Change logs for ghostscript source package in Trusty

  • ghostscript (9.26~dfsg+0-0ubuntu0.14.04.8) trusty-security; urgency=medium
    
      * SECURITY UPDATE: superexec operator is available
        - debian/patches/CVE-2019-3835-pre1.patch: Have gs_cet.ps run from
          gs_init.ps in Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
        - debian/patches/CVE-2019-3835-pre2.patch: Undef /odef in
          Resource/Init/gs_cet.ps, Resource/Init/gs_init.ps.
        - debian/patches/CVE-2019-3835-1.patch: restrict superexec and remove
          it in Resource/Init/gs_cet.ps, Resource/Init/gs_dps1.ps,
          Resource/Init/gs_fonts.ps, Resource/Init/gs_init.ps,
          Resource/Init/gs_ttf.ps, Resource/Init/gs_type1.ps.
        - debian/patches/CVE-2019-3835-2.patch: obliterate superexec in
          Resource/Init/gs_init.ps, psi/icontext.c, psi/icstate.h,
          psi/zcontrol.c, psi/zdict.c, psi/zgeneric.c.
        - CVE-2019-3835
      * SECURITY UPDATE: forceput in DefineResource is still accessible
        - debian/patches/CVE-2019-3838-1.patch: make a transient proc
          executeonly in Resource/Init/gs_res.ps.
        - debian/patches/CVE-2019-3838-2.patch: an extra transient proc needs
          executeonly in Resource/Init/gs_res.ps.
        - CVE-2019-3838
    
     -- Marc Deslauriers <email address hidden>  Tue, 19 Mar 2019 09:04:25 -0400
  • ghostscript (9.26~dfsg+0-0ubuntu0.14.04.7) trusty-security; urgency=medium
    
      * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail,
        second fix attempt. (LP: #1815339)
        - debian/patches/lp1815339.patch: re-enable.
        - debian/patches/lp1815339-2.patch: properly map RGBW color space in
          cups/gdevcups.c.
    
     -- Marc Deslauriers <email address hidden>  Mon, 25 Feb 2019 09:41:28 -0500
  • ghostscript (9.26~dfsg+0-0ubuntu0.14.04.6) trusty-security; urgency=medium
    
      * SECURITY REGRESSION: Ghostscript update causes blue background
        (LP: #1817308)
        - disable debian/patches/lp1815339.patch
    
     -- Chris Coulson <email address hidden>  Sat, 23 Feb 2019 07:01:35 +0100
  • ghostscript (9.26~dfsg+0-0ubuntu0.14.04.5) trusty-security; urgency=medium
    
      * SECURITY REGRESSION: High RIP_MAX_CACHE makes cups output device fail
        (LP: #1815339)
        - debian/patches/lp1815339.patch: fix logic in cups/gdevcups.c.
      * debian/symbols.common: add new symbol missing in previous update.
    
     -- Marc Deslauriers <email address hidden>  Wed, 20 Feb 2019 11:46:54 +0100
  • ghostscript (9.26~dfsg+0-0ubuntu0.14.04.4) trusty-security; urgency=medium
    
      * SECURITY UPDATE: code execution vulnerability
        - debian/patches/CVE-2019-6116.patch: address .force* operators
          exposure in Resource/Init/gs_diskn.ps, Resource/Init/gs_dps1.ps,
          Resource/Init/gs_fntem.ps, Resource/Init/gs_fonts.ps,
          Resource/Init/gs_init.ps, Resource/Init/gs_lev2.ps,
          Resource/Init/gs_pdfwr.ps, Resource/Init/gs_res.ps,
          Resource/Init/gs_setpd.ps, Resource/Init/pdf_base.ps,
          Resource/Init/pdf_draw.ps, Resource/Init/pdf_font.ps,
          Resource/Init/pdf_main.ps, Resource/Init/pdf_ops.ps,
          psi/int.mak, psi/interp.c, psi/istack.c, psi/istack.h.
        - CVE-2019-6116
    
     -- Marc Deslauriers <email address hidden>  Wed, 16 Jan 2019 10:54:43 -0500
  • ghostscript (9.26~dfsg+0-0ubuntu0.14.04.3) trusty-security; urgency=medium
    
      * SECURITY REGRESSION: multiple regressions (LP: #1806517)
        - debian/patches/020181126-96c381c*.patch: fix duplex issue.
        - debian/patches/020181205-fae21f16*.patch: fix -dFirstPage and
          -dLastPage issue.
    
     -- Marc Deslauriers <email address hidden>  Thu, 06 Dec 2018 07:18:19 -0500
  • ghostscript (9.26~dfsg+0-0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: Updated to 9.26 to fix multiple security issues
        - CVE-2018-19409
        - CVE-2018-19475
        - CVE-2018-19476
        - CVE-2018-19477
      * Removed patches included in new version:
        - debian/patches/0218*.patch
        - debian/patches/lp1800062.patch
      * debian/symbols.common: updated for new version.
    
     -- Marc Deslauriers <email address hidden>  Wed, 28 Nov 2018 08:37:17 -0500
  • ghostscript (9.25~dfsg+1-0ubuntu0.14.04.3) trusty; urgency=medium
    
      * Fix dependency for libgs9-common (LP: #1802958)
    
     -- Ioanna Alifieraki <email address hidden>  Mon, 12 Nov 2018 18:09:10 +0000
  • ghostscript (9.25~dfsg+1-0ubuntu0.14.04.2) trusty-security; urgency=medium
    
      * SECURITY UPDATE: Multiple security issues
        - debian/patches/0218*.patch: multiple cherry-picked upstream commits
          to fix security issues. Thanks to Jonas Smedegaard for cherry-picking
          these for Debian's 9.25~dfsg-3 package.
        - debian/symbols.common: added new symbol.
        - CVE-2018-17961
        - CVE-2018-18073
        - CVE-2018-18284
      * Fix LeadingEdge regression introduced in 9.22. (LP: #1800062)
        - debian/patches/lp1800062.patch: fix cups get/put_params LeadingEdge
          logic in cups/gdevcups.c.
    
     -- Marc Deslauriers <email address hidden>  Tue, 30 Oct 2018 09:05:40 -0400
  • ghostscript (9.25~dfsg+1-0ubuntu0.14.04.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: updated to 9.25 to fix multiple security issues
        - Previous security release contained an incomplete fix for
          CVE-2018-16510, and there are many other security fixes and
          improvements that went into the new upstream version without getting
          CVE numbers assigned.
        - CVE-2018-16510
        - CVE-2018-17183
      * Packages changes required for new version:
        - debian/patches/CVE*: removed, included in new version.
        - debian/patches/*: updated from cosmic package.
        - debian/copyright*: updated from cosmic package.
        - debian/rules, debian/libgs-dev.install: remove static library.
        - debian/symbols.common: updated for new version.
        - debian/rules: use bundled lcms2 as trusty version is too old.
    
     -- Marc Deslauriers <email address hidden>  Thu, 27 Sep 2018 09:46:18 -0400
  • ghostscript (9.10~dfsg-0ubuntu10.13) trusty-security; urgency=medium
    
      * SECURITY UPDATE: Multiple security issues
        - debian/patches/CVE-2018-1*.patch: backport large number of
          upstream security fixes.
        - CVE-2018-11645, CVE-2018-15908, CVE-2018-15909, CVE-2018-15910,
          CVE-2018-15911, CVE-2018-16509, CVE-2018-16511, CVE-2018-16513,
          CVE-2018-16539, CVE-2018-16540, CVE-2018-16541, CVE-2018-16542,
          CVE-2018-16543, CVE-2018-16585, CVE-2018-16802
    
     -- Marc Deslauriers <email address hidden>  Wed, 12 Sep 2018 11:32:27 -0400
  • ghostscript (9.10~dfsg-0ubuntu10.12) trusty-security; urgency=medium
    
      * SECURITY UPDATE: Heap-based buffer overflow and application crash
        - debian/patches/CVE-2016-10317.patch: check max_height bounds in
          base/gxht_thresh.c, base/gxipixel.c.
        - CVE-2016-10317
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2018-10194.patch: avoid infinite number
          in devices/vector/gdevpdts.c.
        - CVE-2018-10194
    
     -- <email address hidden> (Leonidas S. Barbosa)  Mon, 23 Apr 2018 14:27:51 -0300
  • ghostscript (9.10~dfsg-0ubuntu10.10) trusty-security; urgency=medium
    
      * SECURITY UPDATE: DoS via crafted files
        - debian/patches/CVE-2017-11714.patch: prevent to reloc
          a freed object in psi/ztoken.c.
        - CVE-2017-11714
      * SECURITY UPDATE: DoS in Artifex Ghostscript
        - debian/patches/CVE-2017-9611.patch: bounds check pointer in
          base/ttinterp.c
        - CVE-2017-9611
      * SECURITY UPDATE: DoS in Artifex Ghostscript
        - debian/patches/CVE-2017-9612.patch: bounds check pointer in
          base/ttinterp.c
        - CVE-2017-9612
      * SECURITY UPDATE: DoS heap-based buffer over-read and crash
        - debian/patches/CVE-2017-9726.patch: bounds check zone pointer
          in base/ttinterp.c.
        - CVE-2017-9726
      * SECURITY UPDATE: DoS heap-based buffer over-read and crash
        - debian/patches/CVE-2017-9727.patch: make bounds check in
          base/gxttfb.c.
        - CVE-2017-9727
      * SECURITY UPDATE: DoS heap-based buffer over-read and crash
        - debian/patches/CVE-2017-9739.patch: bounds check in
          base/ttinterp.c.
        - CVE-2017-9739
      * SECURITY UPDATE: DoS heap-base buffer over-read and crash
        - debian/patches/CVE-2017-9835.patch: bounds check the array
          allocations methods in base/gsalloc.c.
        - CVE-2017-9835
    
     -- <email address hidden> (Leonidas S. Barbosa)  Thu, 24 Aug 2017 15:33:07 -0300
  • ghostscript (9.10~dfsg-0ubuntu10.9) trusty-security; urgency=medium
    
      * REGRESSION UPDATE: Fix for CVE-2017-8291 broke pstoedit when using
        DELAYBIND feature (LP: #1687614).
        - debian/patches/CVE-2017-8291-regression.patch: return false rather
          than raise error when .eqproc is called with parameters that are
          not both procedures; correct stack underflow detection.
    
     -- Steve Beattie <email address hidden>  Mon, 15 May 2017 15:20:33 -0700
  • ghostscript (9.10~dfsg-0ubuntu10.7) trusty-security; urgency=medium
    
      * SECURITY UPDATE: invalid handling of parameters to .eqproc and
        .rsdparams allowed disabling -dSAFER and thus code execution
        - debian/patches/CVE-2017-8291-1.patch: check .eqproc parameters
        - debian/patches/CVE-2017-8291-2.patch: check .rsdparams parameters
        - CVE-2017-8291
      * SECURITY UPDATE: use-after-free in color management module.
        - CVE-2016-10217.patch: Don't create new ctx when pdf14 device
          reenabled
        - CVE-2016-10217
      * SECURITY UPDATE: divide-by-zero error denial of service in
        base/gxfill.c
        - CVE-2016-10219.patch: check for 0 in denominator
        - CVE-2016-10219
      * SECURITY UPDATE: null pointer dereference denial of service
        - CVE-2016-10220.patch: initialize device data structure correctly
        - CVE-2016-10220
      * SECURITY UPDATE: null pointer dereference denial of service
        - CVE-2017-5951.patch: use the correct param list enumerator
        - CVE-2017-5951
      * SECURITY UPDATE: null pointer dereference denial of service
        - CVE-2017-7207.patch: ensure a device has raster memory, before
          trying to read it
        - CVE-2017-7207
    
     -- Steve Beattie <email address hidden>  Thu, 27 Apr 2017 17:48:36 -0700
  • ghostscript (9.10~dfsg-0ubuntu10.6) trusty-security; urgency=medium
    
      * SECURITY UPDATE: Fix regression introduced by fix for CVE-2013-5653
        (LP: #1647276)
        - debian/patches/CVE-2013-5653-regression.patch
    
     -- Emily Ratliff <email address hidden>  Mon, 05 Dec 2016 11:14:11 -0600
  • ghostscript (9.10~dfsg-0ubuntu10.5) trusty-security; urgency=medium
    
      * SECURITY UPDATE: Information disclosure through getenv, filenameforall
        - debian/patches/CVE-2013-5653.patch: Have filenameforall and getenv
          honor SAFER
        - CVE-2013-5653
      * SECURITY UPDATE: userparams with %pipe% in paths allow remote shell exec
        - debian/patches/CVE-2016-7976.patch: Add a file permissions callback
        - CVE-2016-7976
      * SECURITY UPDATE: use-after-free and remote code execution
        - debian/patches/CVE-2016-7978.patch: Reference count device icc profile
        - CVE-2016-7978
      * SECURITY UPDATE: type confusion allows remote code execution
        - debian/patches/CVE-2016-7979.patch: DSC parser - validate parameters
        - CVE-2016-7979
      * SECURITY UPDATE: NULL dereference
        - debian/patches/CVE-2016-8602.patch: check for sufficient params
        - CVE-2016-8602
      * SECURITY UPDATE: fix SAFER permissions
        - debian/patches/safer.patch: Be rigorous with SAFER permissions
    
     -- Emily Ratliff <email address hidden>  Mon, 28 Nov 2016 15:52:57 -0600
  • ghostscript (9.10~dfsg-0ubuntu10.4) trusty-security; urgency=medium
    
      * SECURITY UPDATE: integer overflow in gs_heap_alloc_bytes()
        - debian/patches/CVE-2015-3228.patch: added sanity check to
          base/gsmalloc.c.
        - CVE-2015-3228
    
     -- Marc Deslauriers <email address hidden>  Wed, 29 Jul 2015 16:03:46 -0400
  • ghostscript (9.10~dfsg-0ubuntu10.3) trusty; urgency=low
    
      * debian/patches/lp1342312-infinite-loop.patch: backport upstream patch
        to fix an infinite loop that can hang the gs program in certain
        conditions. (LP: #1342312)
     -- Rolf Leggewie <email address hidden>   Wed, 18 Mar 2015 15:40:28 +0800
  • ghostscript (9.10~dfsg-0ubuntu10.2) trusty-proposed; urgency=low
    
      * debian/patches/020140626-142b12b-null-check-for-icc-profile.patch:
        Add NULL checks for ICC profiles (LP: #1334712, Upstream bug #694154).
     -- Till Kamppeter <email address hidden>   Thu, 26 Jun 2014 20:15:33 +0200
  • ghostscript (9.10~dfsg-0ubuntu10.1) trusty-proposed; urgency=low
    
      * debian/patches/020140428-f4584b0-skip-unsupported-font-files.patch:
        When Ghostscript is scanning through available font files let it skip
        the ones which it does not understand. Before Ghostscript got totally
        blocked by having one broken or incompatible font installed
        (LP: #1313223, Upstream bug #695031).
     -- Till Kamppeter <email address hidden>   Mon, 28 Apr 2014 17:28:33 +0200
  • ghostscript (9.10~dfsg-0ubuntu10) trusty; urgency=low
    
      * debian/patches/1001_pxlcolor-support-jpeg-in-output.patch,
        debian/patches/020140331-4b44b41-pxlcolor-support-jpeg-in-output.patch:
        Replaced preliminary patch by what got actually committed upstream
        (Upstream bug #691880).
      * debian/patches/020140331-41ab485-pxl-transform-deep-images-with-icc-transform-to-emit-high-level-images.patch,
        debian/patches/020140331-8ae4ee2-fixes-pxl-segfault-with-trying-to-set-up-icc-transform-for-bitmasks.patch:
        Transform deep (24-bit) images with an ICC transform to emit high-level
        images (Upstream bug #691880).
      * debian/patches/1002_pxl-make-dicctransform-default.patch: Make deep iamge
        ICC transform default (Upstream bug #695124).
     -- Till Kamppeter <email address hidden>   Mon, 31 Mar 2014 18:24:33 +0200
  • ghostscript (9.10~dfsg-0ubuntu9) trusty; urgency=low
    
      * debian/patches/020140324-b780ff0-protection-against-pxl-segfault-with-image-data-without-colorspace-info.patch:
        Protection against PXL segfault with image data without colorspace info
        (Upstream bug 695103).
     -- Till Kamppeter <email address hidden>   Mon, 24 Mar 2014 23:47:33 +0100
  • ghostscript (9.10~dfsg-0ubuntu8) trusty; urgency=low
    
      * debian/patches/1001_pxlcolor-support-jpeg-in-output.patch: Added JPEG
        output support to the "pxlcolor" PCL-XL output device to vastly reduce
        the size of the output when the input document contains images (Upstream
        bug #691880).
      * debian/patches/020140313-5d6b18a-set-correct-portrait-landscape-orientation-on-pcl-5ce.patch:
        Set correct portrait/landscape orientation on PCL 5c/e output (Upstream
        bug #693715).
      * debian/patches/020140313-6498483-ps2write-fix-a-dsc-comment.patch,
        debian/patches/020140313-095ae57-ps2write-fix-missing-beginresource-comment-for-fontfile-objects.patch:
        Fixes on DSC comments in PostScript output of the "ps2write" device
        Upstream bug #695082).
     -- Till Kamppeter <email address hidden>   Thu, 13 Mar 2014 12:25:33 +0100
  • ghostscript (9.10~dfsg-0ubuntu7) trusty; urgency=low
    
      * debian/patches/020131219-d997bc4-pwgraster-output-device.patch:
        Added "pwgraster" output device to generate the PWG Raster output format,
        an industry-standardized raster input data format for printers.
     -- Till Kamppeter <email address hidden>   Thu, 19 Dec 2013 22:47:33 +0100
  • ghostscript (9.10~dfsg-0ubuntu6) trusty; urgency=low
    
      * debian/patches/020131218-5ddd13e-ps2write-dont-emit-a-page-size-change-if-the-last-request-failed.patch:
        ps2write output device: Don't emit a page size change if the last request
        failed (and was the same size). This prevented from Letter-sized documents
        to be printed double-sided on printers loaded with A4 paper accepting also
        Letter via a printer-internal scale-to-fit or crop-to-fit (Upstream bug
        #694852).
     -- Till Kamppeter <email address hidden>   Wed, 18 Dec 2013 15:28:33 +0100
  • ghostscript (9.10~dfsg-0ubuntu5) trusty; urgency=low
    
      * debian/libgs__VER__.symbols.in: Adjust to support powerpc64le.
     -- Adam Conrad <email address hidden>   Wed, 11 Dec 2013 05:20:19 -0700
  • ghostscript (9.10~dfsg-0ubuntu4) trusty; urgency=low
    
      * debian/patches/020131127-87a7fd8-cups-pwg-raster-output-ppd-less-support.patch:
        "cups" output device: Added support for PWG Raster output
        ("-sMediaClass=PwgRaster"), PPD-less printing with margins supplied via
        "-c '<</.HWMargins[12 12 12 12] /Margins[0 0]>>setpagedevice'", and fixed
        rounding float numbers to integer.
     -- Till Kamppeter <email address hidden>   Wed,  4 Dec 2013 11:38:33 +0100
  • ghostscript (9.10~dfsg-0ubuntu3) trusty; urgency=low
    
      * debian/patches/020131023-ad3e3ed-handle-type-0-font-in-annotation.patch:
        Handle Type 0 font in annotation. This broke printing/displaying certain
        PDF forms (Upstream bug #694734).
     -- Till Kamppeter <email address hidden>   Fri,  1 Nov 2013 15:56:33 +0100
  • ghostscript (9.10~dfsg-0ubuntu2) saucy; urgency=low
    
      * debian/patches/020130903-5ae4180-ps-interpreter-dont-interpolate-imagemask-data-for-high-level-devices.patch:
        PS Interpreter: Do not interpolate imagemask data for high level devices.
        This accelerates processing files with embedded bitmap images when the
        output device is a high-level (vector) device. In this case an explicit
        "-dNOINTERPOLATE" on the command line is not needed any more.
     -- Till Kamppeter <email address hidden>   Tue, 03 Sep 2013 17:42:33 +0200