From debbugs-submit-bounces@debbugs.gnu.org Sat Sep 08 07:08:32 2018 Received: (at submit) by debbugs.gnu.org; 8 Sep 2018 11:08:32 +0000 Received: from localhost ([127.0.0.1]:50051 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fyb6N-0003kv-QG for submit@debbugs.gnu.org; Sat, 08 Sep 2018 07:08:32 -0400 Received: from eggs.gnu.org ([208.118.235.92]:36957) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fyb6L-0003kb-H2 for submit@debbugs.gnu.org; Sat, 08 Sep 2018 07:08:29 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1fyb6F-0003bh-F0 for submit@debbugs.gnu.org; Sat, 08 Sep 2018 07:08:24 -0400 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on eggs.gnu.org X-Spam-Level: X-Spam-Status: No, score=-0.7 required=5.0 tests=BAYES_20,FREEMAIL_FROM, RCVD_IN_DNSWL_LOW,T_DKIM_INVALID autolearn=disabled version=3.3.2 Received: from lists.gnu.org ([2001:4830:134:3::11]:39076) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1fyb6F-0003bD-AT for submit@debbugs.gnu.org; Sat, 08 Sep 2018 07:08:23 -0400 Received: from eggs.gnu.org ([208.118.235.92]:40579) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1fyb6E-0001BL-Bb for guix-patches@gnu.org; Sat, 08 Sep 2018 07:08:23 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1fyb6B-0003Lx-7d for guix-patches@gnu.org; Sat, 08 Sep 2018 07:08:22 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:60719) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1fyb6A-0003Ji-Vy for guix-patches@gnu.org; Sat, 08 Sep 2018 07:08:19 -0400 Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id 7D0C821ADF for ; Sat, 8 Sep 2018 07:08:18 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute5.internal (MEProxy); Sat, 08 Sep 2018 07:08:18 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastmail.com; h= date:from:message-id:subject:to:x-me-sender:x-me-sender :x-sasl-enc; s=fm3; bh=mK0b9ynZdNdur3Qmq0w7erXwHIfN2FwxlS+y+XTiV rM=; b=ki8mb8YfvuOdX7DrqLQqAXsYUzdcDYeUC+TZLPxeNkuV5HxQw05N3FXtG 8wwsvqcc54qUdY2Aoq95SbroKme45Eqb4zdM6c6rNrXNRM5/OxAyM513GyMsHcTS Lr0jKv5d92JsY2VwBraDMYV3+neIwKUUqvxiBmltTF1feJ0+yuyODrZIgkilwV8d pt+vWamRinhK/irT5/tGrByIIxuwK7YG8V5M62C5YEpBDgFywN7EnEdU4284fMDz z+40LCxa632eWSGNlyQ+qcLAeEfn+PnYJQ4MziiCDqfmZLwIjBl8z/aDeKFckmSA 2ilJ4jrm8msc4ztC2/5LMuEFGYN5A== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=date:from:message-id:subject:to :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=mK0b9ynZdNdur3Qmq 0w7erXwHIfN2FwxlS+y+XTiVrM=; b=XDd68R0lJJbYYqxSiopqJASSK50XDFYZM r/HetanW/2ezbN4w8W1FDOp5uHR7BW/4od274lrwROwWzMiLKQSt0sLQ3bslLKPU MgBKn4sIiwAtnFMRLJ0UeA1eoK1yXky+Iw8cOCmg9VJL57IK0RfVigxWX1VUgOpq +W1g/fQraAQu1lRuPJ52zqmep4JUzw+fFJ4ZGyWt9GByNBS5Y5Tb0i7VB5b8oqq7 F70pmDFBwTN1zz19+NqQqzEhgo8eyqBM9IRJDPdWDDaF57/PwvipfWdOgtL32xD0 s0N1SrcKdQKigBlMb6LM1GyHBUahdbKuf9ElVNSprfFIKk80At5zw== X-ME-Proxy: X-ME-Sender: Received: from localhost (140.226.16.62.customer.cdi.no [62.16.226.140]) by mail.messagingengine.com (Postfix) with ESMTPA id C9178E4122 for ; Sat, 8 Sep 2018 07:08:17 -0400 (EDT) From: Marius Bakke To: guix-patches@gnu.org Subject: [PATCH 0/2] Ghostscript fixes Date: Sat, 8 Sep 2018 13:08:16 +0200 Message-Id: <20180908110816.23518-1-mbakke@fastmail.com> X-Mailer: git-send-email 2.18.0 X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] X-detected-operating-system: by eggs.gnu.org: GNU/Linux 2.6.x X-Received-From: 2001:4830:134:3::11 X-Spam-Score: -4.3 (----) X-Debbugs-Envelope-To: submit X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -5.3 (-----) These patches aim to fix the recent security issues in Ghostscript. I have verified that the reproducers in no longer work with these patches. Marius Bakke (2): gnu: jbig2dec: Replace with 0.15 [security fixes]. gnu: ghostscript: Update replacement to 9.24 [security fixes]. gnu/local.mk | 2 +- gnu/packages/ghostscript.scm | 36 +++- gnu/packages/image.scm | 15 ++ .../patches/ghostscript-CVE-2018-10194.patch | 52 ----- .../patches/ghostscript-CVE-2018-16509.patch | 193 ++++++++++++++++++ 5 files changed, 242 insertions(+), 56 deletions(-) delete mode 100644 gnu/packages/patches/ghostscript-CVE-2018-10194.patch create mode 100644 gnu/packages/patches/ghostscript-CVE-2018-16509.patch -- 2.18.0 From debbugs-submit-bounces@debbugs.gnu.org Sat Sep 08 07:11:03 2018 Received: (at 32663) by debbugs.gnu.org; 8 Sep 2018 11:11:03 +0000 Received: from localhost ([127.0.0.1]:50063 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fyb8o-0003rD-DR for submit@debbugs.gnu.org; Sat, 08 Sep 2018 07:11:02 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:37103) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fyb8m-0003ql-Ty for 32663@debbugs.gnu.org; Sat, 08 Sep 2018 07:11:01 -0400 Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id 5E50421B4C for <32663@debbugs.gnu.org>; Sat, 8 Sep 2018 07:11:00 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute5.internal (MEProxy); Sat, 08 Sep 2018 07:11:00 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastmail.com; h= date:from:message-id:subject:to:x-me-sender:x-me-sender :x-sasl-enc; s=fm3; bh=5zXzWh1u9uNwafMut/RugVXqv0HniKgEtu3LPnXxh ak=; b=Rui4FuPCQYtonqyTkGCaP8q78embOXheB4KBbosOUwPgWW8xyTTeH4Kd0 7ry/KeN2DMcSxjoplnaK6DlbKX/hv+eihGHt+0bs7t5eLl3Z8Ls4pKA48K6rGoBI WOxVJsWFLT5BZT/I8cfaHhucxDLjGgtjlUtKyk/WZNLvYwfDeDUY1YrDrhFh7f92 pvibxMX3DZnQtZ+BKljqL/A876E5mXeVLm/M4BX69n3mpK0/ZU9Mt0+b2o1hFArw VivGoIUyCLd9mRwtcIQaGzQ9pbTVY8tMWFWLDcRxqxyGXOssFI8EEr0lVVdVCgKI mmQA6o/asvfRN8QEAGO9sGEbYJxgw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=date:from:message-id:subject:to :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=5zXzWh1u9uNwafMut /RugVXqv0HniKgEtu3LPnXxhak=; b=vOvEK+2aLRbCh/dSmMouasjyq8VWw/MBy OWERaCfhHDr0+YWNkdY/COyS715GX9b3soigdf4dEXUr48WuP1Lz2HaMnq0tc2XT 47CJjZw76850i42uwQ0JWtN/5tbmpDLSJE1rEHMSCqqUm8XZ0XL6ARefosnPctLX eNpHcWrL5few4/O1UamNsKPBIUcXHYl5H+Mg1Q0lvwY70yeu7melsDRcBWAs8eWj ytqDg3neWs1Zjsw2HL2xQPzDkUw3Tc422VjySAzO8Rp3HfEw9vtNeenETFTKKu14 yHbRm7v2KzzO5/aKbgYHbGq9p2NgTkLypeNIh6YQDPwybBUi4BcOg== X-ME-Proxy: X-ME-Sender: Received: from localhost (140.226.16.62.customer.cdi.no [62.16.226.140]) by mail.messagingengine.com (Postfix) with ESMTPA id A567DE4122 for <32663@debbugs.gnu.org>; Sat, 8 Sep 2018 07:10:59 -0400 (EDT) From: Marius Bakke To: 32663@debbugs.gnu.org Subject: [PATCH 1/2] gnu: jbig2dec: Replace with 0.15 [security fixes]. Date: Sat, 8 Sep 2018 13:10:57 +0200 Message-Id: <20180908111058.23795-1-mbakke@fastmail.com> X-Mailer: git-send-email 2.18.0 X-Spam-Score: -0.7 (/) X-Debbugs-Envelope-To: 32663 X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.7 (-) * gnu/packages/image.scm (jbig2dec-0.15): New public variable. (jbig2dec)[replacement]: New field. --- gnu/packages/image.scm | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/gnu/packages/image.scm b/gnu/packages/image.scm index 81d22ed42..209d33273 100644 --- a/gnu/packages/image.scm +++ b/gnu/packages/image.scm @@ -495,6 +495,7 @@ arithmetic ops.") (package (name "jbig2dec") (version "0.14") + (replacement jbig2dec-0.15) (source (origin (method url-fetch) @@ -519,6 +520,20 @@ work.") (home-page "https://jbig2dec.com") (license license:gpl2+))) +;; This is a bugfix release from an ongoing Ghostscript security audit. +(define-public jbig2dec-0.15 + (package + (inherit jbig2dec) + (version "0.15") + (source (origin + (inherit (package-source jbig2dec)) + (uri (string-append "https://github.com/ArtifexSoftware" + "/ghostpdl-downloads/releases/download/gs924/" + "jbig2dec-" version ".tar.gz")) + (sha256 + (base32 + "0m1qwpbjbirgw2fqznbajdhdhh35d6xa2csr64lpjz735pvimykb")))))) + (define-public openjpeg (package (name "openjpeg") -- 2.18.0 From debbugs-submit-bounces@debbugs.gnu.org Sat Sep 08 07:11:18 2018 Received: (at 32663) by debbugs.gnu.org; 8 Sep 2018 11:11:18 +0000 Received: from localhost ([127.0.0.1]:50065 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fyb8w-0003s0-0r for submit@debbugs.gnu.org; Sat, 08 Sep 2018 07:11:17 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:35959) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fyb8o-0003rB-3K for 32663@debbugs.gnu.org; Sat, 08 Sep 2018 07:11:08 -0400 Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id 11AAE21B4C for <32663@debbugs.gnu.org>; Sat, 8 Sep 2018 07:11:02 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute5.internal (MEProxy); Sat, 08 Sep 2018 07:11:02 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastmail.com; h= content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=1IQg4cpF/9gDD4FC8V+4jCOaIOFhm ZPrdjdZyMxYP+8=; b=N5vFf8XnVP3wp3hatPQJV9VTYzYqub8wyvshNeBQc1owg PQ2aTLLTpqXRgAN7gHdhvXiLAw9R+NlzJFmPAuY3WPLnmRonBMsrgw95zkjoFwIu BKlbS9GJ2HKlTr4qvSw5XX09JXVY8x5QCKYX4kUsJGDzJ7h944ApIdKV7syMz9r5 yt1VmUvHV1avV3ZcrCQk11Tf1BVpaOd5VPFcQTCSQpln81+3eK1AEqD3otLoV6QS vhxzpRWN7SrXAoieWMAobHVoqNcPvV9QrXJoEWerVYD5e/bkJluFjMR4jU7/xVyR Zne8mvf7kWAdrhM3OdfrAaBNMAL0g8bzPjKsYH37w== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=1IQg4c pF/9gDD4FC8V+4jCOaIOFhmZPrdjdZyMxYP+8=; b=sK1TLEeR/T/8TBKR3Sstl6 U7EsvMAPB7NJh/mh+20ENzGlAU9vtMTMarq5MFqeNmj0B+ZzTw5Hc247OwBQ0flJ D9CfyUs7J08ZdUGARl0DJeKcNhs05AGowOHct7WacA9liCc/Y1YVDnL8nmX0BRvT A4gD50FMNLGuMj9xMVQouGlqY9aQKovRHAAoaneyBbgJqRGBMvblLSQSPAe5trn8 3Ypo9rYoFsCXjUfXYOa1xyV8Cy0JiHBvzRIUMfpZNST5S4ZSVIAK2ZIcUV7blCSz TY+3NDGqxc++7IQn+Xrj2PBNc8pGL2C1xN/NVyoFK0Tya5huxFkEzY6fe4R8MXKg == X-ME-Proxy: X-ME-Sender: Received: from localhost (140.226.16.62.customer.cdi.no [62.16.226.140]) by mail.messagingengine.com (Postfix) with ESMTPA id 537DAE4122 for <32663@debbugs.gnu.org>; Sat, 8 Sep 2018 07:11:01 -0400 (EDT) From: Marius Bakke To: 32663@debbugs.gnu.org Subject: [PATCH 2/2] gnu: ghostscript: Update replacement to 9.24 [security fixes]. Date: Sat, 8 Sep 2018 13:10:58 +0200 Message-Id: <20180908111058.23795-2-mbakke@fastmail.com> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180908111058.23795-1-mbakke@fastmail.com> References: <20180908111058.23795-1-mbakke@fastmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 32663 X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) The following CVEs are fixed with this release: CVE-2018-15908, CVE-2018-15909, CVE-2018-15910, CVE-2018-15911, CVE-2018-16509, CVE-2018-16510, CVE-2018-16511, CVE-2018-16513, CVE-2018-16539, CVE-2018-16540, CVE-2018-16541, CVE-2018-16542, CVE-2018-16543. * gnu/packages/patches/ghostscript-CVE-2018-10194.patch: Delete file. * gnu/packages/patches/ghostscript-CVE-2018-16509.patch: New file. * gnu/local.mk (dist_patch_DATA): Adjust accordingly. * gnu/packages/ghostscript.scm (ghostscript/fixed): Update to 9.24. [source](patches): Remove 'ghostscript-CVE-2018-10194.patch' and 'ghostscript-runpath.patch'. Add 'ghostscript-CVE-2018-16509.patch'. [arguments]: Add LDFLAGS to #:configure-flags, and a phase to create output directory. --- gnu/local.mk | 2 +- gnu/packages/ghostscript.scm | 36 +++- .../patches/ghostscript-CVE-2018-10194.patch | 52 ----- .../patches/ghostscript-CVE-2018-16509.patch | 193 ++++++++++++++++++ 4 files changed, 227 insertions(+), 56 deletions(-) delete mode 100644 gnu/packages/patches/ghostscript-CVE-2018-10194.patch create mode 100644 gnu/packages/patches/ghostscript-CVE-2018-16509.patch diff --git a/gnu/local.mk b/gnu/local.mk index 1924ae946..617af81a8 100644 --- a/gnu/local.mk +++ b/gnu/local.mk @@ -726,7 +726,7 @@ dist_patch_DATA = \ %D%/packages/patches/geoclue-config.patch \ %D%/packages/patches/ghc-8.0-fall-back-to-madv_dontneed.patch \ %D%/packages/patches/ghc-dont-pass-linker-flags-via-response-files.patch \ - %D%/packages/patches/ghostscript-CVE-2018-10194.patch \ + %D%/packages/patches/ghostscript-CVE-2018-16509.patch \ %D%/packages/patches/ghostscript-no-header-id.patch \ %D%/packages/patches/ghostscript-no-header-uuid.patch \ %D%/packages/patches/ghostscript-no-header-creationdate.patch \ diff --git a/gnu/packages/ghostscript.scm b/gnu/packages/ghostscript.scm index 1240b1dc1..a4f756bb7 100644 --- a/gnu/packages/ghostscript.scm +++ b/gnu/packages/ghostscript.scm @@ -7,6 +7,7 @@ ;;; Copyright © 2017 Efraim Flashner ;;; Copyright © 2017 Leo Famulari ;;; Copyright © 2018 Tobias Geerinckx-Rice +;;; Copyright © 2018 Marius Bakke ;;; ;;; This file is part of GNU Guix. ;;; @@ -38,8 +39,10 @@ #:use-module ((guix licenses) #:prefix license:) #:use-module (guix packages) #:use-module (guix download) + #:use-module (guix utils) #:use-module (guix build-system gnu) - #:use-module (guix build-system trivial)) + #:use-module (guix build-system trivial) + #:use-module (srfi srfi-1)) (define-public lcms (package @@ -255,11 +258,38 @@ output file formats and printers.") (hidden-package (package (inherit ghostscript) + (version "9.24") (source (origin (inherit (package-source ghostscript)) - (patches (append (origin-patches (package-source ghostscript)) - (search-patches "ghostscript-CVE-2018-10194.patch")))))))) + (uri (string-append "https://github.com/ArtifexSoftware/" + "ghostpdl-downloads/releases/download/gs" + (string-delete #\. version) + "/ghostscript-" version ".tar.xz")) + (sha256 + (base32 + "1mk922rnml93w2g42yxiyn8xqanc50cm65irrgh0b6lp4kgifjfl")) + (patches (search-patches "ghostscript-CVE-2018-16509.patch" + "ghostscript-no-header-creationdate.patch" + "ghostscript-no-header-id.patch" + "ghostscript-no-header-uuid.patch")))) + (arguments + (substitute-keyword-arguments (package-arguments ghostscript) + ((#:configure-flags flags) + ;; Notice that we removed the 'ghostscript-runpath' patch above. + ;; The reason is that it conflicts with an upstream change that + ;; takes LDFLAGS into account. + `(cons (string-append "LDFLAGS=-Wl,-rpath=" + (assoc-ref %outputs "out") "/lib") + ,flags)) + ((#:phases phases) + `(modify-phases ,phases + (add-before 'configure 'create-output-directory + (lambda* (#:key outputs #:allow-other-keys) + ;; Unfortunately the configure script refuses to function if + ;; the directory specified as -rpath does not already exist. + (mkdir-p (string-append (assoc-ref outputs "out") "/lib")) + #t))))))))) (define-public ghostscript/x (package/inherit ghostscript diff --git a/gnu/packages/patches/ghostscript-CVE-2018-10194.patch b/gnu/packages/patches/ghostscript-CVE-2018-10194.patch deleted file mode 100644 index 242e57c27..000000000 --- a/gnu/packages/patches/ghostscript-CVE-2018-10194.patch +++ /dev/null @@ -1,52 +0,0 @@ -Fix CVE-2018-10194: - -https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194 -https://bugs.ghostscript.com/show_bug.cgi?id=699255 - -Patch copied from upstream source repository: - -https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=39b1e54b2968620723bf32e96764c88797714879 - -From 39b1e54b2968620723bf32e96764c88797714879 Mon Sep 17 00:00:00 2001 -From: Ken Sharp -Date: Wed, 18 Apr 2018 15:46:32 +0100 -Subject: [PATCH] pdfwrite - Guard against trying to output an infinite number - -Bug #699255 " Buffer overflow on pprintg1 due to mishandle postscript file data to pdf" - -The file uses an enormous parameter to xyxhow, causing an overflow in -the calculation of text positioning (value > 1e39). - -Since this is basically a nonsense value, and PostScript only supports -real values up to 1e38, this patch follows the same approach as for -a degenerate CTM, and treats it as 0. - -Adobe Acrobat Distiller throws a limitcheck error, so we could do that -instead if this approach proves to be a problem. ---- - devices/vector/gdevpdts.c | 7 ++++++- - 1 file changed, 6 insertions(+), 1 deletion(-) - -diff --git a/devices/vector/gdevpdts.c b/devices/vector/gdevpdts.c -index 848ad781f..172fe6bc3 100644 ---- a/devices/vector/gdevpdts.c -+++ b/devices/vector/gdevpdts.c -@@ -103,9 +103,14 @@ append_text_move(pdf_text_state_t *pts, double dw) - static int - set_text_distance(gs_point *pdist, double dx, double dy, const gs_matrix *pmat) - { -- int code = gs_distance_transform_inverse(dx, dy, pmat, pdist); -+ int code; - double rounded; - -+ if (dx > 1e38 || dy > 1e38) -+ code = gs_error_undefinedresult; -+ else -+ code = gs_distance_transform_inverse(dx, dy, pmat, pdist); -+ - if (code == gs_error_undefinedresult) { - /* The CTM is degenerate. - Can't know the distance in user space. --- -2.18.0 - diff --git a/gnu/packages/patches/ghostscript-CVE-2018-16509.patch b/gnu/packages/patches/ghostscript-CVE-2018-16509.patch new file mode 100644 index 000000000..50ffa3cb9 --- /dev/null +++ b/gnu/packages/patches/ghostscript-CVE-2018-16509.patch @@ -0,0 +1,193 @@ +Ghostscript 9.24 was released with an incomplete fix for CVE-2018-16509: +https://nvd.nist.gov/vuln/detail/CVE-2018-16509 +https://bugs.chromium.org/p/project-zero/issues/detail?id=1640#c19 +https://bugs.ghostscript.com/show_bug.cgi?id=699718 + +The reproducers no longer work after applying these commits: + +https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=5812b1b78fc4d36fdc293b7859de69241140d590 +https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=e914f1da46e33decc534486598dc3eadf69e6efb +https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=3e5d316b72e3965b7968bb1d96baa137cd063ac6 +https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=643b24dbd002fb9c131313253c307cf3951b3d47 + +This patch is a "squashed" version of those. + +diff --git a/Resource/Init/gs_setpd.ps b/Resource/Init/gs_setpd.ps +index bba3c8c0e..8fa7c51df 100644 +--- a/Resource/Init/gs_setpd.ps ++++ b/Resource/Init/gs_setpd.ps +@@ -95,27 +95,41 @@ level2dict begin + { % Since setpagedevice doesn't create new device objects, + % we must (carefully) reinstall the old parameters in + % the same device. +- .currentpagedevice pop //null currentdevice //null .trysetparams ++ .currentpagedevice pop //null currentdevice //null ++ { .trysetparams } .internalstopped ++ { ++ //null ++ } if + dup type /booleantype eq + { pop pop } +- { % This should never happen! ++ { + SETPDDEBUG { (Error in .trysetparams!) = pstack flush } if +- cleartomark pop pop pop ++ {cleartomark pop pop pop} .internalstopped pop ++ % if resetting the entire device state failed, at least put back the ++ % security related key ++ currentdevice //null //false mark /.LockSafetyParams ++ currentpagedevice /.LockSafetyParams .knownget not ++ {systemdict /SAFER .knownget not {//false} } if ++ .putdeviceparamsonly + /.installpagedevice cvx /rangecheck signalerror + } + ifelse pop pop + % A careful reading of the Red Book reveals that an erasepage + % should occur, but *not* an initgraphics. + erasepage .beginpage +- } bind def ++ } bind executeonly def + + /.uninstallpagedevice +- { 2 .endpage { .currentnumcopies //false .outputpage } if ++ { ++ {2 .endpage { .currentnumcopies //false .outputpage } if} .internalstopped pop + nulldevice + } bind def + + (%grestorepagedevice) cvn +- { .uninstallpagedevice grestore .installpagedevice ++ { ++ .uninstallpagedevice ++ grestore ++ .installpagedevice + } bind def + + (%grestoreallpagedevice) cvn +diff --git a/psi/zdevice2.c b/psi/zdevice2.c +index 0c7080d57..159a0c0d9 100644 +--- a/psi/zdevice2.c ++++ b/psi/zdevice2.c +@@ -251,8 +251,8 @@ z2currentgstate(i_ctx_t *i_ctx_p) + /* ------ Wrappers for operators that reset the graphics state. ------ */ + + /* Check whether we need to call out to restore the page device. */ +-static bool +-restore_page_device(const gs_gstate * pgs_old, const gs_gstate * pgs_new) ++static int ++restore_page_device(i_ctx_t *i_ctx_p, const gs_gstate * pgs_old, const gs_gstate * pgs_new) + { + gx_device *dev_old = gs_currentdevice(pgs_old); + gx_device *dev_new; +@@ -260,9 +260,10 @@ restore_page_device(const gs_gstate * pgs_old, const gs_gstate * pgs_new) + gx_device *dev_t2; + bool samepagedevice = obj_eq(dev_old->memory, &gs_int_gstate(pgs_old)->pagedevice, + &gs_int_gstate(pgs_new)->pagedevice); ++ bool LockSafetyParams = dev_old->LockSafetyParams; + + if ((dev_t1 = (*dev_proc(dev_old, get_page_device)) (dev_old)) == 0) +- return false; ++ return 0; + /* If we are going to putdeviceparams in a callout, we need to */ + /* unlock temporarily. The device will be re-locked as needed */ + /* by putdeviceparams from the pgs_old->pagedevice dict state. */ +@@ -271,23 +272,51 @@ restore_page_device(const gs_gstate * pgs_old, const gs_gstate * pgs_new) + dev_new = gs_currentdevice(pgs_new); + if (dev_old != dev_new) { + if ((dev_t2 = (*dev_proc(dev_new, get_page_device)) (dev_new)) == 0) +- return false; +- if (dev_t1 != dev_t2) +- return true; ++ samepagedevice = true; ++ else if (dev_t1 != dev_t2) ++ samepagedevice = false; ++ } ++ ++ if (LockSafetyParams && !samepagedevice) { ++ const int required_ops = 512; ++ const int required_es = 32; ++ ++ /* The %grestorepagedevice must complete: the biggest danger ++ is operand stack overflow. As we use get/putdeviceparams ++ that means pushing all the device params onto the stack, ++ pdfwrite having by far the largest number of parameters ++ at (currently) 212 key/value pairs - thus needing (currently) ++ 424 entries on the op stack. Allowing for working stack ++ space, and safety margin..... ++ */ ++ if (required_ops + ref_stack_count(&o_stack) >= ref_stack_max_count(&o_stack)) { ++ gs_currentdevice(pgs_old)->LockSafetyParams = LockSafetyParams; ++ return_error(gs_error_stackoverflow); ++ } ++ /* We also want enough exec stack space - 32 is an overestimate of ++ what we need to complete the Postscript call out. ++ */ ++ if (required_es + ref_stack_count(&e_stack) >= ref_stack_max_count(&e_stack)) { ++ gs_currentdevice(pgs_old)->LockSafetyParams = LockSafetyParams; ++ return_error(gs_error_execstackoverflow); ++ } + } + /* + * The current implementation of setpagedevice just sets new + * parameters in the same device object, so we have to check + * whether the page device dictionaries are the same. + */ +- return !samepagedevice; ++ return samepagedevice ? 0 : 1; + } + + /* - grestore - */ + static int + z2grestore(i_ctx_t *i_ctx_p) + { +- if (!restore_page_device(igs, gs_gstate_saved(igs))) ++ int code = restore_page_device(i_ctx_p, igs, gs_gstate_saved(igs)); ++ if (code < 0) return code; ++ ++ if (code == 0) + return gs_grestore(igs); + return push_callout(i_ctx_p, "%grestorepagedevice"); + } +@@ -297,7 +326,9 @@ static int + z2grestoreall(i_ctx_t *i_ctx_p) + { + for (;;) { +- if (!restore_page_device(igs, gs_gstate_saved(igs))) { ++ int code = restore_page_device(i_ctx_p, igs, gs_gstate_saved(igs)); ++ if (code < 0) return code; ++ if (code == 0) { + bool done = !gs_gstate_saved(gs_gstate_saved(igs)); + + gs_grestore(igs); +@@ -328,11 +359,15 @@ z2restore(i_ctx_t *i_ctx_p) + if (code < 0) return code; + + while (gs_gstate_saved(gs_gstate_saved(igs))) { +- if (restore_page_device(igs, gs_gstate_saved(igs))) ++ code = restore_page_device(i_ctx_p, igs, gs_gstate_saved(igs)); ++ if (code < 0) return code; ++ if (code > 0) + return push_callout(i_ctx_p, "%restore1pagedevice"); + gs_grestore(igs); + } +- if (restore_page_device(igs, gs_gstate_saved(igs))) ++ code = restore_page_device(i_ctx_p, igs, gs_gstate_saved(igs)); ++ if (code < 0) return code; ++ if (code > 0) + return push_callout(i_ctx_p, "%restorepagedevice"); + + code = dorestore(i_ctx_p, asave); +@@ -355,9 +390,12 @@ static int + z2setgstate(i_ctx_t *i_ctx_p) + { + os_ptr op = osp; ++ int code; + + check_stype(*op, st_igstate_obj); +- if (!restore_page_device(igs, igstate_ptr(op))) ++ code = restore_page_device(i_ctx_p, igs, igstate_ptr(op)); ++ if (code < 0) return code; ++ if (code == 0) + return zsetgstate(i_ctx_p); + return push_callout(i_ctx_p, "%setgstatepagedevice"); + } -- 2.18.0 From debbugs-submit-bounces@debbugs.gnu.org Sat Sep 08 18:53:07 2018 Received: (at 32663) by debbugs.gnu.org; 8 Sep 2018 22:53:07 +0000 Received: from localhost ([127.0.0.1]:50677 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fym6F-0003r4-1M for submit@debbugs.gnu.org; Sat, 08 Sep 2018 18:53:07 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:58875) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fym6C-0003qt-FW for 32663@debbugs.gnu.org; Sat, 08 Sep 2018 18:53:05 -0400 Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 23FB520F24; Sat, 8 Sep 2018 18:53:04 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute4.internal (MEProxy); Sat, 08 Sep 2018 18:53:04 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=famulari.name; h=cc:content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to:x-me-sender:x-me-sender:x-sasl-enc; s= mesmtp; bh=jD9usbrNgcLQ9bG6bkLCGcAhjNYb912b7o3Cy8ADMBg=; b=mRxay o4wxiRHCtS07A/+/3RIZOtVawnVUFffttTgfvAi9v4wDjNOk3ww1EETjL3ITrYBp 4kIAaRrJflwRxuRNAzuo2zKMufslnH2XhhyxgJAOwPHXlcP4goP2lZ/VRqitZqaQ p+JA9VdQKH5clMQ63ZMTGeX1d6XvB9HnCLsykA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=jD9usbrNgcLQ9bG6bkLCGcAhjNYb9 12b7o3Cy8ADMBg=; b=HOy1x3tk06r3bdEPDhBM/PCdL4b+HEoVG1iANjWGLpXhN CCy2Ism27XPHPFKGiDhCACf0uitL1w+vyMj31fpdGSZEfPLQ1NkZfyk2JXrSXy7q uNq2bTE2rOpO/vrQRKV4XkcR3XoJIK7FnBQxykms/1ID6b2c1mqUW/Do9WYw+1LP h++CkKsldhLThu0SYGAEfcSe47oKi+ac/URKGsGT+CV3iqhE2xHJTQZzS+wEFclA akZ4UG3NSSbKbAKM1By43rXq910i9IWHv+3HqmTImUxIeEjobfDk21AFq8ghJ4qO fBSLSdTJ0EpkuXpouIsWMJ6Ef5N5TswBehMi97q9A== X-ME-Proxy: X-ME-Sender: Received: from localhost (96-64-66-194-static.hfc.comcastbusiness.net [96.64.66.194]) by mail.messagingengine.com (Postfix) with ESMTPA id 7483CE442E; Sat, 8 Sep 2018 18:53:03 -0400 (EDT) Date: Sat, 8 Sep 2018 18:53:01 -0400 From: Leo Famulari To: Marius Bakke Subject: Re: [bug#32663] [PATCH 0/2] Ghostscript fixes Message-ID: <20180908225301.GA26265@jasmine.lan> References: <20180908110816.23518-1-mbakke@fastmail.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="FL5UXtIhxfXey3p5" Content-Disposition: inline In-Reply-To: <20180908110816.23518-1-mbakke@fastmail.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Score: -0.7 (/) X-Debbugs-Envelope-To: 32663 Cc: 32663@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.7 (-) --FL5UXtIhxfXey3p5 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Sep 08, 2018 at 01:08:16PM +0200, Marius Bakke wrote: > These patches aim to fix the recent security issues in Ghostscript. > I have verified that the reproducers in > no > longer work with these patches. >=20 > Marius Bakke (2): > gnu: jbig2dec: Replace with 0.15 [security fixes]. > gnu: ghostscript: Update replacement to 9.24 [security fixes]. Thanks! Looks good to me assuming Ghostscript 9.24 is ABI compatible with 9.23. --FL5UXtIhxfXey3p5 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEsFFZSPHn08G5gDigJkb6MLrKfwgFAluUUsoACgkQJkb6MLrK fwjx+g//bYyvnK/PNDq2KAWIqTtSOrOlN0h10i6o192BvKqn01OoUicQBbpBfuu3 wHK01+VFPPS5GcfzE/Em+U4c5Ke4aonmbsDK28XCya+jmoBdKNuEUvBPPZrxgbwY lqog8grw08XC4Qnt/PuHQE+arwytZ+DHLkbijKE42/L/Iwo0GerRLenrO8HVcq/9 lfDCpZXd5/LvCLOnFUzBug1gsi2jQ1/Kw9mRWpFLq4LKXw015fLWBIDlZFBxQqw8 5Xxpd9PqvAWRWPgzrGPAFnCXpHIH6kbQPZ6W95fQf2jxZIN60Bb7NUE9OWJJavvL 5uk7mY9xiOhZXBCXtdrk6tKd8npjJIcEmJKpFgCZa7dBRcPiSe2Hc4hMropGNdRF WPiOIl509anUqQYV1TWONpINlKfQzABh5qgIDYPaLSo9HeTkQi897DoIRQ0qHgak fP3JDq/61p6gIKFkm3LePe+u/DGDvu+/iNBqbP3QQapv6Mygn6+ZITqNRRJvPHDu rIGtuFwwVuJHFP8Pj3zd6pfnPFoJDBL7IkShZhh3yM86hXiXccleQ8JefD3r215a mBL1ILzUGF30t2Ya7x9A/ke9/XD/EHXdGQyXdm/KkrvLOsYdmFCrUeCbKWZ6weYk AWeLBSQLWXG5jvl5eqfbGcDk7A7gka6OY6VBze6n4LYpoFyAgM0= =OzSS -----END PGP SIGNATURE----- --FL5UXtIhxfXey3p5-- From debbugs-submit-bounces@debbugs.gnu.org Sun Sep 09 08:27:46 2018 Received: (at 32663) by debbugs.gnu.org; 9 Sep 2018 12:27:46 +0000 Received: from localhost ([127.0.0.1]:50892 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fyyob-0001EE-Sy for submit@debbugs.gnu.org; Sun, 09 Sep 2018 08:27:46 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:54463) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1fyyoY-0001E5-Pv for 32663@debbugs.gnu.org; Sun, 09 Sep 2018 08:27:44 -0400 Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id 83639217D0; Sun, 9 Sep 2018 08:27:42 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute5.internal (MEProxy); Sun, 09 Sep 2018 08:27:42 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fastmail.com; h= cc:content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; bh=h9xGbB+mh8OK2TclaqP1rmv1mUn8VJA6iYtbmCZbvnA=; b=BEM9l+iJ I0GQSQViNhX6KFOr8T0e22MA7c7Q7YlZyDNKE1gOIlkpXsq3qAaz1EQZx+0krILU 4pqE8nCJPnUhWHJZ30HSQAYrRx5EjPSF5jX3DD+JtnqFGUw0lHLzcancCh3x+sb6 PSJ081ZBcGjLcyxcfJ6AdzhZnjC79KGWRy0+pD7BFQDwCMRYR4/nfSPpU8JBRcU1 q2kdydAPxulvgz/0dRmlqkci5grxhbMaImJXQzbrv7nijR75V1JPMZ+L1ykponq1 jIxNi2G5yiIWYIFFl6SwnTg+j2fuhS5ffziuvZ7b7q8bl+tRRivO8/xdztLdArI9 bwfrz04ZumpPVg== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=h9xGbB+mh8OK2TclaqP1rmv1mUn8V JA6iYtbmCZbvnA=; b=tNwpbFa+kvdzCAYllURhWrpCBZs4sgEWeVB2xGmS8MCCy diwVfTV7MY81m1yYkUTDhXdANQGhglxUlDXpd7D+J21q7bni5EJfV6VyRBQVhEPm 1sr+4UGUdQFMVp6F9ewQ4gKbAMxOYKFmkVVgD/F+g/2mf8fwp+68TChMXjzHCnQQ vJYiSBEeMUTLrD92nnFoRbu81aVZLiHKJ6NG7nw3gwcI0bqOgVTWakwWdBwmm2+4 NoA7gTb+Fkp1iS/S5XnFVX90wocEnW+qOsG6BvK0ieD36d/6yz7IGushU/Y5sDOb NW5duhzvGfFN+VMNdGG3bDrBjZWGgVjjngPgeDD5Q== X-ME-Proxy: X-ME-Sender: Received: from localhost (140.226.16.62.customer.cdi.no [62.16.226.140]) by mail.messagingengine.com (Postfix) with ESMTPA id 86C0710297; Sun, 9 Sep 2018 08:27:41 -0400 (EDT) From: Marius Bakke To: Leo Famulari Subject: Re: [bug#32663] [PATCH 0/2] Ghostscript fixes In-Reply-To: <20180908225301.GA26265@jasmine.lan> References: <20180908110816.23518-1-mbakke@fastmail.com> <20180908225301.GA26265@jasmine.lan> User-Agent: Notmuch/0.27 (https://notmuchmail.org) Emacs/26.1 (x86_64-pc-linux-gnu) Date: Sun, 09 Sep 2018 14:27:39 +0200 Message-ID: <87tvmydfes.fsf@fastmail.com> MIME-Version: 1.0 Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature" X-Spam-Score: -0.7 (/) X-Debbugs-Envelope-To: 32663 Cc: 32663@debbugs.gnu.org X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.7 (-) --=-=-= Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Leo Famulari writes: > On Sat, Sep 08, 2018 at 01:08:16PM +0200, Marius Bakke wrote: >> These patches aim to fix the recent security issues in Ghostscript. >> I have verified that the reproducers in >> no >> longer work with these patches. >>=20 >> Marius Bakke (2): >> gnu: jbig2dec: Replace with 0.15 [security fixes]. >> gnu: ghostscript: Update replacement to 9.24 [security fixes]. > > Thanks! Looks good to me assuming Ghostscript 9.24 is ABI compatible > with 9.23. There are changes[0], but they are internal to the library and so *should* be harmless. Unfortunately I haven't been able to get the =2D-drop-private-types or --harmless options of abidiff working. The same goes for jbig2dec, although it's more complicated since it includes a static library (to be removed on core-updates). It does not look like any of the consumers actually use it, though. Will push this after some more testing, as well as including the patch suggested by Tavis on oss-sec. [0] --=-=-= Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEu7At3yzq9qgNHeZDoqBt8qM6VPoFAluVEbwACgkQoqBt8qM6 VPqVGggAu5GqK6Np1qmPMUlbJkuKgAFNyp1Eb6G/Bd6ZrbOW3TXW8UputynlwEYT 6GmOUlTvOOHiWuv9p2stoHQe68H+1s/ruYo/MKiJNwp7Sr0KC3BlLEJa3/E6z6bY vCbI22PjachpnmvfPUvIiyk9PAo+bBEDCB7f4PvlKimSk/iLbEgt/3N34ReI8ID+ sCBg6tyHwswH+aW7B9hI+dgqnW1Ng2ohJqZ1Vdw5rXLlqewizUVmRBAkzAwkw3/2 jsYb91SS2d8XM4HnC1cek5deftU9dRYDTQakiPzAnSlk/K8jQcuK8eJ6sSB38vg2 sw5Bf80RtCoAeP4yBNyP0p7ODYLlvA== =clLb -----END PGP SIGNATURE----- --=-=-=-- From debbugs-submit-bounces@debbugs.gnu.org Sun Feb 03 18:30:56 2019 Received: (at 32663-done) by debbugs.gnu.org; 3 Feb 2019 23:30:56 +0000 Received: from localhost ([127.0.0.1]:57910 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1gqRDz-0002gz-VI for submit@debbugs.gnu.org; Sun, 03 Feb 2019 18:30:56 -0500 Received: from sender-of-o51.zoho.com ([135.84.80.216]:21057) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1gqRDx-0002eB-AX for 32663-done@debbugs.gnu.org; Sun, 03 Feb 2019 18:30:53 -0500 ARC-Seal: i=1; a=rsa-sha256; t=1549236649; cv=none; d=zoho.com; s=zohoarc; b=GzuaK5jsiYNMUkcrD5c53UOi4+ugn6keL0gZbapQTLKeqk9f80RCvfKjq6mCCnTSEM8v18hweNdHRfN+hvaiR51UUSX94bIfz6JP4IPCwhnfWsocd9uO4DS+YJ5/aLMUlnjZgya+kWgzpwD15QpaCITvB85WLI4JsjOzA2DN3qE= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1549236649; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:To:ARC-Authentication-Results; bh=OTGQrLQFmNAMJnU7XatzXkKDdVJCmh0BMjGS3PPo4Aw=; b=JBxyLIzcMLA5tKVimezd8TNzCockO88UzV/ke8d2YLRSUvWysKq4G7fG2i6/OKjDq+pCsAiIo+Mkd3SUKk+bIVJl9G4wkTXJJLs+rxIfr/k8TZH511w2GIL5RHiT2Uc3RecvnC4qa5bXr6x9EtcU/hbB7Jj0pieN1RmEkIcjdro= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=pass header.i=elephly.net; spf=pass smtp.mailfrom=rekado@elephly.net; dmarc=pass header.from= header.from= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1549236649; s=zoho; d=elephly.net; i=rekado@elephly.net; h=From:To:Cc:Subject:References:Date:In-Reply-To:Message-ID:MIME-Version:Content-Type:Content-Transfer-Encoding; l=92; bh=OTGQrLQFmNAMJnU7XatzXkKDdVJCmh0BMjGS3PPo4Aw=; b=C/qYfIjWux+fbE5lemAU9ND7+p160jX9f+Ll7Wxm//59ApNcVD8JYXED8VEz5+Hc vy1Uycr79twtG3QMm5e74BIjIOJdLHMIpvIvoVCaxYYFRx3QQ3j7zer62yTzfDwD/d3 y58YQ0CqClWOl+MVsMbACyRtqulqlOxz4nj3aSYU= Received: from localhost (252.139-78-194.adsl-static.isp.belgacom.be [194.78.139.252]) by mx.zohomail.com with SMTPS id 1549236645579460.8742612251334; Sun, 3 Feb 2019 15:30:45 -0800 (PST) From: Ricardo Wurmus To: Marius Bakke Subject: Re: [bug#32663] [PATCH 0/2] Ghostscript fixes References: <20180908110816.23518-1-mbakke@fastmail.com> <20180908225301.GA26265@jasmine.lan> <87tvmydfes.fsf@fastmail.com> Date: Mon, 04 Feb 2019 00:30:41 +0100 In-Reply-To: <87tvmydfes.fsf@fastmail.com> (Marius Bakke's message of "Sun, 09 Sep 2018 14:27:39 +0200") Message-ID: <87muncwiu6.fsf@elephly.net> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-ZohoMailClient: External X-Spam-Score: 0.0 (/) X-Debbugs-Envelope-To: 32663-done Cc: 32663-done@debbugs.gnu.org, Leo Famulari X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: debbugs-submit-bounces@debbugs.gnu.org Sender: "Debbugs-submit" X-Spam-Score: -1.0 (-) Closing because this has already made its way into the =E2=80=9Cmaster=E2= =80=9D branch. From unknown Tue Jun 17 22:24:16 2025 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@debbugs.gnu.org From: Debbugs Internal Request Subject: Internal Control Message-Id: bug archived. Date: Mon, 04 Mar 2019 12:24:05 +0000 User-Agent: Fakemail v42.6.9 # This is a fake control message. # # The action: # bug archived. thanks # This fakemail brought to you by your local debbugs # administrator