Name: | ghostscript |
---|---|
Version: | 9.07 |
Release: | 31.el7 |
Architecture: | aarch64 |
Group: | Applications/Publishing |
Size: | 17284061 |
License: | AGPLv3+ and Redistributable, no modification permitted |
RPM: | ghostscript-9.07-31.el7.aarch64.rpm |
Source RPM: | ghostscript-9.07-31.el7.src.rpm |
Build Date: | Wed Oct 31 2018 |
Build Host: | ca-buildarm04.us.oracle.com |
Vendor: | Oracle America |
URL: | http://www.ghostscript.com/ |
Summary: | A PostScript interpreter and renderer |
Description: | Ghostscript is a set of software that provides a PostScript interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. Ghostscript translates PostScript code into many common, bitmapped formats, like those understood by your printer or screen. Ghostscript is normally used to display PostScript files and to print PostScript files to non-PostScript printers. If you need to display PostScript files or print them to non-PostScript printers, you should install ghostscript. If you install ghostscript, you also need to install the ghostscript-fonts package. |
- Added security fixes for: - CVE-2018-16509 (bug #1621158) - CVE-2018-15910 (bug #1621160) - CVE-2018-16542 (bug #1621382)
- Fix MediaPosition, ManualFeed and MediaType with pxl devices (bug #1551782)
- Fix rare Segmentation fault when converting PDF to PNG (bug #1473337) - Raise the default VMThreshold from 1Mb to 8Mb (bug #1479852)
- Security fix for CVE-2017-8291 updated to address SIGSEGV
- Added security fix for CVE-2017-8291 (bug #1446063)
- Updated requirements for lcms2 to avoid possible issues in the future
- Added security fix for CVE-2017-7207 (bug #1434353) - Added explicit requirement for lcms2 version we are build with (bug #1436273)
- Fix infinite 'for' loop in gdevp14.c file (bug #1424752)
- Fix for regression caused by previous CVE fixes (bug #1411725)
- Fix of SIGSEGV in cid_font_data_param when using ps2pdf (bug #1390847)