| Name: | libgs |
|---|---|
| Version: | 10.02.1 |
| Release: | 14.el10 |
| Architecture: | aarch64 |
| Group: | Unspecified |
| Size: | 24001230 |
| License: | AGPL-3.0-or-later |
| RPM: | libgs-10.02.1-14.el10.aarch64.rpm |
| Source RPM: | ghostscript-10.02.1-14.el10.src.rpm |
| Build Date: | Sat Jan 25 2025 |
| Build Host: | build-ol10-aarch64.oracle.com |
| Vendor: | Oracle America |
| URL: | https://ghostscript.com/ |
| Summary: | Library providing Ghostcript's core functionality |
| Description: | This library provides Ghostscript's core functionality, based on Ghostscript's API, which is useful for many packages that are build on top of Ghostscript. It also provides an X11-based driver for Ghostscript, which enables displaying of various document files (including PS and PDF). |
- Bump release for October 2024 mass rebuild: Resolves: RHEL-64018
- RHEL-46575 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction
- RHEL-46149 CVE-2024-29509 ghostscript: heap buffer overflow via the PDFPassword parameter - RHEL-46131 CVE-2024-29508 ghostscript: heap pointer leak in pdf_base_font_alloc() - RHEL-46112 CVE-2024-29507 ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters - RHEL-46076 CVE-2024-29506 ghostscript: stack-based buffer overflow in the pdfi_apply_filter() - RHEL-44727 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)
- RHEL-44771 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
- Bump release for June 2024 mass rebuild
- RHEL-38835 run the package with correct tests
- RHEL-38835 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
- fix rpmlint errors
- fix another FTBFS with GCC 14