Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

ghostscript-9.54.0-19.el9_6 RPM for x86_64

From AlmaLinux 9.6 AppStream for x86_64

Name: ghostscript Distribution: AlmaLinux
Version: 9.54.0 Vendor: AlmaLinux
Release: 19.el9_6 Build date: Wed May 14 18:00:44 2025
Group: Unspecified Build host: x64-builder02.almalinux.org
Size: 39819 Source RPM: ghostscript-9.54.0-19.el9_6.src.rpm
Packager: AlmaLinux Packaging Team <packager@almalinux.org>
Url: https://ghostscript.com/
Summary: Interpreter for PostScript language & PDF
This package provides useful conversion utilities based on Ghostscript software,
for converting PS, PDF and other document formats between each other.

Ghostscript is a suite of software providing an interpreter for Adobe Systems'
PostScript (PS) and Portable Document Format (PDF) page description languages.
Its primary purpose includes displaying (rasterization & rendering) and printing
of document pages, as well as conversions between different document formats.

Provides

Requires

License

AGPLv3+

Changelog

* Wed May 07 2025 Zdenek Dohnal <zdohnal@redhat.com> - 9.54.0-19
  - RHEL-88966 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow
* Tue Apr 15 2025 Zdenek Dohnal <zdohnal@redhat.com> - 9.54.0-18
  - RHEL-18397 CVE-2023-46751 ghostscript: dangling pointer in gdev_prn_open_printer_seekable()
  - RHEL-67048 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space
  - RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
  - RHEL-67053 CVE-2024-46953 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript
  - RHEL-67053 CVE-2024-46956 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution
* Mon Jul 08 2024 Zdenek Dohnal <zdohnal@redhat.com> - 9.54.0-17
  - RHEL-44759 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
  - RHEL-44745 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction
  - RHEL-44731 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)
* Thu Jun 20 2024 Zdenek Dohnal <zdohnal@redhat.com> - 9.54.0-16
  - RHEL-38839 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library
* Fri Oct 27 2023 Richard Lescak <rlescak@redhat.com> - 9.54.0-14
  - fix for CVE-2023-43115
  - Resolves: RHEL-10185
* Fri Aug 04 2023 Richard Lescak <rlescak@redhat.com> - 9.54.0-13
  - fix for CVE-2023-38559
  - Resolves: rhbz#2224372
* Tue Aug 01 2023 Richard Lescak <rlescak@redhat.com> - 9.54.0-12
  - fix for CVE-2023-36664
  - Resolves: rhbz#2217810

Files

/usr/bin/eps2eps
/usr/bin/ghostscript
/usr/bin/gs
/usr/bin/gsnd
/usr/bin/pdf2dsc
/usr/bin/pdf2ps
/usr/bin/ps2ascii
/usr/bin/ps2epsi
/usr/bin/ps2pdf
/usr/bin/ps2pdf12
/usr/bin/ps2pdf13
/usr/bin/ps2pdf14
/usr/bin/ps2pdfwr
/usr/bin/ps2ps
/usr/bin/ps2ps2
/usr/lib/.build-id
/usr/lib/.build-id/25
/usr/lib/.build-id/25/7a1e68bb32679b61409f71b1d5c163cf2979be
/usr/share/man/de/man1/eps2eps.1.gz
/usr/share/man/de/man1/gsnd.1.gz
/usr/share/man/de/man1/pdf2dsc.1.gz
/usr/share/man/de/man1/pdf2ps.1.gz
/usr/share/man/de/man1/ps2ascii.1.gz
/usr/share/man/de/man1/ps2pdf.1.gz
/usr/share/man/de/man1/ps2pdf12.1.gz
/usr/share/man/de/man1/ps2pdf13.1.gz
/usr/share/man/de/man1/ps2pdf14.1.gz
/usr/share/man/de/man1/ps2ps.1.gz
/usr/share/man/man1/eps2eps.1.gz
/usr/share/man/man1/ghostscript.1.gz
/usr/share/man/man1/gs.1.gz
/usr/share/man/man1/gsnd.1.gz
/usr/share/man/man1/pdf2dsc.1.gz
/usr/share/man/man1/pdf2ps.1.gz
/usr/share/man/man1/ps2ascii.1.gz
/usr/share/man/man1/ps2epsi.1.gz
/usr/share/man/man1/ps2pdf.1.gz
/usr/share/man/man1/ps2pdf12.1.gz
/usr/share/man/man1/ps2pdf13.1.gz
/usr/share/man/man1/ps2pdf14.1.gz
/usr/share/man/man1/ps2pdfwr.1.gz
/usr/share/man/man1/ps2ps.1.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Sun May 18 03:02:58 2025