[ Все 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Пакет libgs-9.54.0-19.el9_6.i686 download

Имя libgs
Эпоха 0
Версия 9.54.0
Релиз 19.el9_6
Архитектура i686
Сайт https://ghostscript.com/
Лицензия AGPLv3+
Время сборки 2025-05-15 21:00:07
Хост сборки builder-x86-03.inferitos.ru
Краткое описание Library providing Ghostcript's core functionality
Репозитории AppStream
Полное описание This library provides Ghostscript's core functionality, based on Ghostscript's API, which is useful for many packages that are build on top of Ghostscript.
Эррата INFSA-2025:7586
Размер 3401 КиБ
Исходный проект ghostscript-9.54.0-19.el9_6
Контрольная сумма SHA-256 39328d881b90459f966e8f33a5744eecd2d04854d93d5ec5ea719a2581c2c159
× Full screenshot
История изменений link
* Wed May 07 2025 Zdenek Dohnal <zdohnal@redhat.com> - 9.54.0-19
- RHEL-88966 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow

* Tue Apr 15 2025 Zdenek Dohnal <zdohnal@redhat.com> - 9.54.0-18
- RHEL-18397 CVE-2023-46751 ghostscript: dangling pointer in gdev_prn_open_printer_seekable()
- RHEL-67048 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space
- RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
- RHEL-67053 CVE-2024-46953 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript
- RHEL-67053 CVE-2024-46956 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution

* Mon Jul 08 2024 Zdenek Dohnal <zdohnal@redhat.com> - 9.54.0-17
- RHEL-44759 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
- RHEL-44745 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction
- RHEL-44731 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)

* Thu Jun 20 2024 Zdenek Dohnal <zdohnal@redhat.com> - 9.54.0-16
- RHEL-38839 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library

* Fri Oct 27 2023 Richard Lescak <rlescak@redhat.com> - 9.54.0-14
- fix for CVE-2023-43115
- Resolves: RHEL-10185

* Fri Aug 04 2023 Richard Lescak <rlescak@redhat.com> - 9.54.0-13
- fix for CVE-2023-38559
- Resolves: rhbz#2224372

* Tue Aug 01 2023 Richard Lescak <rlescak@redhat.com> - 9.54.0-12
- fix for CVE-2023-36664
- Resolves: rhbz#2217810