Name: | ghostscript-tools-printing |
---|---|
Version: | 10.02.1 |
Release: | 16.el10_0 |
Architecture: | noarch |
Group: | Unspecified |
Size: | 3553 |
License: | AGPL-3.0-or-later |
RPM: | ghostscript-tools-printing-10.02.1-16.el10_0.noarch.rpm |
Source RPM: | ghostscript-10.02.1-16.el10_0.src.rpm |
Build Date: | Thu Jun 26 2025 |
Build Host: | build-ol10-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | https://ghostscript.com/ |
Summary: | Ghostscript's printing utilities |
Description: | This package provides utilities for formatting and printing text files using either Ghostscript, or BubbleJet, DeskJet, DeskJet 500, and LaserJet printers. It also provides the utility 'pphs', which is useful for printing of Primary Hint Stream of a linearized PDF file. |
- RHEL-88964 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow
- RHEL-67044 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space - RHEL-67050 CVE-2024-46952 ghostscript: Buffer Overflow in Ghostscript PDF XRef Stream Handling - RHEL-67050 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding - RHEL-67050 CVE-2024-46953 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript - RHEL-67050 CVE-2024-46956 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution
- Bump release for October 2024 mass rebuild: Resolves: RHEL-64018
- RHEL-46575 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction
- RHEL-46149 CVE-2024-29509 ghostscript: heap buffer overflow via the PDFPassword parameter - RHEL-46131 CVE-2024-29508 ghostscript: heap pointer leak in pdf_base_font_alloc() - RHEL-46112 CVE-2024-29507 ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters - RHEL-46076 CVE-2024-29506 ghostscript: stack-based buffer overflow in the pdfi_apply_filter() - RHEL-44727 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)
- RHEL-44771 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
- Bump release for June 2024 mass rebuild
- RHEL-38835 run the package with correct tests
- RHEL-38835 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild