View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/ghostscript
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/ubuntu/dsc 2019-08-15 20:21:10 UTC 2019-08-15
DSC file for 9.27~dfsg+0-0ubuntu1

Author: Ubuntu Git Importer
Author Date: 2019-08-15 20:21:10 UTC

DSC file for 9.27~dfsg+0-0ubuntu1

applied/ubuntu/eoan-devel 2019-08-15 20:18:13 UTC 2019-08-15
Import patches-applied version 9.27~dfsg+0-0ubuntu1 to applied/ubuntu/eoan-pr...

Author: Till Kamppeter
Author Date: 2019-08-15 19:38:06 UTC

Import patches-applied version 9.27~dfsg+0-0ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: cbcdbb000061115babaeb66ccb929b0273311230
Unapplied parent: 48b4a5625b873d048afa3828d7754600dfac38cc

New changelog entries:
  * New upstream release
    Highlights:
    - We have extensively cleaned up the Postscript name space: removing
      access to internal and/or undocumented Postscript operators, procedures
      and data. This has benefits for security and maintainability.
    - Fontmap can now reference invidual fonts in a TrueType Collection for
      font subsitution. Previously, a Fontmap entry could only reference a
      TrueType collection and use the default (first) font. Now, the Fontmap
      syntax allows for specifying a specific index in a TTC. See the comments
      at the top of (the default) Fontmap.GS for details.
  * Improvements on HTML documentation (Use local JavaScript, avoid remote
    fonts, avoid Google Tag Manager) by overtaking the appropriate patches
    from the Debian package.
  * Backported upstream patch to fix regression resolving bounding box of
    font glyphs and re-introduce over/underflow workaround.
  * Backported upstream patch to protect use of .forceput with
    executeonly.
  * Removed patches 02018*, lp1815339*, CVE-2019-* which are already included
    upstream.
  * Refreshed patch 2007_suggest_install_ghostscript-doc_in_code.patch with
    quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/eoan-proposed 2019-08-15 20:18:13 UTC 2019-08-15
Import patches-applied version 9.27~dfsg+0-0ubuntu1 to applied/ubuntu/eoan-pr...

Author: Till Kamppeter
Author Date: 2019-08-15 19:38:06 UTC

Import patches-applied version 9.27~dfsg+0-0ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: cbcdbb000061115babaeb66ccb929b0273311230
Unapplied parent: 48b4a5625b873d048afa3828d7754600dfac38cc

New changelog entries:
  * New upstream release
    Highlights:
    - We have extensively cleaned up the Postscript name space: removing
      access to internal and/or undocumented Postscript operators, procedures
      and data. This has benefits for security and maintainability.
    - Fontmap can now reference invidual fonts in a TrueType Collection for
      font subsitution. Previously, a Fontmap entry could only reference a
      TrueType collection and use the default (first) font. Now, the Fontmap
      syntax allows for specifying a specific index in a TTC. See the comments
      at the top of (the default) Fontmap.GS for details.
  * Improvements on HTML documentation (Use local JavaScript, avoid remote
    fonts, avoid Google Tag Manager) by overtaking the appropriate patches
    from the Debian package.
  * Backported upstream patch to fix regression resolving bounding box of
    font glyphs and re-introduce over/underflow workaround.
  * Backported upstream patch to protect use of .forceput with
    executeonly.
  * Removed patches 02018*, lp1815339*, CVE-2019-* which are already included
    upstream.
  * Refreshed patch 2007_suggest_install_ghostscript-doc_in_code.patch with
    quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/eoan-devel 2019-08-15 20:18:13 UTC 2019-08-15
Import patches-unapplied version 9.27~dfsg+0-0ubuntu1 to ubuntu/eoan-proposed

Author: Till Kamppeter
Author Date: 2019-08-15 19:38:06 UTC

Import patches-unapplied version 9.27~dfsg+0-0ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: a0af6cdfdfee00341f6a53d1802dea4d81c36846

New changelog entries:
  * New upstream release
    Highlights:
    - We have extensively cleaned up the Postscript name space: removing
      access to internal and/or undocumented Postscript operators, procedures
      and data. This has benefits for security and maintainability.
    - Fontmap can now reference invidual fonts in a TrueType Collection for
      font subsitution. Previously, a Fontmap entry could only reference a
      TrueType collection and use the default (first) font. Now, the Fontmap
      syntax allows for specifying a specific index in a TTC. See the comments
      at the top of (the default) Fontmap.GS for details.
  * Improvements on HTML documentation (Use local JavaScript, avoid remote
    fonts, avoid Google Tag Manager) by overtaking the appropriate patches
    from the Debian package.
  * Backported upstream patch to fix regression resolving bounding box of
    font glyphs and re-introduce over/underflow workaround.
  * Backported upstream patch to protect use of .forceput with
    executeonly.
  * Removed patches 02018*, lp1815339*, CVE-2019-* which are already included
    upstream.
  * Refreshed patch 2007_suggest_install_ghostscript-doc_in_code.patch with
    quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/devel 2019-08-15 20:18:13 UTC 2019-08-15
Import patches-applied version 9.27~dfsg+0-0ubuntu1 to applied/ubuntu/eoan-pr...

Author: Till Kamppeter
Author Date: 2019-08-15 19:38:06 UTC

Import patches-applied version 9.27~dfsg+0-0ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: cbcdbb000061115babaeb66ccb929b0273311230
Unapplied parent: 48b4a5625b873d048afa3828d7754600dfac38cc

New changelog entries:
  * New upstream release
    Highlights:
    - We have extensively cleaned up the Postscript name space: removing
      access to internal and/or undocumented Postscript operators, procedures
      and data. This has benefits for security and maintainability.
    - Fontmap can now reference invidual fonts in a TrueType Collection for
      font subsitution. Previously, a Fontmap entry could only reference a
      TrueType collection and use the default (first) font. Now, the Fontmap
      syntax allows for specifying a specific index in a TTC. See the comments
      at the top of (the default) Fontmap.GS for details.
  * Improvements on HTML documentation (Use local JavaScript, avoid remote
    fonts, avoid Google Tag Manager) by overtaking the appropriate patches
    from the Debian package.
  * Backported upstream patch to fix regression resolving bounding box of
    font glyphs and re-introduce over/underflow workaround.
  * Backported upstream patch to protect use of .forceput with
    executeonly.
  * Removed patches 02018*, lp1815339*, CVE-2019-* which are already included
    upstream.
  * Refreshed patch 2007_suggest_install_ghostscript-doc_in_code.patch with
    quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/devel 2019-08-15 20:18:13 UTC 2019-08-15
Import patches-unapplied version 9.27~dfsg+0-0ubuntu1 to ubuntu/eoan-proposed

Author: Till Kamppeter
Author Date: 2019-08-15 19:38:06 UTC

Import patches-unapplied version 9.27~dfsg+0-0ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: a0af6cdfdfee00341f6a53d1802dea4d81c36846

New changelog entries:
  * New upstream release
    Highlights:
    - We have extensively cleaned up the Postscript name space: removing
      access to internal and/or undocumented Postscript operators, procedures
      and data. This has benefits for security and maintainability.
    - Fontmap can now reference invidual fonts in a TrueType Collection for
      font subsitution. Previously, a Fontmap entry could only reference a
      TrueType collection and use the default (first) font. Now, the Fontmap
      syntax allows for specifying a specific index in a TTC. See the comments
      at the top of (the default) Fontmap.GS for details.
  * Improvements on HTML documentation (Use local JavaScript, avoid remote
    fonts, avoid Google Tag Manager) by overtaking the appropriate patches
    from the Debian package.
  * Backported upstream patch to fix regression resolving bounding box of
    font glyphs and re-introduce over/underflow workaround.
  * Backported upstream patch to protect use of .forceput with
    executeonly.
  * Removed patches 02018*, lp1815339*, CVE-2019-* which are already included
    upstream.
  * Refreshed patch 2007_suggest_install_ghostscript-doc_in_code.patch with
    quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/eoan-proposed 2019-08-15 20:18:13 UTC 2019-08-15
Import patches-unapplied version 9.27~dfsg+0-0ubuntu1 to ubuntu/eoan-proposed

Author: Till Kamppeter
Author Date: 2019-08-15 19:38:06 UTC

Import patches-unapplied version 9.27~dfsg+0-0ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: a0af6cdfdfee00341f6a53d1802dea4d81c36846

New changelog entries:
  * New upstream release
    Highlights:
    - We have extensively cleaned up the Postscript name space: removing
      access to internal and/or undocumented Postscript operators, procedures
      and data. This has benefits for security and maintainability.
    - Fontmap can now reference invidual fonts in a TrueType Collection for
      font subsitution. Previously, a Fontmap entry could only reference a
      TrueType collection and use the default (first) font. Now, the Fontmap
      syntax allows for specifying a specific index in a TTC. See the comments
      at the top of (the default) Fontmap.GS for details.
  * Improvements on HTML documentation (Use local JavaScript, avoid remote
    fonts, avoid Google Tag Manager) by overtaking the appropriate patches
    from the Debian package.
  * Backported upstream patch to fix regression resolving bounding box of
    font glyphs and re-introduce over/underflow workaround.
  * Backported upstream patch to protect use of .forceput with
    executeonly.
  * Removed patches 02018*, lp1815339*, CVE-2019-* which are already included
    upstream.
  * Refreshed patch 2007_suggest_install_ghostscript-doc_in_code.patch with
    quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/eoan 2019-08-15 20:18:13 UTC 2019-08-15
Import patches-applied version 9.27~dfsg+0-0ubuntu1 to applied/ubuntu/eoan-pr...

Author: Till Kamppeter
Author Date: 2019-08-15 19:38:06 UTC

Import patches-applied version 9.27~dfsg+0-0ubuntu1 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: cbcdbb000061115babaeb66ccb929b0273311230
Unapplied parent: 48b4a5625b873d048afa3828d7754600dfac38cc

New changelog entries:
  * New upstream release
    Highlights:
    - We have extensively cleaned up the Postscript name space: removing
      access to internal and/or undocumented Postscript operators, procedures
      and data. This has benefits for security and maintainability.
    - Fontmap can now reference invidual fonts in a TrueType Collection for
      font subsitution. Previously, a Fontmap entry could only reference a
      TrueType collection and use the default (first) font. Now, the Fontmap
      syntax allows for specifying a specific index in a TTC. See the comments
      at the top of (the default) Fontmap.GS for details.
  * Improvements on HTML documentation (Use local JavaScript, avoid remote
    fonts, avoid Google Tag Manager) by overtaking the appropriate patches
    from the Debian package.
  * Backported upstream patch to fix regression resolving bounding box of
    font glyphs and re-introduce over/underflow workaround.
  * Backported upstream patch to protect use of .forceput with
    executeonly.
  * Removed patches 02018*, lp1815339*, CVE-2019-* which are already included
    upstream.
  * Refreshed patch 2007_suggest_install_ghostscript-doc_in_code.patch with
    quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/eoan 2019-08-15 20:18:13 UTC 2019-08-15
Import patches-unapplied version 9.27~dfsg+0-0ubuntu1 to ubuntu/eoan-proposed

Author: Till Kamppeter
Author Date: 2019-08-15 19:38:06 UTC

Import patches-unapplied version 9.27~dfsg+0-0ubuntu1 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: a0af6cdfdfee00341f6a53d1802dea4d81c36846

New changelog entries:
  * New upstream release
    Highlights:
    - We have extensively cleaned up the Postscript name space: removing
      access to internal and/or undocumented Postscript operators, procedures
      and data. This has benefits for security and maintainability.
    - Fontmap can now reference invidual fonts in a TrueType Collection for
      font subsitution. Previously, a Fontmap entry could only reference a
      TrueType collection and use the default (first) font. Now, the Fontmap
      syntax allows for specifying a specific index in a TTC. See the comments
      at the top of (the default) Fontmap.GS for details.
  * Improvements on HTML documentation (Use local JavaScript, avoid remote
    fonts, avoid Google Tag Manager) by overtaking the appropriate patches
    from the Debian package.
  * Backported upstream patch to fix regression resolving bounding box of
    font glyphs and re-introduce over/underflow workaround.
  * Backported upstream patch to protect use of .forceput with
    executeonly.
  * Removed patches 02018*, lp1815339*, CVE-2019-* which are already included
    upstream.
  * Refreshed patch 2007_suggest_install_ghostscript-doc_in_code.patch with
    quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

importer/debian/dsc 2019-08-13 16:37:19 UTC 2019-08-13
DSC file for 9.27~dfsg-3.1

Author: Ubuntu Git Importer
Author Date: 2019-08-13 16:37:19 UTC

DSC file for 9.27~dfsg-3.1

applied/debian/sid 2019-08-13 16:34:24 UTC 2019-08-13
Import patches-applied version 9.27~dfsg-3.1 to applied/debian/sid

Author: Salvatore Bonaccorso
Author Date: 2019-08-13 07:49:11 UTC

Import patches-applied version 9.27~dfsg-3.1 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 1fb2c8e06e7e743b4c4e7c45fd8b10eced36a0be
Unapplied parent: cf182607bc6c316bdf8a24c07ea5654e1ee2c055

New changelog entries:
  * Non-maintainer upload (with maintainers approval).
  * protect use of .forceput with executeonly (CVE-2019-10216)
    (Closes: #934638)

debian/sid 2019-08-13 16:34:24 UTC 2019-08-13
Import patches-unapplied version 9.27~dfsg-3.1 to debian/sid

Author: Salvatore Bonaccorso
Author Date: 2019-08-13 07:49:11 UTC

Import patches-unapplied version 9.27~dfsg-3.1 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 1077fa3f595b8b539e5c494a111e4106ec3d03f4

New changelog entries:
  * Non-maintainer upload (with maintainers approval).
  * protect use of .forceput with executeonly (CVE-2019-10216)
    (Closes: #934638)

applied/ubuntu/bionic-devel 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.10 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-09 04:24:01 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.10 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 404c91f83a8befebbfa95ccf0521da1cd192d7c1
Unapplied parent: ddab49584cf930b4f3961cd1b2c822200c49a4b0

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

ubuntu/disco-security 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.2 to ubuntu/disco-security

Author: Steve Beattie
Author Date: 2019-08-09 00:25:31 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.2 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: ebda707ccc9c46689b9954adcf6a2038babc1d3e

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

applied/ubuntu/disco-security 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-applied version 9.26~dfsg+0-0ubuntu7.2 to applied/ubuntu/disco...

Author: Steve Beattie
Author Date: 2019-08-09 00:25:31 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7.2 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: c6538b5a3aedc1bad683a5d421ebe59fb51be7c6
Unapplied parent: 21b30cacdb8b97ac94661048607e43cb7f7b2395

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

ubuntu/xenial-devel 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.10 to ubuntu/xeni...

Author: Steve Beattie
Author Date: 2019-08-09 04:25:51 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.10 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: d980afaefd5ffcd9953dd3b29f21dcf8b92ec7ef

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

ubuntu/bionic-security 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.10 to ubuntu/bion...

Author: Steve Beattie
Author Date: 2019-08-09 04:24:01 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.10 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 5b4468ea0da5e59532d7ed8703d4574a2dec295a

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

applied/ubuntu/disco-devel 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-applied version 9.26~dfsg+0-0ubuntu7.2 to applied/ubuntu/disco...

Author: Steve Beattie
Author Date: 2019-08-09 00:25:31 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7.2 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: c6538b5a3aedc1bad683a5d421ebe59fb51be7c6
Unapplied parent: 21b30cacdb8b97ac94661048607e43cb7f7b2395

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

applied/ubuntu/bionic-security 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.10 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-09 04:24:01 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.10 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 404c91f83a8befebbfa95ccf0521da1cd192d7c1
Unapplied parent: ddab49584cf930b4f3961cd1b2c822200c49a4b0

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

ubuntu/disco-devel 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.2 to ubuntu/disco-security

Author: Steve Beattie
Author Date: 2019-08-09 00:25:31 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.2 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: ebda707ccc9c46689b9954adcf6a2038babc1d3e

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

applied/ubuntu/xenial-updates 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.10 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-09 04:25:51 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.10 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 0199d98ecb26712f3e585836e3bcc1878b284076
Unapplied parent: 8da8e21d01a153592519d08bf19ae2a28ef76bc3

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

applied/ubuntu/xenial-devel 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.10 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-09 04:25:51 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.10 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 0199d98ecb26712f3e585836e3bcc1878b284076
Unapplied parent: 8da8e21d01a153592519d08bf19ae2a28ef76bc3

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

applied/ubuntu/xenial-security 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.10 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-09 04:25:51 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.10 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 0199d98ecb26712f3e585836e3bcc1878b284076
Unapplied parent: 8da8e21d01a153592519d08bf19ae2a28ef76bc3

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

ubuntu/xenial-security 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.10 to ubuntu/xeni...

Author: Steve Beattie
Author Date: 2019-08-09 04:25:51 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.10 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: d980afaefd5ffcd9953dd3b29f21dcf8b92ec7ef

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

ubuntu/bionic-devel 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.10 to ubuntu/bion...

Author: Steve Beattie
Author Date: 2019-08-09 04:24:01 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.10 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 5b4468ea0da5e59532d7ed8703d4574a2dec295a

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

ubuntu/disco-updates 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.2 to ubuntu/disco-security

Author: Steve Beattie
Author Date: 2019-08-09 00:25:31 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.2 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: ebda707ccc9c46689b9954adcf6a2038babc1d3e

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

ubuntu/xenial-updates 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.10 to ubuntu/xeni...

Author: Steve Beattie
Author Date: 2019-08-09 04:25:51 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.10 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: d980afaefd5ffcd9953dd3b29f21dcf8b92ec7ef

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

applied/ubuntu/disco-updates 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-applied version 9.26~dfsg+0-0ubuntu7.2 to applied/ubuntu/disco...

Author: Steve Beattie
Author Date: 2019-08-09 00:25:31 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7.2 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: c6538b5a3aedc1bad683a5d421ebe59fb51be7c6
Unapplied parent: 21b30cacdb8b97ac94661048607e43cb7f7b2395

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

ubuntu/bionic-updates 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.10 to ubuntu/bion...

Author: Steve Beattie
Author Date: 2019-08-09 04:24:01 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.10 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 5b4468ea0da5e59532d7ed8703d4574a2dec295a

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

applied/ubuntu/bionic-updates 2019-08-12 13:53:23 UTC 2019-08-12
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.10 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-09 04:24:01 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.10 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 404c91f83a8befebbfa95ccf0521da1cd192d7c1
Unapplied parent: ddab49584cf930b4f3961cd1b2c822200c49a4b0

New changelog entries:
  * SECURITY UPDATE: `-dSAFER` restrictions bypass
    - debian/patches/CVE-2019-10216.patch: protect use of .forceput
      with executeonly
    - CVE-2019-10216

ubuntu/cosmic-updates 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmi...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 9af8e08e2663aa61837beadd141a3a1e5ef4d89d

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

ubuntu/cosmic-devel 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmi...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 9af8e08e2663aa61837beadd141a3a1e5ef4d89d

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

ubuntu/cosmic-security 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmi...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 9af8e08e2663aa61837beadd141a3a1e5ef4d89d

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

applied/ubuntu/cosmic-updates 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: eeebdce1841c90c44afb0618a94a72c2f7c13b66
Unapplied parent: c5c0358f79ef1beabe9405998e88d96d4735742c

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

applied/ubuntu/cosmic-security 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: eeebdce1841c90c44afb0618a94a72c2f7c13b66
Unapplied parent: c5c0358f79ef1beabe9405998e88d96d4735742c

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

applied/ubuntu/cosmic-devel 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: eeebdce1841c90c44afb0618a94a72c2f7c13b66
Unapplied parent: c5c0358f79ef1beabe9405998e88d96d4735742c

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

debian/stretch 2019-04-27 10:52:08 UTC 2019-04-27
Import patches-unapplied version 9.26a~dfsg-0+deb9u2 to debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2019-04-13 14:40:43 UTC

Import patches-unapplied version 9.26a~dfsg-0+deb9u2 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: ac6df50f689501628ecfe1ae200ac4c8df45f57b

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Have gs_cet.ps run from gs_init.ps
  * Undef /odef in gs_init.ps
  * Restrict superexec and remove it from internals and gs_cet.ps
    (CVE-2019-3835) (Closes: #925256)
  * Obliterate "superexec". We don't need it, nor do any known apps
    (CVE-2019-3835) (Closes: #925256)
  * Make a transient proc executeonly (in DefineResource) (CVE-2019-3838)
    (Closes: #925257)
  * an extra transient proc needs executeonly'ed (CVE-2019-3838)
    (Closes: #925257)

applied/debian/stretch 2019-04-27 10:52:08 UTC 2019-04-27
Import patches-applied version 9.26a~dfsg-0+deb9u2 to applied/debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2019-04-13 14:40:43 UTC

Import patches-applied version 9.26a~dfsg-0+deb9u2 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: b57b85625ff351782eda5ceec2225355f892fffa
Unapplied parent: 615d26946ba8738c149853e63f72b76c584620fb

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * Have gs_cet.ps run from gs_init.ps
  * Undef /odef in gs_init.ps
  * Restrict superexec and remove it from internals and gs_cet.ps
    (CVE-2019-3835) (Closes: #925256)
  * Obliterate "superexec". We don't need it, nor do any known apps
    (CVE-2019-3835) (Closes: #925256)
  * Make a transient proc executeonly (in DefineResource) (CVE-2019-3838)
    (Closes: #925257)
  * an extra transient proc needs executeonly'ed (CVE-2019-3838)
    (Closes: #925257)

debian/buster 2019-04-20 16:27:39 UTC 2019-04-20
Import patches-unapplied version 9.27~dfsg-2 to debian/sid

Author: Jonas Smedegaard
Author Date: 2019-04-20 08:16:50 UTC

Import patches-unapplied version 9.27~dfsg-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 6cec558c7e29e260f7d66941a0be0f92147fe853

New changelog entries:
  * Add patch cherry-picked upstream
    to fix regression resolving bounding box of font glyphs.
    Closes: Bug#927429. Thanks to Kenshi Muto.

applied/debian/buster 2019-04-20 16:27:39 UTC 2019-04-20
Import patches-applied version 9.27~dfsg-2 to applied/debian/sid

Author: Jonas Smedegaard
Author Date: 2019-04-20 08:16:50 UTC

Import patches-applied version 9.27~dfsg-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: f5d05f56d219b34fa3095d860149e40c527fcfd4
Unapplied parent: d80dc2fdd790eccd901cc4afd6fe635aa30d6f69

New changelog entries:
  * Add patch cherry-picked upstream
    to fix regression resolving bounding box of font glyphs.
    Closes: Bug#927429. Thanks to Kenshi Muto.

debian/experimental 2019-03-28 16:26:23 UTC 2019-03-28
Import patches-unapplied version 9.27~~rc1~dfsg-2 to debian/experimental

Author: Jonas Smedegaard
Author Date: 2019-03-28 12:02:16 UTC

Import patches-unapplied version 9.27~~rc1~dfsg-2 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 70399bbe07ba5a13ea0690ed06ad75af7d196d2f

New changelog entries:
  * Add patch cherry-picked upstream to fix sefault with 'so' build.
  * Tighten build-dependency on libfreetype6-dev.
  * Revert to not ignore testsuite failures even when targeted experimental.
  * Update testsuite to catch new error message.

applied/debian/experimental 2019-03-28 16:26:23 UTC 2019-03-28
Import patches-applied version 9.27~~rc1~dfsg-2 to applied/debian/experimental

Author: Jonas Smedegaard
Author Date: 2019-03-28 12:02:16 UTC

Import patches-applied version 9.27~~rc1~dfsg-2 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 49e4ec846e41263383650513892bd65610a165f1
Unapplied parent: b58da01bff87d320a33717caba55bc0fc6f1389b

New changelog entries:
  * Add patch cherry-picked upstream to fix sefault with 'so' build.
  * Tighten build-dependency on libfreetype6-dev.
  * Revert to not ignore testsuite failures even when targeted experimental.
  * Update testsuite to catch new error message.

applied/ubuntu/disco-proposed 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-p...

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: b9ccd2bbc96563f1fe22825171ba7f8af42e3a45
Unapplied parent: 91742d40be9cbee8403d64db71a08681ef164653

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/disco 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-p...

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: b9ccd2bbc96563f1fe22825171ba7f8af42e3a45
Unapplied parent: 91742d40be9cbee8403d64db71a08681ef164653

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/disco-proposed 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 34810fcdc24441d6176a62c966cdb35382ca1c99

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/disco 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 34810fcdc24441d6176a62c966cdb35382ca1c99

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: cc3bfa49fb782465af01f897a5773b6d3d3b68d0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: cc3bfa49fb782465af01f897a5773b6d3d3b68d0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: cc3bfa49fb782465af01f897a5773b6d3d3b68d0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/trusty-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: df2b9a0a5dc8c290aa3479cb4fdde0ffac3063f8
Unapplied parent: 587b866de23f0f782533294f5da00aaaeebf35e0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/trusty-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: df2b9a0a5dc8c290aa3479cb4fdde0ffac3063f8
Unapplied parent: 587b866de23f0f782533294f5da00aaaeebf35e0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/trusty-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: df2b9a0a5dc8c290aa3479cb4fdde0ffac3063f8
Unapplied parent: 587b866de23f0f782533294f5da00aaaeebf35e0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-proposed 2018-11-14 17:56:10 UTC 2018-11-14
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.3 to ubuntu/trust...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:09:10 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.3 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 417912b1509cc3d22c579f167d1994126f289962

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

applied/ubuntu/trusty-proposed 2018-11-14 17:56:10 UTC 2018-11-14
Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.3 to applied/ubuntu...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:09:10 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.3 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 0d5f11b5f96dfe3e9401cd3e464f56468e1004db
Unapplied parent: 78e956ea287a156e134abbc129f7292bc55676fd

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

applied/ubuntu/xenial-proposed 2018-11-13 22:13:12 UTC 2018-11-13
Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.3 to applied/ubuntu...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:05:22 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 1cc3947c39458d6ffef827ed4712398a93a4c9c1
Unapplied parent: a2903aa849b61381411443626f67fa305e7c503b

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

ubuntu/xenial-proposed 2018-11-13 22:13:12 UTC 2018-11-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.3 to ubuntu/xenia...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:05:22 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 45d6bab34d179fe22199809edeeaef96f35b1b19

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

applied/ubuntu/cosmic-proposed 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-...

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 8537fa03cb840bafc5f040b1dfb3fec6816c6c4f
Unapplied parent: 1c475491322882c1ea333d99bef5081b4799c162

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/cosmic 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 67a6f88ffdd2514bd8e8ea08bdf8cd67ff04cf37

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/cosmic 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-...

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 8537fa03cb840bafc5f040b1dfb3fec6816c6c4f
Unapplied parent: 1c475491322882c1ea333d99bef5081b4799c162

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/cosmic-proposed 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 67a6f88ffdd2514bd8e8ea08bdf8cd67ff04cf37

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

debian/jessie 2018-06-23 17:11:31 UTC 2018-06-23
Import patches-unapplied version 9.06~dfsg-2+deb8u7 to debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2018-04-29 09:58:34 UTC

Import patches-unapplied version 9.06~dfsg-2+deb8u7 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: 917507a4c9a20532b0dea730759d702f3ae1114b

New changelog entries:
  * Non-maintainer upload.
  * Segfault with fuzzing file in gxht_thresh_image_init
  * Buffer overflow in fill_threshold_buffer (CVE-2016-10317)
    (Closes: #860869)
  * pdfwrite - Guard against trying to output an infinite number
    (CVE-2018-10194) (Closes: #896069)

applied/debian/jessie 2018-06-23 17:11:31 UTC 2018-06-23
Import patches-applied version 9.06~dfsg-2+deb8u7 to applied/debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2018-04-29 09:58:34 UTC

Import patches-applied version 9.06~dfsg-2+deb8u7 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: f3b14e29112bf3b040c10f5cd4fc8449b02ac1ad
Unapplied parent: 5db5e955c01be3a1426d5b5599d3380b8202241d

New changelog entries:
  * Non-maintainer upload.
  * Segfault with fuzzing file in gxht_thresh_image_init
  * Buffer overflow in fill_threshold_buffer (CVE-2016-10317)
    (Closes: #860869)
  * pdfwrite - Guard against trying to output an infinite number
    (CVE-2018-10194) (Closes: #896069)

applied/ubuntu/artful-updates 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

ubuntu/artful-devel 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

applied/ubuntu/artful-security 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

applied/ubuntu/artful-devel 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

ubuntu/artful-updates 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

ubuntu/artful-security 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

importer/ubuntu/pristine-tar 2018-04-04 12:59:35 UTC 2018-04-04
pristine-tar data for ghostscript_9.22~dfsg+1.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-04 12:59:35 UTC

pristine-tar data for ghostscript_9.22~dfsg+1.orig.tar.xz

importer/debian/pristine-tar 2018-04-04 06:01:57 UTC 2018-04-04
pristine-tar data for ghostscript_9.22~dfsg.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-04 06:01:57 UTC

pristine-tar data for ghostscript_9.22~dfsg.orig.tar.xz

applied/ubuntu/bionic 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-...

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 27718e9264c34de3de6202c0784a2da7cce56916
Unapplied parent: 194da0bc7420d2b168069211f89bf959e78eeb62

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/bionic-proposed 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 516297b89f58a8151e8b7f73b3f5b2bcc670c407

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/bionic 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 516297b89f58a8151e8b7f73b3f5b2bcc670c407

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/bionic-proposed 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-...

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 27718e9264c34de3de6202c0784a2da7cce56916
Unapplied parent: 194da0bc7420d2b168069211f89bf959e78eeb62

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/artful 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 7d35ddbba538415fb0b0a0d53890e3aea5f8a878

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/artful-proposed 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-...

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 5e666f10924159d823a049f8c8a845414838a23d
Unapplied parent: 91c7402d8aa53ed0f95ca8905886d97872fc397b

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/artful 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-...

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 5e666f10924159d823a049f8c8a845414838a23d
Unapplied parent: 91c7402d8aa53ed0f95ca8905886d97872fc397b

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/artful-proposed 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 7d35ddbba538415fb0b0a0d53890e3aea5f8a878

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-updates 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-security 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-devel 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-updates 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-devel 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-security 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/yakkety-security 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/yakkety-devel 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/yakkety-devel 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/yakkety-security 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/yakkety-updates 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/yakkety-updates 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/precise-devel 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

ubuntu/precise-security 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

ubuntu/precise-updates 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-updates 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-security 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-devel 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/zesty-proposed 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty...

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 9554d00244f2b020d91077a8466122dfab86324e
Unapplied parent: d5b8d2ce5402553d13edaeb44258b55347330f38

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

ubuntu/zesty 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: b74d140153e04ec188365976c921f8bca5acd060

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

ubuntu/zesty-proposed 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.1 to ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: b74d140153e04ec188365976c921f8bca5acd060

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

applied/ubuntu/zesty 2016-12-16 23:28:17 UTC 2016-12-16
Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty...

Author: Emily Ratliff
Author Date: 2016-12-15 22:27:43 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.1 to applied/ubuntu/zesty-proposed

Imported using git-ubuntu import.

Changelog parent: 9554d00244f2b020d91077a8466122dfab86324e
Unapplied parent: d5b8d2ce5402553d13edaeb44258b55347330f38

New changelog entries:
  * SECURITY UPDATE: Information disclosure through getenv, filenameforall
    - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
      honor SAFER
    - CVE-2013-5653
  * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
    - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
    - CVE-2016-7976
  * SECURITY UPDATE: use-after-free and remote code execution
    - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
    - CVE-2016-7978
  * SECURITY UPDATE: type confusion allows remote code execution
    - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
    - CVE-2016-7979
  * SECURITY UPDATE: NULL dereference
    - debian/patches/CVE-2016-8602.patch: check for sufficient params
    - CVE-2016-8602
  * SECURITY UPDATE: fix SAFER permissions
    - debian/patches/CVE-2016-7977.patch: Be rigorous with SAFER permissions
    - CVE-2016-7977

1100 of 236 results

Other repositories

Name Last Modified
lp:ubuntu/+source/ghostscript 2019-08-15
11 of 1 result
You can't create new repositories for ghostscript in Ubuntu.