View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/ubuntu/+source/ghostscript
Members of Ubuntu Server Dev import team can upload to this repository. Log in for directions.

Branches

Name Last Modified Last Commit
importer/debian/dsc 2019-10-15 22:37:06 UTC 2019-10-15
DSC file for 9.50~dfsg-2

Author: Ubuntu Git Importer
Author Date: 2019-10-15 22:37:06 UTC

DSC file for 9.50~dfsg-2

applied/debian/sid 2019-10-15 22:31:11 UTC 2019-10-15
Import patches-applied version 9.50~dfsg-2 to applied/debian/sid

Author: Jonas Smedegaard
Author Date: 2019-10-15 13:56:44 UTC

Import patches-applied version 9.50~dfsg-2 to applied/debian/sid

Imported using git-ubuntu import.

Changelog parent: 3e636814c1e0fc3afdd69417005c8cba37f7f1ee
Unapplied parent: fcd5e8c96554e60499ff3a133c6b573946cb52fb

New changelog entries:
  * Build-depend on libfreetype-dev (not libfreetype6-dev).
  [ upstream ]
  * New release.

debian/sid 2019-10-15 22:31:11 UTC 2019-10-15
Import patches-unapplied version 9.50~dfsg-2 to debian/sid

Author: Jonas Smedegaard
Author Date: 2019-10-15 13:56:44 UTC

Import patches-unapplied version 9.50~dfsg-2 to debian/sid

Imported using git-ubuntu import.

Changelog parent: 343404ac62f5ff836d186b3c4a9116070ba28504

New changelog entries:
  * Build-depend on libfreetype-dev (not libfreetype6-dev).
  [ upstream ]
  * New release.

importer/ubuntu/dsc 2019-09-12 12:05:11 UTC 2019-09-12
DSC file for 9.27~dfsg+0-0ubuntu3

Author: Ubuntu Git Importer
Author Date: 2019-09-12 12:05:11 UTC

DSC file for 9.27~dfsg+0-0ubuntu3

ubuntu/eoan-proposed 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 19f02de84f2ddbed86bb64e8511b2f296137ad59

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/focal 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-pr...

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 382633430db6d15a50bc1363009613370e869265
Unapplied parent: e07527d84d52ba948985405d3936fa96d76ce935

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/focal-devel 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 19f02de84f2ddbed86bb64e8511b2f296137ad59

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/focal 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 19f02de84f2ddbed86bb64e8511b2f296137ad59

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/eoan-proposed 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-pr...

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 382633430db6d15a50bc1363009613370e869265
Unapplied parent: e07527d84d52ba948985405d3936fa96d76ce935

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/eoan-devel 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-pr...

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 382633430db6d15a50bc1363009613370e869265
Unapplied parent: e07527d84d52ba948985405d3936fa96d76ce935

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/devel 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-pr...

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 382633430db6d15a50bc1363009613370e869265
Unapplied parent: e07527d84d52ba948985405d3936fa96d76ce935

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/eoan 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-pr...

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 382633430db6d15a50bc1363009613370e869265
Unapplied parent: e07527d84d52ba948985405d3936fa96d76ce935

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/devel 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 19f02de84f2ddbed86bb64e8511b2f296137ad59

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/focal-devel 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-pr...

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-applied version 9.27~dfsg+0-0ubuntu3 to applied/ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 382633430db6d15a50bc1363009613370e869265
Unapplied parent: e07527d84d52ba948985405d3936fa96d76ce935

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/eoan 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 19f02de84f2ddbed86bb64e8511b2f296137ad59

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/eoan-devel 2019-09-12 11:48:25 UTC 2019-09-12
Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Author: Steve Beattie
Author Date: 2019-09-11 19:06:48 UTC

Import patches-unapplied version 9.27~dfsg+0-0ubuntu3 to ubuntu/eoan-proposed

Imported using git-ubuntu import.

Changelog parent: 19f02de84f2ddbed86bb64e8511b2f296137ad59

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/debian/stretch 2019-09-07 17:45:59 UTC 2019-09-07
Import patches-applied version 9.26a~dfsg-0+deb9u4 to applied/debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2019-08-08 05:10:18 UTC

Import patches-applied version 9.26a~dfsg-0+deb9u4 to applied/debian/stretch

Imported using git-ubuntu import.

Changelog parent: 5845eb6b64f47d7098e605a6b1cb636d07952338
Unapplied parent: 9f75ff230b181f074e51f238afd003d5a1bca08e

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * protect use of .forceput with executeonly (CVE-2019-10216)
  * Non-maintainer upload by the Security Team.
  * Hide pdfdict and GS_PDF_ProcSet (internal stuff for the PDF interp)
    (CVE-2019-3839)
  * Fix lib/pdf2dsc.ps to use documented Ghostscript pdf procedures

debian/stretch 2019-09-07 17:45:59 UTC 2019-09-07
Import patches-unapplied version 9.26a~dfsg-0+deb9u4 to debian/stretch

Author: Salvatore Bonaccorso
Author Date: 2019-08-08 05:10:18 UTC

Import patches-unapplied version 9.26a~dfsg-0+deb9u4 to debian/stretch

Imported using git-ubuntu import.

Changelog parent: ed94b7cc575f71f98d5110d5028ad86e1890a9a7

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * protect use of .forceput with executeonly (CVE-2019-10216)
  * Non-maintainer upload by the Security Team.
  * Hide pdfdict and GS_PDF_ProcSet (internal stuff for the PDF interp)
    (CVE-2019-3839)
  * Fix lib/pdf2dsc.ps to use documented Ghostscript pdf procedures

debian/buster 2019-09-07 17:08:39 UTC 2019-09-07
Import patches-unapplied version 9.27~dfsg-2+deb10u1 to debian/buster

Author: Salvatore Bonaccorso
Author Date: 2019-08-08 04:52:14 UTC

Import patches-unapplied version 9.27~dfsg-2+deb10u1 to debian/buster

Imported using git-ubuntu import.

Changelog parent: aff7da158c6072536271be7e2a08337e3abfb29c

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * protect use of .forceput with executeonly (CVE-2019-10216)

applied/debian/buster 2019-09-07 17:08:39 UTC 2019-09-07
Import patches-applied version 9.27~dfsg-2+deb10u1 to applied/debian/buster

Author: Salvatore Bonaccorso
Author Date: 2019-08-08 04:52:14 UTC

Import patches-applied version 9.27~dfsg-2+deb10u1 to applied/debian/buster

Imported using git-ubuntu import.

Changelog parent: 447c83c7d65ea5474763b68c8bc1d0797ba9e31d
Unapplied parent: 668836a958d0d10a74a8d15e0af3480e820fd74c

New changelog entries:
  * Non-maintainer upload by the Security Team.
  * protect use of .forceput with executeonly (CVE-2019-10216)

ubuntu/disco-devel 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.3 to ubuntu/disco-security

Author: Steve Beattie
Author Date: 2019-08-28 03:56:05 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.3 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: caee39a6c3c2e0c6cd6f6994c704215eb1ec334b

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/disco-security 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-applied version 9.26~dfsg+0-0ubuntu7.3 to applied/ubuntu/disco...

Author: Steve Beattie
Author Date: 2019-08-28 03:56:05 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7.3 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: f3a5bc3e0043b556bae97b017319aa2fe6e49346
Unapplied parent: ff2f73cc0b5aa266ae5654987e612d4f6fe56f34

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/disco-devel 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-applied version 9.26~dfsg+0-0ubuntu7.3 to applied/ubuntu/disco...

Author: Steve Beattie
Author Date: 2019-08-28 03:56:05 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7.3 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: f3a5bc3e0043b556bae97b017319aa2fe6e49346
Unapplied parent: ff2f73cc0b5aa266ae5654987e612d4f6fe56f34

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/xenial-updates 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.11 to ubuntu/xeni...

Author: Steve Beattie
Author Date: 2019-08-28 05:43:23 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.11 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 9ec8acf4adad7798d4a42b8bac46b8c682009122

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/xenial-updates 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.11 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-28 05:43:23 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.11 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: ff8b7ef98c8c8cc993f93425d81699f29cb528ec
Unapplied parent: bf655b05654d8b53beb657b9a1cc32cfa064156a

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/disco-updates 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-applied version 9.26~dfsg+0-0ubuntu7.3 to applied/ubuntu/disco...

Author: Steve Beattie
Author Date: 2019-08-28 03:56:05 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7.3 to applied/ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: f3a5bc3e0043b556bae97b017319aa2fe6e49346
Unapplied parent: ff2f73cc0b5aa266ae5654987e612d4f6fe56f34

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/disco-updates 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.3 to ubuntu/disco-security

Author: Steve Beattie
Author Date: 2019-08-28 03:56:05 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.3 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: caee39a6c3c2e0c6cd6f6994c704215eb1ec334b

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/bionic-devel 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.11 to ubuntu/bion...

Author: Steve Beattie
Author Date: 2019-08-28 05:07:57 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.11 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: a317fe40878248b735fe01802253a4674e7965e8

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/bionic-devel 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.11 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-28 05:07:57 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.11 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 19fd4cd14a455af06ab60d9b5b531f2552cfade4
Unapplied parent: b71050cf22dd232739766f789999762a103e84a1

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/xenial-devel 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.11 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-28 05:43:23 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.11 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: ff8b7ef98c8c8cc993f93425d81699f29cb528ec
Unapplied parent: bf655b05654d8b53beb657b9a1cc32cfa064156a

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/bionic-security 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.11 to ubuntu/bion...

Author: Steve Beattie
Author Date: 2019-08-28 05:07:57 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.11 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: a317fe40878248b735fe01802253a4674e7965e8

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/bionic-updates 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.11 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-28 05:07:57 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.11 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 19fd4cd14a455af06ab60d9b5b531f2552cfade4
Unapplied parent: b71050cf22dd232739766f789999762a103e84a1

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/xenial-security 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.11 to ubuntu/xeni...

Author: Steve Beattie
Author Date: 2019-08-28 05:43:23 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.11 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 9ec8acf4adad7798d4a42b8bac46b8c682009122

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/bionic-security 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.11 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-28 05:07:57 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.04.11 to applied/ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: 19fd4cd14a455af06ab60d9b5b531f2552cfade4
Unapplied parent: b71050cf22dd232739766f789999762a103e84a1

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/xenial-devel 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.11 to ubuntu/xeni...

Author: Steve Beattie
Author Date: 2019-08-28 05:43:23 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.16.04.11 to ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: 9ec8acf4adad7798d4a42b8bac46b8c682009122

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

applied/ubuntu/xenial-security 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.11 to applied/ubunt...

Author: Steve Beattie
Author Date: 2019-08-28 05:43:23 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.16.04.11 to applied/ubuntu/xenial-security

Imported using git-ubuntu import.

Changelog parent: ff8b7ef98c8c8cc993f93425d81699f29cb528ec
Unapplied parent: bf655b05654d8b53beb657b9a1cc32cfa064156a

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/disco-security 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.3 to ubuntu/disco-security

Author: Steve Beattie
Author Date: 2019-08-28 03:56:05 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7.3 to ubuntu/disco-security

Imported using git-ubuntu import.

Changelog parent: caee39a6c3c2e0c6cd6f6994c704215eb1ec334b

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/bionic-updates 2019-08-29 01:03:14 UTC 2019-08-29
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.11 to ubuntu/bion...

Author: Steve Beattie
Author Date: 2019-08-28 05:07:57 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.04.11 to ubuntu/bionic-security

Imported using git-ubuntu import.

Changelog parent: a317fe40878248b735fe01802253a4674e7965e8

New changelog entries:
  * SECURITY UPDATE: '-dSAFER' restrictions bypass by .forceput
    Exposures
    - debian/patches/CVE-2019-14811-CVE-2019-14812-CVE-2019-14813.patch:
      Be more defensive by preventing access to .forceput from
      .setuserparams2.
    - CVE-2019-14811
    - CVE-2019-14812
    - CVE-2019-14813
    - debian/patches/CVE-2019-14817.patch: mark more uses of .forceput
      as execteonly
    - CVE-2019-14817

ubuntu/cosmic-devel 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmi...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 9af8e08e2663aa61837beadd141a3a1e5ef4d89d

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

applied/ubuntu/cosmic-devel 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: eeebdce1841c90c44afb0618a94a72c2f7c13b66
Unapplied parent: c5c0358f79ef1beabe9405998e88d96d4735742c

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

applied/ubuntu/cosmic-security 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: eeebdce1841c90c44afb0618a94a72c2f7c13b66
Unapplied parent: c5c0358f79ef1beabe9405998e88d96d4735742c

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

ubuntu/cosmic-updates 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmi...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 9af8e08e2663aa61837beadd141a3a1e5ef4d89d

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

applied/ubuntu/cosmic-updates 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.18.10.9 to applied/ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: eeebdce1841c90c44afb0618a94a72c2f7c13b66
Unapplied parent: c5c0358f79ef1beabe9405998e88d96d4735742c

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

ubuntu/cosmic-security 2019-05-08 12:28:12 UTC 2019-05-08
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmi...

Author: Marc Deslauriers
Author Date: 2019-05-07 16:47:33 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.18.10.9 to ubuntu/cosmic-security

Imported using git-ubuntu import.

Changelog parent: 9af8e08e2663aa61837beadd141a3a1e5ef4d89d

New changelog entries:
  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

debian/experimental 2019-03-28 16:26:23 UTC 2019-03-28
Import patches-unapplied version 9.27~~rc1~dfsg-2 to debian/experimental

Author: Jonas Smedegaard
Author Date: 2019-03-28 12:02:16 UTC

Import patches-unapplied version 9.27~~rc1~dfsg-2 to debian/experimental

Imported using git-ubuntu import.

Changelog parent: 70399bbe07ba5a13ea0690ed06ad75af7d196d2f

New changelog entries:
  * Add patch cherry-picked upstream to fix sefault with 'so' build.
  * Tighten build-dependency on libfreetype6-dev.
  * Revert to not ignore testsuite failures even when targeted experimental.
  * Update testsuite to catch new error message.

applied/debian/experimental 2019-03-28 16:26:23 UTC 2019-03-28
Import patches-applied version 9.27~~rc1~dfsg-2 to applied/debian/experimental

Author: Jonas Smedegaard
Author Date: 2019-03-28 12:02:16 UTC

Import patches-applied version 9.27~~rc1~dfsg-2 to applied/debian/experimental

Imported using git-ubuntu import.

Changelog parent: 49e4ec846e41263383650513892bd65610a165f1
Unapplied parent: b58da01bff87d320a33717caba55bc0fc6f1389b

New changelog entries:
  * Add patch cherry-picked upstream to fix sefault with 'so' build.
  * Tighten build-dependency on libfreetype6-dev.
  * Revert to not ignore testsuite failures even when targeted experimental.
  * Update testsuite to catch new error message.

applied/ubuntu/disco-proposed 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-p...

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: b9ccd2bbc96563f1fe22825171ba7f8af42e3a45
Unapplied parent: 91742d40be9cbee8403d64db71a08681ef164653

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/disco 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-p...

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu7 to applied/ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: b9ccd2bbc96563f1fe22825171ba7f8af42e3a45
Unapplied parent: 91742d40be9cbee8403d64db71a08681ef164653

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/disco 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 34810fcdc24441d6176a62c966cdb35382ca1c99

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/disco-proposed 2019-03-21 17:43:29 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Author: Marc Deslauriers
Author Date: 2019-03-21 17:15:30 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu7 to ubuntu/disco-proposed

Imported using git-ubuntu import.

Changelog parent: 34810fcdc24441d6176a62c966cdb35382ca1c99

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/trusty-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: df2b9a0a5dc8c290aa3479cb4fdde0ffac3063f8
Unapplied parent: 587b866de23f0f782533294f5da00aaaeebf35e0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: cc3bfa49fb782465af01f897a5773b6d3d3b68d0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-security 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: cc3bfa49fb782465af01f897a5773b6d3d3b68d0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/trusty-updates 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: df2b9a0a5dc8c290aa3479cb4fdde0ffac3063f8
Unapplied parent: 587b866de23f0f782533294f5da00aaaeebf35e0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

applied/ubuntu/trusty-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-applied version 9.26~dfsg+0-0ubuntu0.14.04.8 to applied/ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: df2b9a0a5dc8c290aa3479cb4fdde0ffac3063f8
Unapplied parent: 587b866de23f0f782533294f5da00aaaeebf35e0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-devel 2019-03-21 16:03:20 UTC 2019-03-21
Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trust...

Author: Marc Deslauriers
Author Date: 2019-03-19 13:04:25 UTC

Import patches-unapplied version 9.26~dfsg+0-0ubuntu0.14.04.8 to ubuntu/trusty-security

Imported using git-ubuntu import.

Changelog parent: cc3bfa49fb782465af01f897a5773b6d3d3b68d0

New changelog entries:
  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

ubuntu/trusty-proposed 2018-11-14 17:56:10 UTC 2018-11-14
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.3 to ubuntu/trust...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:09:10 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.14.04.3 to ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 417912b1509cc3d22c579f167d1994126f289962

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

applied/ubuntu/trusty-proposed 2018-11-14 17:56:10 UTC 2018-11-14
Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.3 to applied/ubuntu...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:09:10 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.14.04.3 to applied/ubuntu/trusty-proposed

Imported using git-ubuntu import.

Changelog parent: 0d5f11b5f96dfe3e9401cd3e464f56468e1004db
Unapplied parent: 78e956ea287a156e134abbc129f7292bc55676fd

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

ubuntu/xenial-proposed 2018-11-13 22:13:12 UTC 2018-11-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.3 to ubuntu/xenia...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:05:22 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu0.16.04.3 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 45d6bab34d179fe22199809edeeaef96f35b1b19

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

applied/ubuntu/xenial-proposed 2018-11-13 22:13:12 UTC 2018-11-13
Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.3 to applied/ubuntu...

Author: Ioanna Alifieraki
Author Date: 2018-11-12 18:05:22 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu0.16.04.3 to applied/ubuntu/xenial-proposed

Imported using git-ubuntu import.

Changelog parent: 1cc3947c39458d6ffef827ed4712398a93a4c9c1
Unapplied parent: a2903aa849b61381411443626f67fa305e7c503b

New changelog entries:
  * Fix dependency for libgs9-common (LP: #1802958)

ubuntu/cosmic-proposed 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 67a6f88ffdd2514bd8e8ea08bdf8cd67ff04cf37

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/cosmic 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-unapplied version 9.25~dfsg+1-0ubuntu1 to ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 67a6f88ffdd2514bd8e8ea08bdf8cd67ff04cf37

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/cosmic-proposed 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-...

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 8537fa03cb840bafc5f040b1dfb3fec6816c6c4f
Unapplied parent: 1c475491322882c1ea333d99bef5081b4799c162

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/cosmic 2018-09-13 19:33:38 UTC 2018-09-13
Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-...

Author: Till Kamppeter
Author Date: 2018-09-13 18:27:06 UTC

Import patches-applied version 9.25~dfsg+1-0ubuntu1 to applied/ubuntu/cosmic-proposed

Imported using git-ubuntu import.

Changelog parent: 8537fa03cb840bafc5f040b1dfb3fec6816c6c4f
Unapplied parent: 1c475491322882c1ea333d99bef5081b4799c162

New changelog entries:
  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

debian/jessie 2018-06-23 17:11:31 UTC 2018-06-23
Import patches-unapplied version 9.06~dfsg-2+deb8u7 to debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2018-04-29 09:58:34 UTC

Import patches-unapplied version 9.06~dfsg-2+deb8u7 to debian/jessie

Imported using git-ubuntu import.

Changelog parent: 917507a4c9a20532b0dea730759d702f3ae1114b

New changelog entries:
  * Non-maintainer upload.
  * Segfault with fuzzing file in gxht_thresh_image_init
  * Buffer overflow in fill_threshold_buffer (CVE-2016-10317)
    (Closes: #860869)
  * pdfwrite - Guard against trying to output an infinite number
    (CVE-2018-10194) (Closes: #896069)

applied/debian/jessie 2018-06-23 17:11:31 UTC 2018-06-23
Import patches-applied version 9.06~dfsg-2+deb8u7 to applied/debian/jessie

Author: Salvatore Bonaccorso
Author Date: 2018-04-29 09:58:34 UTC

Import patches-applied version 9.06~dfsg-2+deb8u7 to applied/debian/jessie

Imported using git-ubuntu import.

Changelog parent: f3b14e29112bf3b040c10f5cd4fc8449b02ac1ad
Unapplied parent: 5db5e955c01be3a1426d5b5599d3380b8202241d

New changelog entries:
  * Non-maintainer upload.
  * Segfault with fuzzing file in gxht_thresh_image_init
  * Buffer overflow in fill_threshold_buffer (CVE-2016-10317)
    (Closes: #860869)
  * pdfwrite - Guard against trying to output an infinite number
    (CVE-2018-10194) (Closes: #896069)

applied/ubuntu/artful-security 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

applied/ubuntu/artful-updates 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

applied/ubuntu/artful-devel 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artfu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3.1 to applied/ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: 743c0dc6936d8ec02a12dfac5f61ff0001e21650
Unapplied parent: e94c796c859c9cd4e175349b0de7e892f4e7480c

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

ubuntu/artful-updates 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

ubuntu/artful-security 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

ubuntu/artful-devel 2018-04-30 17:23:40 UTC 2018-04-30
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-secu...

Author: Leonidas S. Barbosa
Author Date: 2018-04-24 16:55:24 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3.1 to ubuntu/artful-security

Imported using git-ubuntu import.

Changelog parent: cf067dcd26239859eb49f36259917d8d24177b1f

New changelog entries:
  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

importer/ubuntu/pristine-tar 2018-04-04 12:59:35 UTC 2018-04-04
pristine-tar data for ghostscript_9.22~dfsg+1.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-04 12:59:35 UTC

pristine-tar data for ghostscript_9.22~dfsg+1.orig.tar.xz

importer/debian/pristine-tar 2018-04-04 06:01:57 UTC 2018-04-04
pristine-tar data for ghostscript_9.22~dfsg.orig.tar.xz

Author: Ubuntu Git Importer
Author Date: 2018-04-04 06:01:57 UTC

pristine-tar data for ghostscript_9.22~dfsg.orig.tar.xz

applied/ubuntu/bionic 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-...

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 27718e9264c34de3de6202c0784a2da7cce56916
Unapplied parent: 194da0bc7420d2b168069211f89bf959e78eeb62

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/bionic 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 516297b89f58a8151e8b7f73b3f5b2bcc670c407

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

ubuntu/bionic-proposed 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-unapplied version 9.22~dfsg+1-0ubuntu1 to ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 516297b89f58a8151e8b7f73b3f5b2bcc670c407

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/bionic-proposed 2018-02-23 20:59:03 UTC 2018-02-23
Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-...

Author: Till Kamppeter
Author Date: 2018-02-23 20:12:00 UTC

Import patches-applied version 9.22~dfsg+1-0ubuntu1 to applied/ubuntu/bionic-proposed

Imported using git-ubuntu import.

Changelog parent: 27718e9264c34de3de6202c0784a2da7cce56916
Unapplied parent: 194da0bc7420d2b168069211f89bf959e78eeb62

New changelog entries:
  * Merge from Debian unstable. Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

applied/ubuntu/artful-proposed 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-...

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 5e666f10924159d823a049f8c8a845414838a23d
Unapplied parent: 91c7402d8aa53ed0f95ca8905886d97872fc397b

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/artful-proposed 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 7d35ddbba538415fb0b0a0d53890e3aea5f8a878

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/artful 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-unapplied version 9.21~dfsg+1-0ubuntu3 to ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 7d35ddbba538415fb0b0a0d53890e3aea5f8a878

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/artful 2017-09-14 18:38:54 UTC 2017-09-14
Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-...

Author: Leonidas S. Barbosa
Author Date: 2017-09-14 17:48:36 UTC

Import patches-applied version 9.21~dfsg+1-0ubuntu3 to applied/ubuntu/artful-proposed

Imported using git-ubuntu import.

Changelog parent: 5e666f10924159d823a049f8c8a845414838a23d
Unapplied parent: 91c7402d8aa53ed0f95ca8905886d97872fc397b

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-devel 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-security 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-devel 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-updates 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/zesty-updates 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty...

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu7.6 to applied/ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 76b1c6f52073625049190836b7b0dccce0f1c178
Unapplied parent: eae4e72014afe8e72083524aefe577d206b3e404

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

ubuntu/zesty-security 2017-08-28 17:33:15 UTC 2017-08-28
Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Author: Leonidas S. Barbosa
Author Date: 2017-08-25 13:19:44 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu7.6 to ubuntu/zesty-security

Imported using git-ubuntu import.

Changelog parent: 78c859c2401bf94ad68930a963f4c1ea75c340d9

New changelog entries:
  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

applied/ubuntu/yakkety-updates 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/yakkety-security 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/yakkety-devel 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/yakkety-security 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/yakkety-updates 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-sec...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-unapplied version 9.19~dfsg+1-0ubuntu6.6 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 3d57183e7601ba4d3a2ad010875547bf18579626

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

applied/ubuntu/yakkety-devel 2017-05-16 18:43:33 UTC 2017-05-16
Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakke...

Author: Steve Beattie
Author Date: 2017-05-15 21:41:00 UTC

Import patches-applied version 9.19~dfsg+1-0ubuntu6.6 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 35d370c64e6598d755311c8e757c07f838505d0b
Unapplied parent: 47466daa349bfbf41acda4c71af8b2daf729df81

New changelog entries:
  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

ubuntu/precise-devel 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

ubuntu/precise-security 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

ubuntu/precise-updates 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-unapplied version 9.05~dfsg-0ubuntu4.5 to ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: e1004d3edcbb2565d0cdf6d9d114a1315ffc1186

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-updates 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-security 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

applied/ubuntu/precise-devel 2017-04-28 05:23:28 UTC 2017-04-28
Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise...

Author: Steve Beattie
Author Date: 2017-04-28 02:05:47 UTC

Import patches-applied version 9.05~dfsg-0ubuntu4.5 to applied/ubuntu/precise-security

Imported using git-ubuntu import.

Changelog parent: 8232d42cc6c4146db9f505771400467378378d2d
Unapplied parent: bc5041882b576cf97241b0869e2c7f02ee30444a

New changelog entries:
  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

1100 of 240 results

Other repositories

Name Last Modified
lp:ubuntu/+source/ghostscript 2019-10-18
11 of 1 result
You can't create new repositories for ghostscript in Ubuntu.