    + Ensure all errors are included from initialization
    + setundercolorremoval memory corruption
    + copydevice fails after stack device copies invalidated
    + add operand checking to .setnativefontmapbuilt
    + add object type check for AES key
    + Add parameter type checking on .bigstring
    + zparse_dsc_comments can crash with invalid dsc_state
    + Catch errors in setpagesize, .setpagesize and setpagedevice and
      cleanup
    + Catch errors and cleanup stack on statusdict page size definitions
    + Add parameter checking in setresolution
    + device subclass open_device call must return child code
    + fix DSC comment parsing in pdfwrite
    + Check all uses of dict_find* to ensure 0 return properly handled
    + permit Mod and CreDate pdfmarks in PDF 2.0 in pdfwrite
    + Avoid overrunning non terminated string buffer.
    + Prevent SEGV in gs_setdevice_no_erase.
    + Fix uninitialised value for render_cond.
    + Hide the .needinput operator
    + filenameforall calls bad iodev with insufficent scratch
    + Improve hiding of security critical custom operators (CVE-2018-17961)
      (Closes: #911175)
    + Prevent SEGV after calling gs_image_class_1_simple.
    + don't push userdict in preparation for Type 1 fonts
    + add control over hiding error handlers. (Closes: #909929)
    + For hidden operators, pass a name object to error handler.
      (CVE-2018-17961) (Closes: #911175)
    + Explicitly exclude /unknownerror from the SAFERERRORLIST
    + don't include operator arrays in execstack output (CVE-2018-18073)
      (Closes: #910758)
    + Make .forceput unavailable from '.policyprocs' helper dictionary
      (CVE-2018-18284) (Closes: #911175)
    + .loadfontloop must be an operator (CVE-2018-17961) (Closes: #911175)
    + font parsing - prevent SEGV in .cffparse
  * openjpeg allocator must return NULL if size too large
  * debian/copyright: Refresh with version from 9.25~dfsg-5
  * debian/libgs9.symbols: Update (and sync from 9.25~dfsg-5) for new version.
    Adjust version for errorexec_find@Base.
  * Fix cups get/put_params LeadingEdge logic (cf. #912664)
  * Avoid privacy breach linking documentation to jquery:
    + Add patch 2009 to use local jquery.
    + Add symlink from relative link to system-shared jquery library.
    + Have ghostscript-doc depend on libjs-jquery.
  * Avoid privacy breach linking documentation to font:
    + Avoid linking to remote fonts in documentation.
  * Avoid privacy breach linking documentation with Google:
    + Strip googletagmanager code from documentation.

debian/stretch 2019-02-16 17:05:49 UTC 2019-02-16
Import patches-unapplied version 9.26a~dfsg-0+deb9u1 to debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2019-01-24 21:49:29 UTC

Import patches-unapplied version 9.26a~dfsg-0+deb9u1 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: c4f30d914b3f96ead5555075babec700f8324450

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * New upstream version 9.26a~dfsg
    + Includes fix for CVE-2019-6116
  * Temporarily split ABI at ~ (not a).
  * Update symbols: 1 private added
  * Non-maintainer upload by the Security Team.
  * Add patches cherry-picked upstream to fix segfault with certain PDFs with
    -dLastPage=1. (Closes: #915832)
  * Non-maintainer upload by the Security Team.
  * New upstream version 9.26~dfsg
    + Includes fixes for the following security vulnerabilities:
      CVE-2018-19409 CVE-2018-19475 CVE-2018-19476 CVE-2018-19477
  * Drop patches cherry-picked upstream now applied
  * Unfuzz patch 2009.
  * Update symbols: 12 private added.
  * Non-maintainer upload by the Security Team.
  * New upstream version 9.25~dfsg
    + Fixes regression using ps2ascii after fix for CVE-2018-17183
      (Closes: #909076)
    + status operator honour SAFER option (CVE-2018-11645)
  * Drop patches applied upstream
  * Rebase 2001_docdir_fix_for_debian.patch for 9.25
  * Rebase 2010_add_build_timestamp_setting.patch for 9.25
  * Add patches cherry-picked upstream to fix execution issues.
    + Implement .currentoutputdevice operator
    + Change "executeonly" to throw typecheck on gstatetype and
      devicetype objects
    + Undefine some additional internal operators.
    + Fix handling of .needinput if used from interpreter
    + Ensure all errors are included from initialization
    + setundercolorremoval memory corruption
    + copydevice fails after stack device copies invalidated
    + add operand checking to .setnativefontmapbuilt
    + add object type check for AES key
    + Add parameter type checking on .bigstring
    + zparse_dsc_comments can crash with invalid dsc_state
    + Catch errors in setpagesize, .setpagesize and setpagedevice and
      cleanup
    + Catch errors and cleanup stack on statusdict page size definitions
    + Add parameter checking in setresolution
    + device subclass open_device call must return child code
    + fix DSC comment parsing in pdfwrite
    + Check all uses of dict_find* to ensure 0 return properly handled
    + permit Mod and CreDate pdfmarks in PDF 2.0 in pdfwrite
    + Avoid overrunning non terminated string buffer.
    + Prevent SEGV in gs_setdevice_no_erase.
    + Fix uninitialised value for render_cond.
    + Hide the .needinput operator
    + filenameforall calls bad iodev with insufficent scratch
    + Improve hiding of security critical custom operators (CVE-2018-17961)
      (Closes: #911175)
    + Prevent SEGV after calling gs_image_class_1_simple.
    + don't push userdict in preparation for Type 1 fonts
    + add control over hiding error handlers. (Closes: #909929)
    + For hidden operators, pass a name object to error handler.
      (CVE-2018-17961) (Closes: #911175)
    + Explicitly exclude /unknownerror from the SAFERERRORLIST
    + don't include operator arrays in execstack output (CVE-2018-18073)
      (Closes: #910758)
    + Make .forceput unavailable from '.policyprocs' helper dictionary
      (CVE-2018-18284) (Closes: #911175)
    + .loadfontloop must be an operator (CVE-2018-17961) (Closes: #911175)
    + font parsing - prevent SEGV in .cffparse
  * openjpeg allocator must return NULL if size too large
  * debian/copyright: Refresh with version from 9.25~dfsg-5
  * debian/libgs9.symbols: Update (and sync from 9.25~dfsg-5) for new version.
    Adjust version for errorexec_find@Base.
  * Fix cups get/put_params LeadingEdge logic (cf. #912664)
  * Avoid privacy breach linking documentation to jquery:
    + Add patch 2009 to use local jquery.
    + Add symlink from relative link to system-shared jquery library.
    + Have ghostscript-doc depend on libjs-jquery.
  * Avoid privacy breach linking documentation to font:
    + Avoid linking to remote fonts in documentation.
  * Avoid privacy breach linking documentation with Google:
    + Strip googletagmanager code from documentation.

ubuntu/trusty-proposed 2018-11-14 17:56:10 UTC 2018-11-14
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.3 to ubuntu/trust...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:09:10 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.3 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 417912b1509cc3d22c579f167d1994126f289962

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

applied/ubuntu/trusty-proposed 2018-11-14 17:56:10 UTC 2018-11-14
Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.3 to applied/ubuntu...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:09:10 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.3 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 0d5f11b5f96dfe3e9401cd3e464f56468e1004db
Unapplied parent: 78e956ea287a156e134abbc129f7292bc55676fd

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

applied/ubuntu/xenial-proposed 2018-11-13 22:13:12 UTC 2018-11-13
Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.3 to applied/ubuntu...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:05:22 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 1cc3947c39458d6ffef827ed4712398a93a4c9c1
Unapplied parent: a2903aa849b61381411443626f67fa305e7c503b

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

ubuntu/xenial-proposed 2018-11-13 22:13:12 UTC 2018-11-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.3 to ubuntu/xenia...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:05:22 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 45d6bab34d179fe22199809edeeaef96f35b1b19

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

applied/ubuntu/cosmic-proposed 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-...

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 8537fa03cb840bafc5f040b1dfb3fec6816c6c4f
Unapplied parent: 1c475491322882c1ea333d99bef5081b4799c162

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/cosmic 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-...

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 8537fa03cb840bafc5f040b1dfb3fec6816c6c4f
Unapplied parent: 1c475491322882c1ea333d99bef5081b4799c162

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/cosmic-proposed 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 67a6f88ffdd2514bd8e8ea08bdf8cd67ff04cf37

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/cosmic 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 67a6f88ffdd2514bd8e8ea08bdf8cd67ff04cf37

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

debian/jessie 2018-06-23 17:11:31 UTC 2018-06-23
Import patches-unapplied version 9.06~dfsg-2+deb8u7 to debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2018-04-29 09:58:34 UTC

Import patches-unapplied version 9.06~dfsg-2+deb8u7 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: 917507a4c9a20532b0dea730759d702f3ae1114b

New changelog entries:
  * Non-maintainer upload.
  * Segfault with fuzzing file in gxht_thresh_image_init
  * Buffer overflow in fill_threshold_buffer (CVE-2016-10317)
    (Closes: #860869)
  * pdfwrite - Guard against trying to output an infinite number
    (CVE-2018-10194) (Closes: #896069)

applied/debian/jessie 2018-06-23 17:11:31 UTC 2018-06-23
Import patches-applied version 9.06~dfsg-2+deb8u7 to applied/debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2018-04-29 09:58:34 UTC

Import patches-applied version 9.06~dfsg-2+deb8u7 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: f3b14e29112bf3b040c10f5cd4fc8449b02ac1ad
Unapplied parent: 5db5e955c01be3a1426d5b5599d3380b8202241d

New changelog entries:
  * Non-maintainer upload.
  * Segfault with fuzzing file in gxht_thresh_image_init
  * Buffer overflow in fill_threshold_buffer (CVE-2016-10317)
    (Closes: #860869)
  * pdfwrite - Guard against trying to output an infinite number
    (CVE-2018-10194) (Closes: #896069)

ubuntu/artful-devel 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

ubuntu/artful-security 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

ubuntu/artful-updates 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

applied/ubuntu/artful-updates 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

applied/ubuntu/artful-security 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

applied/ubuntu/artful-devel 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

importer/ubuntu/pristine-tar 2018-04-04 12:59:35 UTC 2018-04-04
pristine-tar data for ghostscript_9.22~dfsg+1.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-04 12:59:35 UTC

pristine-tar data for ghostscript_9.22~dfsg+1.orig.tar.xz

importer/debian/pristine-tar 2018-04-04 06:01:57 UTC 2018-04-04
pristine-tar data for ghostscript_9.22~dfsg.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-04 06:01:57 UTC

pristine-tar data for ghostscript_9.22~dfsg.orig.tar.xz

ubuntu/bionic 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 516297b89f58a8151e8b7f73b3f5b2bcc670c407

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/bionic 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-...

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 27718e9264c34de3de6202c0784a2da7cce56916
Unapplied parent: 194da0bc7420d2b168069211f89bf959e78eeb62

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/bionic-proposed 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 516297b89f58a8151e8b7f73b3f5b2bcc670c407

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/bionic-proposed 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-...

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 27718e9264c34de3de6202c0784a2da7cce56916
Unapplied parent: 194da0bc7420d2b168069211f89bf959e78eeb62

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/artful 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 7d35ddbba538415fb0b0a0d53890e3aea5f8a878

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/artful-proposed 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 7d35ddbba538415fb0b0a0d53890e3aea5f8a878

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/artful-proposed 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-...

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 5e666f10924159d823a049f8c8a845414838a23d
Unapplied parent: 91c7402d8aa53ed0f95ca8905886d97872fc397b

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/artful 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-...

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 5e666f10924159d823a049f8c8a845414838a23d
Unapplied parent: 91c7402d8aa53ed0f95ca8905886d97872fc397b

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-devel 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-devel 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-updates 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-security 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-updates 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-security 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/yakkety-security 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/yakkety-updates 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/yakkety-devel 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/yakkety-devel 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/yakkety-security 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/yakkety-updates 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/precise-devel 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

ubuntu/precise-updates 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

ubuntu/precise-security 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-updates 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-security 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-devel 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/zesty 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty...

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 9554d00244f2b020d91077a8466122dfab86324e
Unapplied parent: d5b8d2ce5402553d13edaeb44258b55347330f38

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

ubuntu/zesty-proposed 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: b74d140153e04ec188365976c921f8bca5acd060

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

applied/ubuntu/zesty-proposed 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty...

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 9554d00244f2b020d91077a8466122dfab86324e
Unapplied parent: d5b8d2ce5402553d13edaeb44258b55347330f38

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

ubuntu/zesty 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: b74d140153e04ec188365976c921f8bca5acd060

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

ubuntu/yakkety-proposed 2016-11-17 21:03:20 UTC 2016-11-17
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.1 to ubuntu/yakkety-pro...

Author: Till Kamppeter
Author Date: 2016-11-14 19:37:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.1 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: f603943b777bc1c1985e4f288dca15fe264be933

New changelog entries:
  * debian/patches/020161028~0726780_gdevcups-pwgraster-bitmap-always-without-margins.patch:
    "cups" output device: When creating PWG Raster output, always output
    the bitmap of the full page, ignoring any unprintable margins suggested
    by the PPD file (LP: #1637583).

applied/ubuntu/yakkety-proposed 2016-11-17 21:03:20 UTC 2016-11-17
Import patches-applied version 9.19~dfsg+1-0ubuntu6.1 to applied/ubuntu/yakke...

Author: Till Kamppeter
Author Date: 2016-11-14 19:37:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.1 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 60b9fa94c2c2ac35e197d89f5730d287122d2c93
Unapplied parent: 42bfd89a157befabc1c41b4caf1013f20ec70498

New changelog entries:
  * debian/patches/020161028~0726780_gdevcups-pwgraster-bitmap-always-without-margins.patch:
    "cups" output device: When creating PWG Raster output, always output
    the bitmap of the full page, ignoring any unprintable margins suggested
    by the PPD file (LP: #1637583).

applied/ubuntu/yakkety 2016-09-30 19:14:47 UTC 2016-09-30
Import patches-applied version 9.19~dfsg+1-0ubuntu6 to applied/ubuntu/yakkety...

Author: Gunnar Hjalmarsson
Author Date: 2016-09-22 08:50:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6 to applied/ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: 945849eca21b5baa4ae47957b5961907898fbf65
Unapplied parent: c68ba3fbf317aff3070e6757e5cf85b7ee4ba5bd

New changelog entries:
  * debian/rules:
    + Revert the dependency change in 9.19~dfsg+1-0ubuntu3
      (LP: #1625734, LP: #1626245).

ubuntu/yakkety 2016-09-30 19:14:47 UTC 2016-09-30
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6 to ubuntu/yakkety-proposed

Author: Gunnar Hjalmarsson
Author Date: 2016-09-22 08:50:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6 to ubuntu/yakkety-proposed

Imported using git-ubuntu import.

Changelog parent: f75f177d159e8f648fb24a4a839ab558f7fe62ec

New changelog entries:
  * debian/rules:
    + Revert the dependency change in 9.19~dfsg+1-0ubuntu3
      (LP: #1625734, LP: #1626245).

applied/ubuntu/xenial 2016-02-29 11:09:14 UTC 2016-02-29
Import patches-applied version 9.18~dfsg~0-0ubuntu2 to applied/ubuntu/xenial-...

Author: Sebastien Bacher
Author Date: 2016-02-29 10:35:03 UTC

Import patches-applied version 9.18~dfsg~0-0ubuntu2 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 2768f9c006f74d74715adafc6f79351d255e4148
Unapplied parent: 6d06cf635f7a7493af314a901c976921a64c6468

New changelog entries:
  * Backport change from Debian
    "Add patch cherry-picked upstream to fix add gserrors.h to the
     installed files for the so-install target."

ubuntu/xenial 2016-02-29 11:09:14 UTC 2016-02-29
Import patches-unapplied version 9.18~dfsg~0-0ubuntu2 to ubuntu/xenial-proposed

Author: Sebastien Bacher
Author Date: 2016-02-29 10:35:03 UTC

Import patches-unapplied version 9.18~dfsg~0-0ubuntu2 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: c9e4971f438585f19e53c27c3bbe8b0d6614ecc2

New changelog entries:
  * Backport change from Debian
    "Add patch cherry-picked upstream to fix add gserrors.h to the
     installed files for the so-install target."

ubuntu/wily 2015-09-19 17:08:24 UTC 2015-09-19
Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Author: Till Kamppeter
Author Date: 2015-09-19 16:51:09 UTC

Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 7901a0dde15c5c47562203e6a250d09f7aa81f46

New changelog entries:
  * debian/rules: Demote texlive-lang-cjk from Recommends: to Suggests:
    as it pulls in a large amount of unneeded packages (LP: #1449875).

ubuntu/wily-devel 2015-09-19 17:08:24 UTC 2015-09-19
Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Author: Till Kamppeter
Author Date: 2015-09-19 16:51:09 UTC

Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 7901a0dde15c5c47562203e6a250d09f7aa81f46

New changelog entries:
  * debian/rules: Demote texlive-lang-cjk from Recommends: to Suggests:
    as it pulls in a large amount of unneeded packages (LP: #1449875).

ubuntu/wily-proposed 2015-09-19 17:08:24 UTC 2015-09-19
Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Author: Till Kamppeter
Author Date: 2015-09-19 16:51:09 UTC

Import patches-unapplied version 9.16~dfsg~0-0ubuntu3 to ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 7901a0dde15c5c47562203e6a250d09f7aa81f46

New changelog entries:
  * debian/rules: Demote texlive-lang-cjk from Recommends: to Suggests:
    as it pulls in a large amount of unneeded packages (LP: #1449875).

applied/ubuntu/wily-proposed 2015-09-19 17:08:24 UTC 2015-09-19
Import patches-applied version 9.16~dfsg~0-0ubuntu3 to applied/ubuntu/wily-pr...

Author: Till Kamppeter
Author Date: 2015-09-19 16:51:09 UTC

Import patches-applied version 9.16~dfsg~0-0ubuntu3 to applied/ubuntu/wily-proposed

Imported using git-ubuntu import.

Changelog parent: 05e8bcc89aa38c2750ad8266191c20e5b49bc50b
Unapplied parent: 3d9bb732c2ad9f6d4bc1b936c1fd687d64a1cc5e

New changelog entries:
  * debian/rules: Demote texlive-lang-cjk from Recommends: to Suggests:
    as it pulls in a large amount of unneeded packages (LP: #1449875).

1100 of 226 results

Other repositories

Name Last Modified
lp:ubuntu/+source/ghostscript 2019-04-09
11 of 1 result
You can't create new repositories for ghostscript in Ubuntu.