A PostScript interpreter and renderer
Go to file
2025-05-07 13:39:32 +02:00
.gitignore Update to 9.54.0 2021-07-26 22:17:33 +02:00
0001-Bug-705911-Fix-Ghostscript-s-encoding-decoding-of-UT.patch RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding 2025-04-16 12:35:33 +02:00
0001-Bug-707788-Fix-decode_utf8-to-forbid-overlong-encodi.patch RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding 2025-04-16 12:35:33 +02:00
0001-Bug-707793-Check-for-overflow-validating-format-stri.patch RHEL-67053 CVE-2024-46953 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript 2025-04-16 12:36:35 +02:00
0001-Bug-708133-Avoid-integer-overflow-leading-to-buffer-.patch RHEL-88966 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow 2025-05-07 13:39:32 +02:00
0001-PostScript-interpreter-fix-buffer-length-check.patch RHEL-67053 CVE-2024-46956 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution 2025-04-16 12:37:03 +02:00
0001-PS-interpreter-check-the-type-of-the-Pattern-Impleme.patch RHEL-67048 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space 2025-04-16 12:34:00 +02:00
0001-Uniprint-device-prevent-string-configuration-changes.patch RHEL-44731 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass) 2024-07-09 19:13:25 +02:00
gating.yaml gating.yaml: Use rhel-9 2021-05-11 13:32:38 +02:00
ghostscript-9.54.0-covscan-fixes.patch Fix patch for covscan issues 2022-02-24 13:25:44 +01:00
ghostscript-9.54.0-CVE-2023-28879.patch fix for CVE-2023-28879 2023-05-11 11:19:23 +02:00
ghostscript-9.54.0-CVE-2023-36664.patch fix for CVE-2023-36664 2023-08-01 13:52:16 +02:00
ghostscript-9.54.0-CVE-2023-38559.patch fix for CVE-2023-38559 2023-08-04 14:33:36 +02:00
ghostscript-9.54.0-CVE-2023-43115.patch fix for CVE-2023-43115 2023-10-27 13:38:37 +02:00
ghostscript-9.54.0-Deal-with-different-VM-modes-during-CIDFont-loading.patch Fix loading of CIDFonts 2022-12-09 14:37:39 +01:00
ghostscript-9.54.0-ESC-Page-driver-does-not-set-page-size-correctly.patch set the page size for A4 correctly in ESC/Page driver 2023-02-02 18:18:43 +01:00
ghostscript-9.54.0-Fix-op-stack-management-in-sampled_data_c.patch Added fix for vulnerability CVE-2021-45949 2022-02-23 10:12:30 +01:00
ghostscript-9.54.0-gdevtxtw-null-also-pointers.patch Added fix for segfault bug 2021-09-16 11:45:14 +02:00
ghostscript-9.54.0-include-pipe-handle-in-validation.patch Added fix for CVE-2021-3781 2021-09-16 11:55:00 +02:00
ghostscript-9.54.0-pdfwrite-Substituted-TTF-CIDFont-CID-hand.patch fix embedding of CIDFonts 2023-03-17 16:03:15 +01:00
ghostscript.spec RHEL-88966 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow 2025-05-07 13:39:32 +02:00
gs-cve-2023-46751.patch RHEL-18397 CVE-2023-46751 ghostscript: dangling pointer in gdev_prn_open_printer_seekable() 2025-04-16 12:31:40 +02:00
gs-cve-2024-33871.patch RHEL-38839 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library 2024-06-20 09:39:37 +02:00
gs-CVE-2024-33869.patch RHEL-44745 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction 2024-07-09 18:42:05 +02:00
gs-CVE-2024-33870.patch RHEL-44759 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths 2024-07-09 14:25:02 +02:00
sources Update to 9.54.0 2021-07-26 22:17:33 +02:00