Name: | libgs |
---|---|
Version: | 10.02.1 |
Release: | 14.el10 |
Architecture: | aarch64 |
Group: | Unspecified |
Size: | 24001230 |
License: | AGPL-3.0-or-later |
RPM: | libgs-10.02.1-14.el10.aarch64.rpm |
Source RPM: | ghostscript-10.02.1-14.el10.src.rpm |
Build Date: | Sat Jan 25 2025 |
Build Host: | build-ol10-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | https://ghostscript.com/ |
Summary: | Library providing Ghostcript's core functionality |
Description: | This library provides Ghostscript's core functionality, based on Ghostscript's API, which is useful for many packages that are build on top of Ghostscript. It also provides an X11-based driver for Ghostscript, which enables displaying of various document files (including PS and PDF). |
- Bump release for October 2024 mass rebuild: Resolves: RHEL-64018
- RHEL-46575 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction
- RHEL-46149 CVE-2024-29509 ghostscript: heap buffer overflow via the PDFPassword parameter - RHEL-46131 CVE-2024-29508 ghostscript: heap pointer leak in pdf_base_font_alloc() - RHEL-46112 CVE-2024-29507 ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters - RHEL-46076 CVE-2024-29506 ghostscript: stack-based buffer overflow in the pdfi_apply_filter() - RHEL-44727 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)
- RHEL-44771 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
- Bump release for June 2024 mass rebuild
- RHEL-38835 run the package with correct tests
- RHEL-38835 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
- fix rpmlint errors
- fix another FTBFS with GCC 14