Change logs for ghostscript source package in Hardy

  • ghostscript (8.61.dfsg.1-1ubuntu3.5) hardy-security; urgency=low
    
      * SECURITY UPDATE: denial of service and possible code execution via
        icclib overflow
        - debian/patches/CVE-2012-4405.dpatch: validate input channels in
          icclib/icc.c.
        - CVE-2012-4405
     -- Marc Deslauriers <email address hidden>   Fri, 21 Sep 2012 08:58:24 -0400
  • ghostscript (8.61.dfsg.1-1ubuntu3.4) hardy-security; urgency=low
    
      * SECURITY UPDATE: integer overflows via integer multiplication for
        memory allocation
        - debian/patches/CVE-2008-352x.dpatch: introduce new size-checked
          allocation functions and use them in:
          * jasper/src/libjasper/base/{jas_cm.c,jas_icc.c,jas_image.c,
            jas_malloc.c,jas_seq.c}
          * jasper/src/libjasper/bmp/bmp_dec.c
          * jasper/src/libjasper/include/jasper/jas_malloc.h
          * jasper/src/libjasper/jp2/{jp2_cod.c,jp2_dec.c,jp2_enc.c}
          * jasper/src/libjasper/jpc/{jpc_cs.c,jpc_dec.c,jpc_enc.c,jpc_mqdec.c,
            jpc_mqenc.c,jpc_qmfb.c,jpc_t1enc.c,jpc_t2cod.c,jpc_t2dec.c,
            jpc_t2enc.c,jpc_tagtree.c,jpc_util.c}
          * jasper/src/libjasper/mif/mif_cod.c
        - CVE-2008-3520
      * SECURITY UPDATE: buffer overflow via vsprintf in jas_stream_printf()
        - debian/patches/CVE-2008-352x.dpatch: use vsnprintf() in
          jasper/src/libjasper/base/jas_stream.c
        - CVE-2008-3522
      * SECURITY UPDATE: arbitrary code execution or denial of service via
        off-by-one in TrueType interpreter.
        - debian/patches/CVE-2009-3743.dpatch: check for null in src/ttinterp.c.
        - CVE-2009-3743
      * SECURITY UPDATE: denial of service via crafted font data
        - debian/patches/CVE-2010-4054.dpatch: check for null pointers in
          src/{gsgdata.c,gstype1.c,gstype2.c,gxtype1.c}.
        - CVE-2010-4054
      * SECURITY UPDATE: denial of service and possible code execution via
        heap-based buffer overflows.
        - debian/patches/CVE-2011-451x.dpatch: validate compparms->numrlvls
          and allocate proper size in jasper/src/libjasper/jpc/jpc_cs.c.
        - CVE-2011-4516
        - CVE-2011-4517
     -- Marc Deslauriers <email address hidden>   Tue, 20 Dec 2011 16:01:14 -0500
  • ghostscript (8.61.dfsg.1-1ubuntu3.3) hardy-security; urgency=low
    
      * SECURITY UPDATE: arbitrary code execution via unlimited recursive
        procedure invocations (LP: #546009)
        - debian/patches/CVE-2010-1628.dpatch: only initialize structures if
          all allocations were successful in src/ialloc.c, src/idosave.h,
          src/isave.c.
        - CVE-2010-1628
      * SECURITY UPDATE: arbitrary code execution via crafted PostScript file
        (LP: #546009)
        - debian/patches/CVE-2010-1869.dpatch: use correct buffer sizes in
          src/int.mak, src/iscan.c, src/iscan.h.
        - CVE-2010-1869
      * SECURITY UPDATE: arbitrary code execution via long names
        - debian/patches/security-long-names.dpatch: check against maximum size
          in psi/iscan.c.
        - No CVE number yet.
     -- Marc Deslauriers <email address hidden>   Mon, 12 Jul 2010 12:33:50 -0400
  • ghostscript (8.61.dfsg.1-1ubuntu3.2) hardy-security; urgency=low
    
      * SECURITY UPDATE: denial of service and possible arbitrary code
        execution via buffer underflow in the CCITTFax decoding filter
        - debian/patches/33_CVE-2007-6725.dpatch: work around the buffer
          underflow in src/scfd.c.
        - CVE-2007-6725
      * SECURITY UPDATE: denial of service and possible arbitrary code
        execution via BaseFont writer module
        - debian/patches/34_CVE-2008-6679.dpatch: increase size of buffer in
          src/gdevpdtb.c.
        - CVE-2008-6679
      * SECURITY UPDATE: possible arbitrary code execution via JBIG2 symbol
        dictionary segments
        - debian/patches/35_CVE-2009-0196.dpatch: validate size of runlength
          in export symbol table in jbig2dec/jbig2_symbol_dict.c.
        - CVE-2009-0196
      * SECURITY UPDATE: denial of service and possible arbitrary code
        execution via integer overflows in icclib
        - debian/patches/36_CVE-2009-0792.dpatch: fix numerous overflows in
          icclib/icc.c.
        - CVE-2009-0792
    
     -- Marc Deslauriers <email address hidden>   Thu, 09 Apr 2009 11:26:12 -0400
  • ghostscript (8.61.dfsg.1-1ubuntu3.1) hardy-security; urgency=low
    
      * SECURITY UPDATE: Arbitrary code execution due to integer overflows and
        insufficient upper-bounds checks in the ICC library
        - debian/patches/32_CVE-2009-0583_0584.dpatch: fix multiple integer
          overflows and perform bounds checking in icclib/icc.c.
        - CVE-2009-0583
        - CVE-2009-0584
    
     -- Marc Deslauriers <email address hidden>   Mon, 23 Mar 2009 07:46:37 -0400
  • ghostscript (8.61.dfsg.1-1ubuntu3) hardy; urgency=low
    
      * SECURITY UPDATE: buffer overflow in color space handling code
      * debian/patches/31_CVE-2008-0411.dpatch: fix zseticcspace() to perform
        range checks
      * References
        CVE-2008-0411
    
     -- Jamie Strandboge <email address hidden>   Tue, 08 Apr 2008 11:58:11 -0400
  • ghostscript (8.61.dfsg.1-1ubuntu2) hardy; urgency=low
    
      * Fix debian/libgs8.shlibs for ubuntu version number
    
     -- Jonathan Riddell <email address hidden>   Sat, 16 Feb 2008 18:45:47 +0000
  • ghostscript (8.61.dfsg.1-1ubuntu1) hardy; urgency=low
    
      * Merge from debian unstable, remaining changes:
        - gs-esp and gs-common depend only on ghostscript, not on ghostscript-x,
          as gs-esp had already split off gs-esp-x in Ubuntu
        - Updated the KRGB patch from HP to the newest upstream version with
          added checks for null forward device in the graphic procedures to fix
          segfault bug LP: #69905 and corrected "force banding" code in gsijs_open
          for small images (IE: hagaki in landscape).
    
    ghostscript (8.61.dfsg.1-1) unstable; urgency=low
    
      [Masayuki Hatta]
    
      * New upstream release.
      * Now pdf2dsc can handle PageLabels properly - closes: #266166
      * Bumped up Standards-Version to 3.7.3 (no physical changes).
      * NEWS, README.Debian, copyright: Revised.
      * NEWS: Fixed wrong version number - closes: #454514, #454515
      * Sorted out dpatches:
        01-09: Debian-specific patches
        10-19: Bigger 3rd party patches (KRGB & CJKV)
        20-: Temporary bug fixes (should be incorporated into the upstream)
      * debian/patches/29_gs_css_fix.dpatch: Fixes a syntax error in gs.css
        - closes: #457118
      * debian/patches/30_ps2pdf_man_improvement.dpatch: Improved manpages for
        ps2pdf - closes: #193461
    
      [Till Kamppeter]
    
      * debian/patches/09_ijs_krgb_support.dpatch: Adapted to upstream changes.
      * debian/rules: Updated CUPS-related variables for "make install" calls.
      * debian/rules: Remove /usr/include/ghostscript from the ghostscript
        package, they go into libgs-dev.
      * debian/patches/40_cups_filters_with_buffered_input.dpatch: Modified
        cups/psto* filters to let Ghostscript always use buffered input. This
        works around a Ghostscript bug which prevents printing encrypted PDF
        files with Adobe Reader 8.1.1 and Ghostscript built as shared library
        (Ghostscript bug #689577, Ubuntu bug LP: #172264)
      * debian/patches/42_print_encrypted_PDFs_from_adobe_reader_8.dpatch:
        Fixed printing of encrypted PDF files from Adobe Reader 8.1.1.  This
        is the real fix now and not only a workaround. (Ghostscript bug
        #689577, Ubuntu bug LP: #172264).
    
     -- Till Kamppeter <email address hidden>   Wed,  6 Feb 2008 17:41:22 +0100
  • ghostscript (8.61.dfsg.1-0ubuntu5) hardy; urgency=low
    
      * debian/rules: Do not ship README.gz in ghostscript, it collides with
        ghostscript-doc. (LP: #185602, Debian #460692)
    
     -- Martin Pitt <email address hidden>   Wed, 30 Jan 2008 11:11:03 +0100
  • ghostscript (8.61.dfsg.1-0ubuntu4) hardy; urgency=low
    
      * debian/patches/09_ijs_krgb_support.dpatch: Updated the KRGB patch from
        HP to the newest upstream version with added checks for null forward
        device in the graphic procedures to fix segfault bug LP: #69905 and
        corrected "force banding" code in gsijs_open for small images (IE:
        hagaki in landscape).
    
     -- Till Kamppeter <email address hidden>   Wed, 23 Jan 2008 13:17:43 +0000
  • ghostscript (8.61.dfsg.1-0ubuntu3) hardy; urgency=low
    
      * debian/patches/42_print_encrypted_PDFs_from_adobe_reader_8.dpatch:
        Fixed printing of encrypted PDF files from Adobe Reader 8.1.1. This is
        the real fix now and not only a workaround. (Ghostscript bug #689577,
        Ubuntu bug LP: #172264).
    
     -- Till Kamppeter <email address hidden>   Mon, 12 Dec 2007 12:17:43 +0000
  • ghostscript (8.61.dfsg.1-0ubuntu2) hardy; urgency=low
    
      * Merge with Debian unstable. Remaining Ubuntu changes:
        - gs-esp and gs-common depend only on ghostscript, not on ghostscript-x,
          as gs-esp had already split of gs-esp-x in Ubuntu
        - Upstream version 8.61 final
      * debian/patches/40_cups_filters_with_buffered_input.dpatch: Modified
        cups/psto* filters to let Ghostscript always use buffered input. This
        works around a Ghostscript bug which prevents printing encrypted PDF
        files with Adobe Reader 8.1.1 and Ghostscript built as shared library
        (Ghostscript bug #689577, Ubuntu bug LP: #172264)
    
     -- Till Kamppeter <email address hidden>   Wed,  5 Dec 2007 13:17:43 +0000
  • ghostscript (8.61.dfsg.1-0ubtuntu1) hardy; urgency=low
    
      * New upstream release
        o Final 8.61 release
      * debian/patches/09_ijs_krgb_support.dpatch: Adapted to upstream changes.
      * debian/rules: Updated CUPS-related variables for "make install" calls.
      * debian/rules: Remove /usr/include/ghostscript from the ghostscript
        package, they go into lings-dev.
    
     -- Till Kamppeter <email address hidden>   Thu, 22 Nov 2007 12:17:43 +0000
  • ghostscript (8.61.dfsg.1~svn8187-0ubuntu4) hardy; urgency=low
    
      * debian/rules: Clean /usr/share/doc/*.html files from package
        'ghostscript', too (incomplete fix in previous versions), since they are
        already shipped in ghostscript-doc and thus have a file conflict.
        (LP: #153218)
    
     -- Martin Pitt <email address hidden>   Mon, 22 Oct 2007 17:21:21 +0200
  • ghostscript (8.61.dfsg.1~svn8187-0ubuntu3) gutsy; urgency=low
    
      [ Till Kamppeter ]
      * debian/rules: Install missing *.upp files (usptream bug, LP: #150985).
    
      [ Martin Pitt ]
      * debian/rules: Clean files from package ghostscript which are moved to
        ghostscript-doc on i386 (where arch-all packages are built). On all
        non-i386 platforms the files remained in the main package, which causes
        file conflicts and unnecessary package growth. This is a quick hack for
        Gutsy. In Hardy, this horribly broken build system should be fixed
        properly.
    
     -- Martin Pitt <email address hidden>   Tue, 09 Oct 2007 23:00:28 +0200