[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Project ghostscript-10.02.1-14.el10

Name ghostscript
Epoch 0
Version 10.02.1
Release 14.el10
Website/URL https://ghostscript.com/
License AGPL-3.0-or-later
Build Time 2025-04-02 16:02:05
Build Host builder-x86-08.inferitos.ru
Summary Interpreter for PostScript language & PDF
Repositories AppStream
Description This package provides useful conversion utilities based on Ghostscript software, for converting PS, PDF and other document formats between each other. Ghostscript is a suite of software providing an interpreter for Adobe Systems' PostScript (PS) and Portable Document Format (PDF) page description languages. Its primary purpose includes displaying (rasterization & rendering) and printing of document pages, as well as conversions between different document formats.
Errata
× Full screenshot
Packages link
Package Summary SHA-256 checksum
x86_64
ghostscript-10.02.1-14.el10.x86_64 Interpreter for PostScript language & PDF 572c2ff285a81ad68a9e2a2f326fbe103ee5d246834c6638a3b95834106e4f89 download
libgs-10.02.1-14.el10.x86_64 Library providing Ghostcript's core functionality 0ad6663aebf19eda87d28a0240707096501f7720fb5c96b277f649b601f628e6 download
libgs-devel-10.02.1-14.el10.x86_64 Development files for Ghostscript's library 117e87d5304f2a24edcc079ccca5e76a3cfa5bd4d8e05333d2194e83180e5c49 download
aarch64
ghostscript-10.02.1-14.el10.aarch64 Interpreter for PostScript language & PDF 46c33180918eea150286924a86bcde28c3855667defbf9d9ac9e7edd07adeb01 download
libgs-10.02.1-14.el10.aarch64 Library providing Ghostcript's core functionality 2ba9f55c1431f47731b983d3cacbc50f4e3812dd9d4134d73397ba851bf80951 download
libgs-devel-10.02.1-14.el10.aarch64 Development files for Ghostscript's library dec06d0ba9501386b232033427c71860e8b650673e277c5e9c296db1a9c1a0f9 download
noarch
ghostscript-doc-10.02.1-14.el10.noarch Documentation files for Ghostscript 53f98d212bde5d07f3800ab241c66a3dfd09e61a5d45f7ecaa1f1dae0c233bd7 download
ghostscript-tools-fonts-10.02.1-14.el10.noarch Ghostscript's font utilities e2dc71bdf641790032b2d506c86b9a751e772cef259dd8c44d2030e505713170 download
ghostscript-tools-printing-10.02.1-14.el10.noarch Ghostscript's printing utilities bfb921d3ec2410df739c5290334356855d360d3553ac2df87cbd82dce0cefa09 download
ghostscript-tools-dvipdf-10.02.1-14.el10.noarch Ghostscript's 'dvipdf' utility 365764278e858531e5c6a9a270cc41bd7456fe77a7b0c9442ce881398d8dc5bd download
src
ghostscript-10.02.1-14.el10.src Interpreter for PostScript language & PDF bada6103f5b3444d420fc2fadc75a79d629adc5941d99236b8cff2d09592ed61 download
Changelog link
* Tue Nov 26 2024 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 10.02.1-14
- Rebuilt for MSVSphere 10

* Tue Oct 29 2024 Troy Dawson <tdawson@redhat.com> - 10.02.1-14
- Bump release for October 2024 mass rebuild:
  Resolves: RHEL-64018

* Wed Jul 17 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-13
- RHEL-46575 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction

* Tue Jul 16 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-12
- RHEL-46149 CVE-2024-29509 ghostscript: heap buffer overflow via the PDFPassword parameter
- RHEL-46131 CVE-2024-29508 ghostscript: heap pointer leak in pdf_base_font_alloc()
- RHEL-46112 CVE-2024-29507 ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters
- RHEL-46076 CVE-2024-29506 ghostscript: stack-based buffer overflow in the pdfi_apply_filter()
- RHEL-44727 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)

* Thu Jul 11 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-12
- RHEL-44771 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths

* Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com> - 10.02.1-11
- Bump release for June 2024 mass rebuild

* Fri Jun 21 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-10
- RHEL-38835 run the package with correct tests

* Thu Jun 20 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-9
- RHEL-38835 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library

* Wed Jan 24 2024 Fedora Release Engineering <releng@fedoraproject.org> - 10.02.1-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild

* Mon Jan 22 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-7
- fix rpmlint errors