Change log for ghostscript package in Ubuntu

175 of 307 results
Published in xenial-updates on 2019-05-08
Published in xenial-security on 2019-05-08
ghostscript (9.26~dfsg+0-0ubuntu0.16.04.9) xenial-security; urgency=medium

  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

 -- Marc Deslauriers <email address hidden>  Tue, 07 May 2019 12:48:37 -0400
Published in cosmic-updates on 2019-05-08
Published in cosmic-security on 2019-05-08
ghostscript (9.26~dfsg+0-0ubuntu0.18.10.9) cosmic-security; urgency=medium

  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

 -- Marc Deslauriers <email address hidden>  Tue, 07 May 2019 12:47:33 -0400
Published in bionic-updates on 2019-05-08
Published in bionic-security on 2019-05-08
ghostscript (9.26~dfsg+0-0ubuntu0.18.04.9) bionic-security; urgency=medium

  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

 -- Marc Deslauriers <email address hidden>  Tue, 07 May 2019 12:48:08 -0400
Published in eoan-release on 2019-05-07
Deleted in eoan-proposed (Reason: moved to release)
ghostscript (9.26~dfsg+0-0ubuntu8) eoan; urgency=medium

  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

 -- Marc Deslauriers <email address hidden>  Tue, 07 May 2019 11:28:11 -0400
Published in disco-updates on 2019-05-08
Published in disco-security on 2019-05-08
ghostscript (9.26~dfsg+0-0ubuntu7.1) disco-security; urgency=medium

  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-3839-1.patch: hide pdfdict and GS_PDF_ProcSet
      in Resource/Init/pdf_base.ps, Resource/Init/pdf_draw.ps,
      Resource/Init/pdf_font.ps, Resource/Init/pdf_main.ps,
      Resource/Init/pdf_ops.ps, Resource/Init/pdf_sec.ps.
    - debian/patches/CVE-2019-3839-2.patch: fix lib/pdf2dsc.ps to use
      documented Ghostscript pdf procedures in lib/pdf2dsc.ps.
    - CVE-2019-3839

 -- Marc Deslauriers <email address hidden>  Tue, 07 May 2019 11:28:11 -0400
Superseded in eoan-release on 2019-05-07
Published in disco-release on 2019-03-22
Deleted in disco-proposed (Reason: moved to release)
ghostscript (9.26~dfsg+0-0ubuntu7) disco; urgency=medium

  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

 -- Marc Deslauriers <email address hidden>  Thu, 21 Mar 2019 13:15:30 -0400
Published in trusty-updates on 2019-03-21
Published in trusty-security on 2019-03-21
ghostscript (9.26~dfsg+0-0ubuntu0.14.04.8) trusty-security; urgency=medium

  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

 -- Marc Deslauriers <email address hidden>  Tue, 19 Mar 2019 09:04:25 -0400
Superseded in bionic-updates on 2019-05-08
Superseded in bionic-security on 2019-05-08
ghostscript (9.26~dfsg+0-0ubuntu0.18.04.8) bionic-security; urgency=medium

  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

 -- Marc Deslauriers <email address hidden>  Tue, 19 Mar 2019 09:03:15 -0400
Superseded in cosmic-updates on 2019-05-08
Superseded in cosmic-security on 2019-05-08
ghostscript (9.26~dfsg+0-0ubuntu0.18.10.8) cosmic-security; urgency=medium

  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

 -- Marc Deslauriers <email address hidden>  Tue, 19 Mar 2019 08:14:22 -0400
Superseded in xenial-updates on 2019-05-08
Superseded in xenial-security on 2019-05-08
ghostscript (9.26~dfsg+0-0ubuntu0.16.04.8) xenial-security; urgency=medium

  * SECURITY UPDATE: superexec operator is available
    - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
      gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
      Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
    - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
      it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
      Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
    - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
      Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
      psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
    - CVE-2019-3835
  * SECURITY UPDATE: forceput in DefineResource is still accessible
    - debian/patches/CVE-2019-3838-1.patch: make a transient proc
      executeonly in Resource/Init/gs_res.ps.
    - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
      executeonly in Resource/Init/gs_res.ps.
    - CVE-2019-3838

 -- Marc Deslauriers <email address hidden>  Tue, 19 Mar 2019 09:03:50 -0400
Superseded in bionic-updates on 2019-03-21
Superseded in bionic-security on 2019-03-21
ghostscript (9.26~dfsg+0-0ubuntu0.18.04.7) bionic-security; urgency=medium

  * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail,
    second fix attempt. (LP: #1815339)
    - debian/patches/lp1815339.patch: re-enable.
    - debian/patches/lp1815339-2.patch: properly map RGBW color space in
      cups/gdevcups.c.

 -- Marc Deslauriers <email address hidden>  Mon, 25 Feb 2019 09:40:07 -0500
Superseded in disco-release on 2019-03-22
Deleted in disco-proposed on 2019-03-23 (Reason: moved to release)
ghostscript (9.26~dfsg+0-0ubuntu6) disco; urgency=medium

  * SECURITY REGRESSION: Previous regression fix causes blue background
    (LP: #1817308)
    - debian/patches/lp1815339-2.patch: properly map RGBW color space in
      cups/gdevcups.c.

 -- Marc Deslauriers <email address hidden>  Mon, 25 Feb 2019 09:29:45 -0500
Superseded in cosmic-updates on 2019-03-21
Superseded in cosmic-security on 2019-03-21
ghostscript (9.26~dfsg+0-0ubuntu0.18.10.7) cosmic-security; urgency=medium

  * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail,
    second fix attempt. (LP: #1815339)
    - debian/patches/lp1815339.patch: re-enable.
    - debian/patches/lp1815339-2.patch: properly map RGBW color space in
      cups/gdevcups.c.

 -- Marc Deslauriers <email address hidden>  Mon, 25 Feb 2019 09:38:22 -0500
Superseded in trusty-updates on 2019-03-21
Superseded in trusty-security on 2019-03-21
ghostscript (9.26~dfsg+0-0ubuntu0.14.04.7) trusty-security; urgency=medium

  * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail,
    second fix attempt. (LP: #1815339)
    - debian/patches/lp1815339.patch: re-enable.
    - debian/patches/lp1815339-2.patch: properly map RGBW color space in
      cups/gdevcups.c.

 -- Marc Deslauriers <email address hidden>  Mon, 25 Feb 2019 09:41:28 -0500
Superseded in xenial-updates on 2019-03-21
Superseded in xenial-security on 2019-03-21
ghostscript (9.26~dfsg+0-0ubuntu0.16.04.7) xenial-security; urgency=medium

  * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail,
    second fix attempt. (LP: #1815339)
    - debian/patches/lp1815339.patch: re-enable.
    - debian/patches/lp1815339-2.patch: properly map RGBW color space in
      cups/gdevcups.c.

 -- Marc Deslauriers <email address hidden>  Mon, 25 Feb 2019 09:40:51 -0500
Superseded in trusty-updates on 2019-02-26
Superseded in trusty-security on 2019-02-26
ghostscript (9.26~dfsg+0-0ubuntu0.14.04.6) trusty-security; urgency=medium

  * SECURITY REGRESSION: Ghostscript update causes blue background
    (LP: #1817308)
    - disable debian/patches/lp1815339.patch

 -- Chris Coulson <email address hidden>  Sat, 23 Feb 2019 07:01:35 +0100
Superseded in xenial-updates on 2019-02-26
Superseded in xenial-security on 2019-02-26
ghostscript (9.26~dfsg+0-0ubuntu0.16.04.6) xenial-security; urgency=medium

  * SECURITY REGRESSION: Ghostscript update causes blue background
    (LP: #1817308)
    - disable debian/patches/lp1815339.patch

 -- Chris Coulson <email address hidden>  Sat, 23 Feb 2019 06:56:54 +0100
Superseded in bionic-updates on 2019-02-26
Superseded in bionic-security on 2019-02-26
ghostscript (9.26~dfsg+0-0ubuntu0.18.04.6) bionic-security; urgency=medium

  * SECURITY REGRESSION: Ghostscript update causes blue background
    (LP: #1817308)
    - disable debian/patches/lp1815339.patch

 -- Chris Coulson <email address hidden>  Sat, 23 Feb 2019 06:52:25 +0100
Superseded in cosmic-updates on 2019-02-26
Superseded in cosmic-security on 2019-02-26
ghostscript (9.26~dfsg+0-0ubuntu0.18.10.6) cosmic-security; urgency=medium

  * SECURITY REGRESSION: Ghostscript update causes blue background
    (LP: #1817308)
    - disable debian/patches/lp1815339.patch

 -- Chris Coulson <email address hidden>  Sat, 23 Feb 2019 06:49:04 +0100
Superseded in trusty-updates on 2019-02-23
Superseded in trusty-security on 2019-02-23
ghostscript (9.26~dfsg+0-0ubuntu0.14.04.5) trusty-security; urgency=medium

  * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail
    (LP: #1815339)
    - debian/patches/lp1815339.patch: fix logic in cups/gdevcups.c.
  * debian/symbols.common: add new symbol missing in previous update.

 -- Marc Deslauriers <email address hidden>  Wed, 20 Feb 2019 11:46:54 +0100
Deleted in xenial-updates on 2019-02-23 (Reason: the new security update has a regression)
Deleted in xenial-security on 2019-02-23 (Reason: the new security update has a regression)
ghostscript (9.26~dfsg+0-0ubuntu0.16.04.5) xenial-security; urgency=medium

  * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail
    (LP: #1815339)
    - debian/patches/lp1815339.patch: fix logic in cups/gdevcups.c.
  * debian/symbols.common: add new symbol missing in previous update.

 -- Marc Deslauriers <email address hidden>  Wed, 20 Feb 2019 11:46:24 +0100
Deleted in cosmic-updates on 2019-02-23 (Reason: the new security update has a regression)
Deleted in cosmic-security on 2019-02-23 (Reason: the new security update has a regression)
ghostscript (9.26~dfsg+0-0ubuntu0.18.10.5) cosmic-security; urgency=medium

  * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail
    (LP: #1815339)
    - debian/patches/lp1815339.patch: fix logic in cups/gdevcups.c.
  * debian/libgs9.symbols: add new symbol missing in previous update.

 -- Marc Deslauriers <email address hidden>  Wed, 20 Feb 2019 11:45:19 +0100
Deleted in bionic-updates on 2019-02-23 (Reason: the new security update has a regression)
Deleted in bionic-security on 2019-02-23 (Reason: the new security update has a regression)
ghostscript (9.26~dfsg+0-0ubuntu0.18.04.5) bionic-security; urgency=medium

  * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail
    (LP: #1815339)
    - debian/patches/lp1815339.patch: fix logic in cups/gdevcups.c.
  * debian/libgs9.symbols: add new symbol missing in previous update.

 -- Marc Deslauriers <email address hidden>  Wed, 20 Feb 2019 11:45:50 +0100
Superseded in disco-release on 2019-03-13
Deleted in disco-proposed on 2019-03-14 (Reason: moved to release)
ghostscript (9.26~dfsg+0-0ubuntu5) disco; urgency=medium

  * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail
    (LP: #1815339)
    - debian/patches/lp1815339.patch: fix logic in cups/gdevcups.c.

 -- Marc Deslauriers <email address hidden>  Wed, 20 Feb 2019 10:37:16 +0100
Superseded in disco-release on 2019-02-21
Deleted in disco-proposed on 2019-02-22 (Reason: moved to release)
ghostscript (9.26~dfsg+0-0ubuntu4) disco; urgency=medium

  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-6116.patch: address .force* operators
      exposure in Resource/Init/gs_diskn.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fntem.ps, Resource/Init/gs_fonts.ps,
      Resource/Init/gs_init.ps, Resource/Init/gs_lev2.ps,
      Resource/Init/gs_pdfwr.ps, Resource/Init/gs_res.ps,
      Resource/Init/gs_setpd.ps, Resource/Init/pdf_base.ps,
      Resource/Init/pdf_draw.ps, Resource/Init/pdf_font.ps,
      Resource/Init/pdf_main.ps, Resource/Init/pdf_ops.ps,
      psi/int.mak, psi/interp.c, psi/istack.c, psi/istack.h.
    - CVE-2019-6116
  * debian/libgs9.symbols: added new symbol.

 -- Marc Deslauriers <email address hidden>  Wed, 23 Jan 2019 13:02:37 -0500
Superseded in trusty-updates on 2019-02-21
Superseded in trusty-security on 2019-02-21
ghostscript (9.26~dfsg+0-0ubuntu0.14.04.4) trusty-security; urgency=medium

  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-6116.patch: address .force* operators
      exposure in Resource/Init/gs_diskn.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fntem.ps, Resource/Init/gs_fonts.ps,
      Resource/Init/gs_init.ps, Resource/Init/gs_lev2.ps,
      Resource/Init/gs_pdfwr.ps, Resource/Init/gs_res.ps,
      Resource/Init/gs_setpd.ps, Resource/Init/pdf_base.ps,
      Resource/Init/pdf_draw.ps, Resource/Init/pdf_font.ps,
      Resource/Init/pdf_main.ps, Resource/Init/pdf_ops.ps,
      psi/int.mak, psi/interp.c, psi/istack.c, psi/istack.h.
    - CVE-2019-6116

 -- Marc Deslauriers <email address hidden>  Wed, 16 Jan 2019 10:54:43 -0500
Superseded in bionic-security on 2019-02-23
Superseded in bionic-updates on 2019-02-23
Superseded in bionic-updates on 2019-02-21
Superseded in bionic-security on 2019-02-21
ghostscript (9.26~dfsg+0-0ubuntu0.18.04.4) bionic-security; urgency=medium

  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-6116.patch: address .force* operators
      exposure in Resource/Init/gs_diskn.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fntem.ps, Resource/Init/gs_fonts.ps,
      Resource/Init/gs_init.ps, Resource/Init/gs_lev2.ps,
      Resource/Init/gs_pdfwr.ps, Resource/Init/gs_res.ps,
      Resource/Init/gs_setpd.ps, Resource/Init/pdf_base.ps,
      Resource/Init/pdf_draw.ps, Resource/Init/pdf_font.ps,
      Resource/Init/pdf_main.ps, Resource/Init/pdf_ops.ps,
      psi/int.mak, psi/interp.c, psi/istack.c, psi/istack.h.
    - CVE-2019-6116

 -- Marc Deslauriers <email address hidden>  Wed, 16 Jan 2019 10:52:35 -0500
Superseded in xenial-updates on 2019-02-23
Superseded in xenial-security on 2019-02-23
Superseded in xenial-updates on 2019-02-21
Superseded in xenial-security on 2019-02-21
ghostscript (9.26~dfsg+0-0ubuntu0.16.04.4) xenial-security; urgency=medium

  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-6116.patch: address .force* operators
      exposure in Resource/Init/gs_diskn.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fntem.ps, Resource/Init/gs_fonts.ps,
      Resource/Init/gs_init.ps, Resource/Init/gs_lev2.ps,
      Resource/Init/gs_pdfwr.ps, Resource/Init/gs_res.ps,
      Resource/Init/gs_setpd.ps, Resource/Init/pdf_base.ps,
      Resource/Init/pdf_draw.ps, Resource/Init/pdf_font.ps,
      Resource/Init/pdf_main.ps, Resource/Init/pdf_ops.ps,
      psi/int.mak, psi/interp.c, psi/istack.c, psi/istack.h.
    - CVE-2019-6116

 -- Marc Deslauriers <email address hidden>  Wed, 16 Jan 2019 10:53:06 -0500
Superseded in cosmic-security on 2019-02-23
Superseded in cosmic-updates on 2019-02-23
Superseded in cosmic-updates on 2019-02-21
Superseded in cosmic-security on 2019-02-21
ghostscript (9.26~dfsg+0-0ubuntu0.18.10.4) cosmic-security; urgency=medium

  * SECURITY UPDATE: code execution vulnerability
    - debian/patches/CVE-2019-6116.patch: address .force* operators
      exposure in Resource/Init/gs_diskn.ps, Resource/Init/gs_dps1.ps,
      Resource/Init/gs_fntem.ps, Resource/Init/gs_fonts.ps,
      Resource/Init/gs_init.ps, Resource/Init/gs_lev2.ps,
      Resource/Init/gs_pdfwr.ps, Resource/Init/gs_res.ps,
      Resource/Init/gs_setpd.ps, Resource/Init/pdf_base.ps,
      Resource/Init/pdf_draw.ps, Resource/Init/pdf_font.ps,
      Resource/Init/pdf_main.ps, Resource/Init/pdf_ops.ps,
      psi/int.mak, psi/interp.c, psi/istack.c, psi/istack.h.
    - CVE-2019-6116

 -- Marc Deslauriers <email address hidden>  Wed, 16 Jan 2019 09:45:52 -0500
Superseded in trusty-updates on 2019-01-23
Superseded in trusty-security on 2019-01-23
ghostscript (9.26~dfsg+0-0ubuntu0.14.04.3) trusty-security; urgency=medium

  * SECURITY REGRESSION: multiple regressions (LP: #1806517)
    - debian/patches/020181126-96c381c*.patch: fix duplex issue.
    - debian/patches/020181205-fae21f16*.patch: fix -dFirstPage and
      -dLastPage issue.

 -- Marc Deslauriers <email address hidden>  Thu, 06 Dec 2018 07:18:19 -0500
Superseded in xenial-updates on 2019-01-23
Superseded in xenial-security on 2019-01-23
ghostscript (9.26~dfsg+0-0ubuntu0.16.04.3) xenial-security; urgency=medium

  * SECURITY REGRESSION: multiple regressions (LP: #1806517)
    - debian/patches/020181126-96c381c*.patch: fix duplex issue.
    - debian/patches/020181205-fae21f16*.patch: fix -dFirstPage and
      -dLastPage issue.

 -- Marc Deslauriers <email address hidden>  Thu, 06 Dec 2018 07:17:51 -0500
Superseded in cosmic-updates on 2019-01-23
Superseded in cosmic-security on 2019-01-23
ghostscript (9.26~dfsg+0-0ubuntu0.18.10.3) cosmic-security; urgency=medium

  * SECURITY REGRESSION: multiple regressions (LP: #1806517)
    - debian/patches/020181126-96c381c*.patch: fix duplex issue.
    - debian/patches/020181205-fae21f16*.patch: fix -dFirstPage and
      -dLastPage issue.

 -- Marc Deslauriers <email address hidden>  Thu, 06 Dec 2018 07:14:48 -0500
Superseded in bionic-updates on 2019-01-23
Superseded in bionic-security on 2019-01-23
ghostscript (9.26~dfsg+0-0ubuntu0.18.04.3) bionic-security; urgency=medium

  * SECURITY REGRESSION: multiple regressions (LP: #1806517)
    - debian/patches/020181126-96c381c*.patch: fix duplex issue.
    - debian/patches/020181205-fae21f16*.patch: fix -dFirstPage and
      -dLastPage issue.

 -- Marc Deslauriers <email address hidden>  Thu, 06 Dec 2018 07:17:16 -0500
Superseded in disco-release on 2019-01-25
Deleted in disco-proposed on 2019-01-26 (Reason: moved to release)
ghostscript (9.26~dfsg+0-0ubuntu3) disco; urgency=low

  * Backported upstream patch to prevent crashes when calling Ghostscript
    with a PDF file and "-dLastPage=1" (LP: #1806517, upstream bug #700315).

 -- Till Kamppeter <email address hidden>  Wed,  5 Dec 2018 16:47:06 +0100
Superseded in disco-release on 2018-12-06
Deleted in disco-proposed on 2018-12-07 (Reason: moved to release)
ghostscript (9.26~dfsg+0-0ubuntu2) disco; urgency=low

  * Backported upstream patch to make Duplex on non-default page sizes work
    (on certain PostScript printers, upstream bug #700232).

 -- Till Kamppeter <email address hidden>  Thu, 29 Nov 2018 22:52:06 +0100
Superseded in disco-release on 2018-11-30
Deleted in disco-proposed on 2018-12-01 (Reason: moved to release)
ghostscript (9.26~dfsg+0-0ubuntu1) disco; urgency=medium

  * SECURITY UPDATE: Updated to 9.26 to fix multiple security issues
    - CVE-2018-19409
    - CVE-2018-19475
    - CVE-2018-19476
    - CVE-2018-19477
  * Removed patches included in new version:
    - debian/patches/0218*.patch
    - debian/patches/lp1800062.patch
  * debian/libgs9.symbols: updated for new version.

 -- Marc Deslauriers <email address hidden>  Wed, 28 Nov 2018 07:12:52 -0500
Superseded in bionic-updates on 2018-12-06
Superseded in bionic-security on 2018-12-06
ghostscript (9.26~dfsg+0-0ubuntu0.18.04.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Updated to 9.26 to fix multiple security issues
    - CVE-2018-19409
    - CVE-2018-19475
    - CVE-2018-19476
    - CVE-2018-19477
  * Removed patches included in new version:
    - debian/patches/0218*.patch
    - debian/patches/lp1800062.patch
  * debian/libgs9.symbols: updated for new version.
  * debian/libgs__VER__-common.maintscript.in: Updated to new version. This
    needs to be done every time the xenial package is updated to a new
    upstream release.

 -- Marc Deslauriers <email address hidden>  Wed, 28 Nov 2018 08:15:24 -0500
Superseded in cosmic-updates on 2018-12-06
Superseded in cosmic-security on 2018-12-06
ghostscript (9.26~dfsg+0-0ubuntu0.18.10.1) cosmic-security; urgency=medium

  * SECURITY UPDATE: Updated to 9.26 to fix multiple security issues
    - CVE-2018-19409
    - CVE-2018-19475
    - CVE-2018-19476
    - CVE-2018-19477
  * Removed patches included in new version:
    - debian/patches/0218*.patch
    - debian/patches/lp1800062.patch
  * debian/libgs9.symbols: updated for new version.

 -- Marc Deslauriers <email address hidden>  Wed, 28 Nov 2018 07:12:52 -0500
Superseded in xenial-updates on 2018-12-06
Superseded in xenial-security on 2018-12-06
ghostscript (9.26~dfsg+0-0ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: Updated to 9.26 to fix multiple security issues
    - CVE-2018-19409
    - CVE-2018-19475
    - CVE-2018-19476
    - CVE-2018-19477
  * Removed patches included in new version:
    - debian/patches/0218*.patch
    - debian/patches/lp1800062.patch
  * debian/symbols.common: updated for new version.

 -- Marc Deslauriers <email address hidden>  Wed, 28 Nov 2018 08:35:43 -0500
Superseded in trusty-updates on 2018-12-06
Superseded in trusty-security on 2018-12-06
ghostscript (9.26~dfsg+0-0ubuntu0.14.04.1) trusty-security; urgency=medium

  * SECURITY UPDATE: Updated to 9.26 to fix multiple security issues
    - CVE-2018-19409
    - CVE-2018-19475
    - CVE-2018-19476
    - CVE-2018-19477
  * Removed patches included in new version:
    - debian/patches/0218*.patch
    - debian/patches/lp1800062.patch
  * debian/symbols.common: updated for new version.

 -- Marc Deslauriers <email address hidden>  Wed, 28 Nov 2018 08:37:17 -0500
Superseded in xenial-updates on 2018-11-29
Deleted in xenial-proposed on 2018-11-30 (Reason: moved to -updates)
ghostscript (9.25~dfsg+1-0ubuntu0.16.04.3) xenial; urgency=medium

  * Fix dependency for libgs9-common (LP: #1802958)

 -- Ioanna Alifieraki <email address hidden>  Mon, 12 Nov 2018 18:05:22 +0000
Superseded in trusty-updates on 2018-11-29
Deleted in trusty-proposed on 2018-11-30 (Reason: moved to -updates)
ghostscript (9.25~dfsg+1-0ubuntu0.14.04.3) trusty; urgency=medium

  * Fix dependency for libgs9-common (LP: #1802958)

 -- Ioanna Alifieraki <email address hidden>  Mon, 12 Nov 2018 18:09:10 +0000
Superseded in trusty-updates on 2018-11-22
Superseded in trusty-security on 2018-11-29
ghostscript (9.25~dfsg+1-0ubuntu0.14.04.2) trusty-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/0218*.patch: multiple cherry-picked upstream commits
      to fix security issues. Thanks to Jonas Smedegaard for cherry-picking
      these for Debian's 9.25~dfsg-3 package.
    - debian/symbols.common: added new symbol.
    - CVE-2018-17961
    - CVE-2018-18073
    - CVE-2018-18284
  * Fix LeadingEdge regression introduced in 9.22. (LP: #1800062)
    - debian/patches/lp1800062.patch: fix cups get/put_params LeadingEdge
      logic in cups/gdevcups.c.

 -- Marc Deslauriers <email address hidden>  Tue, 30 Oct 2018 09:05:40 -0400
Superseded in xenial-updates on 2018-11-20
Superseded in xenial-security on 2018-11-29
ghostscript (9.25~dfsg+1-0ubuntu0.16.04.2) xenial-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/0218*.patch: multiple cherry-picked upstream commits
      to fix security issues. Thanks to Jonas Smedegaard for cherry-picking
      these for Debian's 9.25~dfsg-3 package.
    - debian/symbols.common: added new symbol.
    - CVE-2018-17961
    - CVE-2018-18073
    - CVE-2018-18284
  * Fix LeadingEdge regression introduced in 9.22. (LP: #1800062)
    - debian/patches/lp1800062.patch: fix cups get/put_params LeadingEdge
      logic in cups/gdevcups.c.

 -- Marc Deslauriers <email address hidden>  Tue, 30 Oct 2018 09:04:39 -0400
Superseded in bionic-updates on 2018-11-29
Superseded in bionic-security on 2018-11-29
ghostscript (9.25~dfsg+1-0ubuntu0.18.04.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/0218*.patch: multiple cherry-picked upstream commits
      to fix security issues. Thanks to Jonas Smedegaard for cherry-picking
      these for Debian's 9.25~dfsg-3 package.
    - debian/libgs9.symbols: added new symbol.
    - CVE-2018-17961
    - CVE-2018-18073
    - CVE-2018-18284
  * Fix LeadingEdge regression introduced in 9.22. (LP: #1800062)
    - debian/patches/lp1800062.patch: fix cups get/put_params LeadingEdge
      logic in cups/gdevcups.c.
  * Fix iccprofiles directory to symlink issue (LP: #1800328)
    - debian/libgs__VER__-common.maintscript.in: make sure directory is
      correctly transitioned to a symlink.

 -- Marc Deslauriers <email address hidden>  Tue, 30 Oct 2018 09:00:57 -0400
Superseded in disco-release on 2018-11-29
Deleted in disco-proposed on 2018-11-30 (Reason: moved to release)
Superseded in cosmic-updates on 2018-11-29
Superseded in cosmic-security on 2018-11-29
ghostscript (9.25~dfsg+1-0ubuntu1.1) cosmic-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/0218*.patch: multiple cherry-picked upstream commits
      to fix security issues. Thanks to Jonas Smedegaard for cherry-picking
      these for Debian's 9.25~dfsg-3 package.
    - debian/libgs9.symbols: added new symbol.
    - CVE-2018-17961
    - CVE-2018-18073
    - CVE-2018-18284
  * Fix LeadingEdge regression introduced in 9.22. (LP: #1800062)
    - debian/patches/lp1800062.patch: fix cups get/put_params LeadingEdge
      logic in cups/gdevcups.c.

 -- Marc Deslauriers <email address hidden>  Tue, 30 Oct 2018 08:38:06 -0400
Superseded in trusty-updates on 2018-10-30
Superseded in trusty-security on 2018-10-30
ghostscript (9.25~dfsg+1-0ubuntu0.14.04.1) trusty-security; urgency=medium

  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.
    - debian/rules: use bundled lcms2 as trusty version is too old.

 -- Marc Deslauriers <email address hidden>  Thu, 27 Sep 2018 09:46:18 -0400
Superseded in xenial-updates on 2018-10-30
Superseded in xenial-security on 2018-10-30
ghostscript (9.25~dfsg+1-0ubuntu0.16.04.1) xenial-security; urgency=medium

  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: updated from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/rules, debian/libgs-dev.install: remove static library.
    - debian/symbols.common: updated for new version.

 -- Marc Deslauriers <email address hidden>  Thu, 27 Sep 2018 08:16:57 -0400
Superseded in bionic-updates on 2018-10-30
Superseded in bionic-security on 2018-10-30
ghostscript (9.25~dfsg+1-0ubuntu0.18.04.1) bionic-security; urgency=medium

  * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
    - Previous security release contained an incomplete fix for
      CVE-2018-16510, and there are many other security fixes and
      improvements that went into the new upstream version without getting
      CVE numbers assigned.
    - CVE-2018-16510
    - CVE-2018-17183
  * Packages changes required for new version:
    - debian/patches/CVE*: removed, included in new version.
    - debian/patches/*: refreshed from cosmic package.
    - debian/copyright*: updated from cosmic package.
    - debian/libgs9.symbols: updated with new symbols.

 -- Marc Deslauriers <email address hidden>  Thu, 27 Sep 2018 07:27:17 -0400
Superseded in disco-release on 2018-11-02
Published in cosmic-release on 2018-09-18
Deleted in cosmic-proposed (Reason: moved to release)
ghostscript (9.25~dfsg+1-0ubuntu1) cosmic; urgency=medium

  * New upstream bug fix release
    Highlights:
    - Highly recommended by upstream, release done to fix regressions in 9.24.
    - This release fixes problems with argument handling, some unintended
      results of the security fixes to the SAFER file access restrictions
      (specifically accessing ICC profile files), and some additional security
      issues over the recent 9.24 release.
    - Note: The ps2epsi utility does not, and cannot call Ghostscript with
      the -dSAFER command line option. It should never be called with input
      from untrusted sources.
  * Removed patch 020180906-bc3df07-*.patch backported from upstream.
  * Refreshed patches 2003_support_multiarch.patch and
    2007_suggest_install_ghostscript-doc_in_code.patch with quilt.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

 -- Till Kamppeter <email address hidden>  Thu, 13 Sep 2018 20:27:06 +0200
Superseded in trusty-updates on 2018-10-01
Superseded in trusty-security on 2018-10-01
ghostscript (9.10~dfsg-0ubuntu10.13) trusty-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/CVE-2018-1*.patch: backport large number of
      upstream security fixes.
    - CVE-2018-11645, CVE-2018-15908, CVE-2018-15909, CVE-2018-15910,
      CVE-2018-15911, CVE-2018-16509, CVE-2018-16511, CVE-2018-16513,
      CVE-2018-16539, CVE-2018-16540, CVE-2018-16541, CVE-2018-16542,
      CVE-2018-16543, CVE-2018-16585, CVE-2018-16802

 -- Marc Deslauriers <email address hidden>  Wed, 12 Sep 2018 11:32:27 -0400
Superseded in xenial-updates on 2018-10-01
Superseded in xenial-security on 2018-10-01
ghostscript (9.18~dfsg~0-0ubuntu2.9) xenial-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/CVE-2018-1*.patch: backport large number of
      upstream security fixes.
    - CVE-2018-11645, CVE-2018-15908, CVE-2018-15909, CVE-2018-15910,
      CVE-2018-15911, CVE-2018-16509, CVE-2018-16511, CVE-2018-16513,
      CVE-2018-16539, CVE-2018-16540, CVE-2018-16541, CVE-2018-16542,
      CVE-2018-16543, CVE-2018-16585, CVE-2018-16802

 -- Marc Deslauriers <email address hidden>  Wed, 12 Sep 2018 11:00:10 -0400
Superseded in bionic-updates on 2018-10-01
Superseded in bionic-security on 2018-10-01
ghostscript (9.22~dfsg+1-0ubuntu1.2) bionic-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/CVE-2018-1*.patch: backport large number of
      upstream security fixes.
    - CVE-2018-15908, CVE-2018-15909, CVE-2018-15910, CVE-2018-15911,
      CVE-2018-16509, CVE-2018-16510, CVE-2018-16511, CVE-2018-16513,
      CVE-2018-16539, CVE-2018-16540, CVE-2018-16541, CVE-2018-16542,
      CVE-2018-16543, CVE-2018-16802

 -- Marc Deslauriers <email address hidden>  Tue, 11 Sep 2018 08:49:14 -0400
Superseded in cosmic-proposed on 2018-09-13
ghostscript (9.24~dfsg+1-0ubuntu1) cosmic; urgency=medium

  * New upstream release (LP: #1791279)
    Highlights:
    - Security issues have been the primary focus of this release,
      including solving several (well publicised) real and potential
      exploits.
      Upstream highly recommends this due to the many security fixes
      and improvements.
  * debian/copyright, debian/rules: Upstream renamed the lcms2art/ directory
    to lcms2mt/.
  * Removed patch CVE-2018-10194.patch backported from upstream.
  * Refreshed patch 2010_add_build_timestamp_setting.patch with quilt.
  * 020180906-bc3df07-for-icc-profile-validation-have-cups-id-itself-as-device-n.patch:
    "cups" output device did not work because there were no output profiles
    for all color spaces (Upstream bug #699713).
  * Merged from Debian package:
    - Update copyright-check maintainer script: Extract metadata from png files.
    - Update copyright info:
      + Extend coverage for main upstream author.
      + Extend coverage for Adobe.
    - Extend lintian overrides regarding License-Reference.
    - Declare compliance with Debian Policy 4.2.0.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

 -- Till Kamppeter <email address hidden>  Thu, 06 Sep 2018 20:21:03 +0200
Superseded in cosmic-release on 2018-09-18
Deleted in cosmic-proposed on 2018-09-19 (Reason: moved to release)
ghostscript (9.23~dfsg+1-0ubuntu2) cosmic; urgency=medium

  * Build with -O2 on ppc64el to avoid FTBFS

 -- Graham Inggs <email address hidden>  Sat, 11 Aug 2018 11:41:40 +0000
Superseded in cosmic-proposed on 2018-08-11
ghostscript (9.23~dfsg+1-0ubuntu1) cosmic; urgency=medium

  * New upstream release
    Highlights:
    + Ghostscript now has a family of 'pdfimage' devices (pdfimage8,
      pdfimage24 and pdfimage32) which produce rendered output wrapped
      up as an image in a PDF. Additionally, there is a 'pclm' device
      which produces PCLm format output.
    + There is now a ColorAccuracy parameter allowing the user to
      decide between speed or accuracy in ICC color transforms.
    + JPEG Passthrough: devices which support it can now receive the
      'raw' JPEG stream from the interpreter. The main use of this is
      the pdfwrite/ps2write family of devices that can now take JPEG
      streams from the input file(s) and write them unchanged to the
      output (thus avoiding additional quantization effects).
    + PDF transparency performance improvements
  * Difference to Debian package:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * Use bundled lcms2art instead of system's liblcms2 as the former
    one is made thread safe and also contains preformance enhancements
    which got rejected upstream.
  * Updated list of stripped files/paths in debian/copyright
  * Added licenses of bundled openjpeg and lcms2 libraries to
    debian/copyright
  * Updated/refreshed the 20* patches
  * Dropped CVE-2016-10317.patch as it is included upstream.
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

 -- Till Kamppeter <email address hidden>  Wed, 08 Aug 2018 13:29:37 +0200
Superseded in cosmic-release on 2018-08-11
Deleted in cosmic-proposed on 2018-09-20 (Reason: moved to release)
Superseded in bionic-updates on 2018-09-19
Superseded in bionic-security on 2018-09-19
ghostscript (9.22~dfsg+1-0ubuntu1.1) bionic-security; urgency=medium

  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 24 Apr 2018 14:34:45 -0300
Published in artful-updates on 2018-04-30
Published in artful-security on 2018-04-30
ghostscript (9.21~dfsg+1-0ubuntu3.1) artful-security; urgency=medium

  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

 -- <email address hidden> (Leonidas S. Barbosa)  Tue, 24 Apr 2018 13:55:24 -0300
Superseded in xenial-updates on 2018-09-19
Superseded in xenial-security on 2018-09-19
ghostscript (9.18~dfsg~0-0ubuntu2.8) xenial-security; urgency=medium

  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

 -- <email address hidden> (Leonidas S. Barbosa)  Mon, 23 Apr 2018 15:40:08 -0300
Superseded in trusty-updates on 2018-09-19
Superseded in trusty-security on 2018-09-19
ghostscript (9.10~dfsg-0ubuntu10.12) trusty-security; urgency=medium

  * SECURITY UPDATE: Heap-based buffer overflow and application crash
    - debian/patches/CVE-2016-10317.patch: check max_height bounds in
      base/gxht_thresh.c, base/gxipixel.c.
    - CVE-2016-10317
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2018-10194.patch: avoid infinite number
      in devices/vector/gdevpdts.c.
    - CVE-2018-10194

 -- <email address hidden> (Leonidas S. Barbosa)  Mon, 23 Apr 2018 14:27:51 -0300
Superseded in cosmic-release on 2018-05-03
Published in bionic-release on 2018-02-24
Deleted in bionic-proposed (Reason: moved to release)
ghostscript (9.22~dfsg+1-0ubuntu1) bionic; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

 -- Till Kamppeter <email address hidden>  Fri, 23 Feb 2018 21:12:00 +0100
Superseded in bionic-release on 2018-02-24
Published in artful-release on 2017-09-15
Deleted in artful-proposed (Reason: moved to release)
ghostscript (9.21~dfsg+1-0ubuntu3) artful; urgency=medium

  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 14 Sep 2017 13:48:36 -0400
Superseded in artful-release on 2017-09-15
Deleted in artful-proposed on 2017-09-16 (Reason: moved to release)
ghostscript (9.21~dfsg+1-0ubuntu2) artful; urgency=low

  * 020170831-4129543.patch: Backported fix from upstream to make the
    contents of combo boxes in filled PDF forms show (Upstream bug #698461).

 -- Till Kamppeter <email address hidden>  Fri,  1 Sep 2017 08:57:00 -0300
Obsolete in zesty-updates on 2018-06-22
Obsolete in zesty-security on 2018-06-22
ghostscript (9.19~dfsg+1-0ubuntu7.6) zesty-security; urgency=medium

  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

 -- <email address hidden> (Leonidas S. Barbosa)  Fri, 25 Aug 2017 10:19:44 -0300
Superseded in xenial-updates on 2018-04-30
Superseded in xenial-security on 2018-04-30
ghostscript (9.18~dfsg~0-0ubuntu2.7) xenial-security; urgency=medium

  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 24 Aug 2017 17:41:06 -0300
Superseded in trusty-updates on 2018-04-30
Superseded in trusty-security on 2018-04-30
ghostscript (9.10~dfsg-0ubuntu10.10) trusty-security; urgency=medium

  * SECURITY UPDATE: DoS via crafted files
    - debian/patches/CVE-2017-11714.patch: prevent to reloc
      a freed object in psi/ztoken.c.
    - CVE-2017-11714
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9611.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9611
  * SECURITY UPDATE: DoS in Artifex Ghostscript
    - debian/patches/CVE-2017-9612.patch: bounds check pointer in
      base/ttinterp.c
    - CVE-2017-9612
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
      in base/ttinterp.c.
    - CVE-2017-9726
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9727.patch: make bounds check in
      base/gxttfb.c.
    - CVE-2017-9727
  * SECURITY UPDATE: DoS heap-based buffer over-read and crash
    - debian/patches/CVE-2017-9739.patch: bounds check in
      base/ttinterp.c.
    - CVE-2017-9739
  * SECURITY UPDATE: DoS heap-base buffer over-read and crash
    - debian/patches/CVE-2017-9835.patch: bounds check the array
      allocations methods in base/gsalloc.c.
    - CVE-2017-9835

 -- <email address hidden> (Leonidas S. Barbosa)  Thu, 24 Aug 2017 15:33:07 -0300
Superseded in artful-release on 2017-09-02
Deleted in artful-proposed on 2017-09-03 (Reason: moved to release)
ghostscript (9.21~dfsg+1-0ubuntu1) artful; urgency=low

  * Merge from Debian unstable.  Remaining changes:
    + openjpeg library bundled with upstream Ghostscript/GhostPDL used
      instead of the original openjpeg library, as the original library
      is not accepted into Ubuntu Main
      (https://bugs.launchpad.net/bugs/711061).
  * debian/libgs9.symbols: Updated for new upstream source. Applied patch
    which dpkg-gensymbols generated.

 -- Till Kamppeter <email address hidden>  Thu,  3 Aug 2017 22:08:00 -0300
Superseded in artful-release on 2017-08-07
Deleted in artful-proposed on 2017-08-08 (Reason: moved to release)
ghostscript (9.19~dfsg+1-0ubuntu10) artful; urgency=medium

  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

 -- Steve Beattie <email address hidden>  Mon, 15 May 2017 14:39:41 -0700
Obsolete in yakkety-updates on 2018-01-23
Obsolete in yakkety-security on 2018-01-23
ghostscript (9.19~dfsg+1-0ubuntu6.6) yakkety-security; urgency=medium

  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

 -- Steve Beattie <email address hidden>  Mon, 15 May 2017 14:41:00 -0700
Superseded in xenial-updates on 2017-08-28
Superseded in xenial-security on 2017-08-28
ghostscript (9.18~dfsg~0-0ubuntu2.6) xenial-security; urgency=medium

  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

 -- Steve Beattie <email address hidden>  Mon, 15 May 2017 15:15:23 -0700
Superseded in trusty-updates on 2017-08-28
Superseded in trusty-security on 2017-08-28
ghostscript (9.10~dfsg-0ubuntu10.9) trusty-security; urgency=medium

  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

 -- Steve Beattie <email address hidden>  Mon, 15 May 2017 15:20:33 -0700
Superseded in zesty-updates on 2017-08-28
Superseded in zesty-security on 2017-08-28
ghostscript (9.19~dfsg+1-0ubuntu7.4) zesty-security; urgency=medium

  * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
    DELAYBIND feature (LP: #1687614).
    - debian/patches/CVE-2017-8291-regression.patch: return false rather
      than raise error when .eqproc is called with parameters that are
      not both procedures; correct stack underflow detection.

 -- Steve Beattie <email address hidden>  Mon, 15 May 2017 11:46:44 -0700
Superseded in artful-release on 2017-05-18
Deleted in artful-proposed on 2017-05-19 (Reason: moved to release)
ghostscript (9.19~dfsg+1-0ubuntu8) artful; urgency=medium

  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Dont create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

 -- Steve Beattie <email address hidden>  Thu, 27 Apr 2017 16:00:11 -0700
Superseded in trusty-updates on 2017-05-16
Superseded in trusty-security on 2017-05-16
ghostscript (9.10~dfsg-0ubuntu10.7) trusty-security; urgency=medium

  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

 -- Steve Beattie <email address hidden>  Thu, 27 Apr 2017 17:48:36 -0700
Published in precise-updates on 2017-04-28
Published in precise-security on 2017-04-28
ghostscript (9.05~dfsg-0ubuntu4.5) precise-security; urgency=medium

  * SECURITY UPDATE: invalid handling of parameters to .eqproc and
    .rsdparams allowed disabling -dSAFER and thus code execution
    - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
    - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
    - CVE-2017-8291
  * SECURITY UPDATE: use-after-free in color management module.
    - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
      reenabled
    - CVE-2016-10217
  * SECURITY UPDATE: divide-by-zero error denial of service in
    base/gxfill.c
    - CVE-2016-10219.patch: check for 0 in denominator
    - CVE-2016-10219
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2016-10220.patch: initialize device data structure correctly
    - CVE-2016-10220
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-5951.patch: use the correct param list enumerator
    - CVE-2017-5951
  * SECURITY UPDATE: null pointer dereference denial of service
    - CVE-2017-7207.patch: ensure a device has raster memory, before
      trying to read it
    - CVE-2017-7207

 -- Steve Beattie <email address hidden>  Thu, 27 Apr 2017 19:05:47 -0700
175 of 307 results