[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Project ghostscript-10.02.1-16.el10_0

Name ghostscript
Epoch 0
Version 10.02.1
Release 16.el10_0
Website/URL https://ghostscript.com/
License AGPL-3.0-or-later
Build Time 2025-05-19 14:50:47
Build Host builder-x86-06.inferitos.ru
Summary Interpreter for PostScript language & PDF
Repositories AppStream
Description This package provides useful conversion utilities based on Ghostscript software, for converting PS, PDF and other document formats between each other. Ghostscript is a suite of software providing an interpreter for Adobe Systems' PostScript (PS) and Portable Document Format (PDF) page description languages. Its primary purpose includes displaying (rasterization & rendering) and printing of document pages, as well as conversions between different document formats.
Errata INFSA-2025:7593
× Full screenshot
Found 2 old versions
Packages link
Package Summary SHA-256 checksum
x86_64
ghostscript-10.02.1-16.el10_0.x86_64 Interpreter for PostScript language & PDF b4fab056685a6779a5472c333e96829a3780db53047782cdd2c0452a6865fe96 download
libgs-10.02.1-16.el10_0.x86_64 Library providing Ghostcript's core functionality e8cf007b9717d112f2436808b1fbec697002ee282b9d82da7a26e7816c33c953 download
libgs-devel-10.02.1-16.el10_0.x86_64 Development files for Ghostscript's library 4657615a12e41de204cde0dd64b752b775b49638debfb9fa6c27ab8977a90261 download
aarch64
ghostscript-10.02.1-16.el10_0.aarch64 Interpreter for PostScript language & PDF e13e2c3146863dec7ad4d6690352447e1802a6faac58cd2583664acb1254f0f6 download
libgs-10.02.1-16.el10_0.aarch64 Library providing Ghostcript's core functionality 2df241a2ba0bec6e4daf17e2f47cc1ab6be89a93a199baba2ad8c1837160b051 download
libgs-devel-10.02.1-16.el10_0.aarch64 Development files for Ghostscript's library d035de7a51cec477ebb51eb6ea7069c95593395f224709cd38bd73ec50d0367b download
noarch
ghostscript-doc-10.02.1-16.el10_0.noarch Documentation files for Ghostscript b6f1306ae51608afa7b138fec396f92039c0681a3bba4dadd26b76ecd25afe6e download
ghostscript-tools-fonts-10.02.1-16.el10_0.noarch Ghostscript's font utilities 0d3f8f3ce680c9255e15d112b1b0ba50af71cd8ec8ccdceb540fcee58886e95b download
ghostscript-tools-printing-10.02.1-16.el10_0.noarch Ghostscript's printing utilities f086a5b037124980528baba91393833db1cd7e0e83b807e226baf315648c3680 download
ghostscript-tools-dvipdf-10.02.1-16.el10_0.noarch Ghostscript's 'dvipdf' utility 837c87034cc3ef3929357268c998264ad6ebc23bce45452131e7c77487a9db89 download
src
ghostscript-10.02.1-16.el10_0.src Interpreter for PostScript language & PDF 94cc036363c8a43639b1cbce46f4094975f4dc0d6fae9a3144a3956d9bbf2a17 download
Changelog link
* Wed May 14 2025 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 10.02.1-16
- Rebuilt for MSVSphere 10

* Wed May 07 2025 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-16
- RHEL-88964 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow

* Tue Apr 15 2025 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-15
- RHEL-67044 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space
- RHEL-67050 CVE-2024-46952 ghostscript: Buffer Overflow in Ghostscript PDF XRef Stream Handling
- RHEL-67050 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
- RHEL-67050 CVE-2024-46953 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript
- RHEL-67050 CVE-2024-46956 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution

* Tue Oct 29 2024 Troy Dawson <tdawson@redhat.com> - 10.02.1-14
- Bump release for October 2024 mass rebuild:
  Resolves: RHEL-64018

* Wed Jul 17 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-13
- RHEL-46575 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction

* Tue Jul 16 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-12
- RHEL-46149 CVE-2024-29509 ghostscript: heap buffer overflow via the PDFPassword parameter
- RHEL-46131 CVE-2024-29508 ghostscript: heap pointer leak in pdf_base_font_alloc()
- RHEL-46112 CVE-2024-29507 ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters
- RHEL-46076 CVE-2024-29506 ghostscript: stack-based buffer overflow in the pdfi_apply_filter()
- RHEL-44727 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)

* Thu Jul 11 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-12
- RHEL-44771 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths

* Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com> - 10.02.1-11
- Bump release for June 2024 mass rebuild

* Fri Jun 21 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-10
- RHEL-38835 run the package with correct tests

* Thu Jun 20 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-9
- RHEL-38835 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library