[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Project ghostscript-10.02.1-15.el10_0

Name ghostscript
Epoch 0
Version 10.02.1
Release 15.el10_0
Website/URL https://ghostscript.com/
License AGPL-3.0-or-later
Build Time 2025-05-19 14:51:13
Build Host builder-x86-05.inferitos.ru
Summary Interpreter for PostScript language & PDF
Repositories AppStream
Description This package provides useful conversion utilities based on Ghostscript software, for converting PS, PDF and other document formats between each other. Ghostscript is a suite of software providing an interpreter for Adobe Systems' PostScript (PS) and Portable Document Format (PDF) page description languages. Its primary purpose includes displaying (rasterization & rendering) and printing of document pages, as well as conversions between different document formats.
Errata INFSA-2025:7499
× Full screenshot
Packages link
Package Summary SHA-256 checksum
x86_64
ghostscript-10.02.1-15.el10_0.x86_64 Interpreter for PostScript language & PDF b66d5ec43fbe87ad10484e465b2afd5d8ad0cab275a1090639253f8a010df22b download
libgs-10.02.1-15.el10_0.x86_64 Library providing Ghostcript's core functionality fa71d42c5393928c4762992e2bfc604372aaa283ae10d5f4e107c527ce57ccd0 download
libgs-devel-10.02.1-15.el10_0.x86_64 Development files for Ghostscript's library ab3d8e563bb7736d71996719220cb88f5e27a2dc2eb3bd712239cc4ae8457321 download
aarch64
ghostscript-10.02.1-15.el10_0.aarch64 Interpreter for PostScript language & PDF b38b266ebe0d92ac4c430b0d82ca8870d6e735a7710117e270fd3c75c3d705a0 download
libgs-10.02.1-15.el10_0.aarch64 Library providing Ghostcript's core functionality f661b93e4ded2932d98405754e4c9e3589e066a6799838c58d4e2306e0b6389d download
libgs-devel-10.02.1-15.el10_0.aarch64 Development files for Ghostscript's library b237fe7b117ce225d67b3a7e07799123ed0d804afdd48fff87db48c29ddf1069 download
noarch
ghostscript-doc-10.02.1-15.el10_0.noarch Documentation files for Ghostscript 3502d703126e79689de7c799fe1d25d27a55bb60c2761b5d6f6c9a203839e8a2 download
ghostscript-tools-fonts-10.02.1-15.el10_0.noarch Ghostscript's font utilities 5a2cfce90679bc6d9adbecf834d795113df913f70d0bb9517a7b97b70e3c12c0 download
ghostscript-tools-printing-10.02.1-15.el10_0.noarch Ghostscript's printing utilities 97991ec50984056ab9d74df3d385e96f552bd9ad75ec72668810e75e35033c1a download
ghostscript-tools-dvipdf-10.02.1-15.el10_0.noarch Ghostscript's 'dvipdf' utility 3c1c31db105e5a295674457b2b69111f507dd65e93aca30a824ee5aa64687d01 download
src
ghostscript-10.02.1-15.el10_0.src Interpreter for PostScript language & PDF 15cd2f01ac11114015eddb446fbbc8c44bfdac784366242e6cc1a05993309b82 download
Changelog link
* Wed May 14 2025 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 10.02.1-15
- Rebuilt for MSVSphere 10

* Tue Apr 15 2025 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-15
- RHEL-67044 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space
- RHEL-67050 CVE-2024-46952 ghostscript: Buffer Overflow in Ghostscript PDF XRef Stream Handling
- RHEL-67050 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
- RHEL-67050 CVE-2024-46953 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript
- RHEL-67050 CVE-2024-46956 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution

* Tue Oct 29 2024 Troy Dawson <tdawson@redhat.com> - 10.02.1-14
- Bump release for October 2024 mass rebuild:
  Resolves: RHEL-64018

* Wed Jul 17 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-13
- RHEL-46575 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction

* Tue Jul 16 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-12
- RHEL-46149 CVE-2024-29509 ghostscript: heap buffer overflow via the PDFPassword parameter
- RHEL-46131 CVE-2024-29508 ghostscript: heap pointer leak in pdf_base_font_alloc()
- RHEL-46112 CVE-2024-29507 ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters
- RHEL-46076 CVE-2024-29506 ghostscript: stack-based buffer overflow in the pdfi_apply_filter()
- RHEL-44727 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)

* Thu Jul 11 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-12
- RHEL-44771 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths

* Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com> - 10.02.1-11
- Bump release for June 2024 mass rebuild

* Fri Jun 21 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-10
- RHEL-38835 run the package with correct tests

* Thu Jun 20 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-9
- RHEL-38835 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library

* Wed Jan 24 2024 Fedora Release Engineering <releng@fedoraproject.org> - 10.02.1-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild