Name: | ghostscript-tools-printing |
---|---|
Version: | 9.54.0 |
Release: | 19.el9_6 |
Architecture: | aarch64 |
Group: | Unspecified |
Size: | 3553 |
License: | AGPLv3+ |
RPM: | ghostscript-tools-printing-9.54.0-19.el9_6.aarch64.rpm |
Source RPM: | ghostscript-9.54.0-19.el9_6.src.rpm |
Build Date: | Fri May 16 2025 |
Build Host: | build-ol9-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | https://ghostscript.com/ |
Summary: | Ghostscript's printing utilities |
Description: | This package provides utilities for formatting and printing text files using either Ghostscript, or BubbleJet, DeskJet, DeskJet 500, and LaserJet printers. It also provides the utility 'pphs', which is useful for printing of Primary Hint Stream of a linearized PDF file. |
- RHEL-88966 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow
- RHEL-18397 CVE-2023-46751 ghostscript: dangling pointer in gdev_prn_open_printer_seekable() - RHEL-67048 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space - RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding - RHEL-67053 CVE-2024-46953 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript - RHEL-67053 CVE-2024-46956 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution
- RHEL-44759 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths - RHEL-44745 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction - RHEL-44731 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)
- RHEL-38839 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library
- fix for CVE-2023-43115 - Resolves: RHEL-10185
- fix for CVE-2023-38559 - Resolves: rhbz#2224372
- fix for CVE-2023-36664 - Resolves: rhbz#2217810