|
.gitignore
|
Update to 9.54.0
|
2021-07-26 22:17:33 +02:00 |
|
0001-Bug-705911-Fix-Ghostscript-s-encoding-decoding-of-UT.patch
|
RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
|
2025-04-16 12:35:33 +02:00 |
|
0001-Bug-707788-Fix-decode_utf8-to-forbid-overlong-encodi.patch
|
RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
|
2025-04-16 12:35:33 +02:00 |
|
0001-Bug-707793-Check-for-overflow-validating-format-stri.patch
|
RHEL-67053 CVE-2024-46953 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript
|
2025-04-16 12:36:35 +02:00 |
|
0001-Bug-708133-Avoid-integer-overflow-leading-to-buffer-.patch
|
RHEL-88966 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow
|
2025-05-07 13:39:32 +02:00 |
|
0001-PostScript-interpreter-fix-buffer-length-check.patch
|
RHEL-67053 CVE-2024-46956 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution
|
2025-04-16 12:37:03 +02:00 |
|
0001-PS-interpreter-check-the-type-of-the-Pattern-Impleme.patch
|
RHEL-67048 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space
|
2025-04-16 12:34:00 +02:00 |
|
0001-Uniprint-device-prevent-string-configuration-changes.patch
|
RHEL-44731 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)
|
2024-07-09 19:13:25 +02:00 |
|
gating.yaml
|
gating.yaml: Use rhel-9
|
2021-05-11 13:32:38 +02:00 |
|
ghostscript-9.54.0-covscan-fixes.patch
|
Fix patch for covscan issues
|
2022-02-24 13:25:44 +01:00 |
|
ghostscript-9.54.0-CVE-2023-28879.patch
|
fix for CVE-2023-28879
|
2023-05-11 11:19:23 +02:00 |
|
ghostscript-9.54.0-CVE-2023-36664.patch
|
fix for CVE-2023-36664
|
2023-08-01 13:52:16 +02:00 |
|
ghostscript-9.54.0-CVE-2023-38559.patch
|
fix for CVE-2023-38559
|
2023-08-04 14:33:36 +02:00 |
|
ghostscript-9.54.0-CVE-2023-43115.patch
|
fix for CVE-2023-43115
|
2023-10-27 13:38:37 +02:00 |
|
ghostscript-9.54.0-Deal-with-different-VM-modes-during-CIDFont-loading.patch
|
Fix loading of CIDFonts
|
2022-12-09 14:37:39 +01:00 |
|
ghostscript-9.54.0-ESC-Page-driver-does-not-set-page-size-correctly.patch
|
set the page size for A4 correctly in ESC/Page driver
|
2023-02-02 18:18:43 +01:00 |
|
ghostscript-9.54.0-Fix-op-stack-management-in-sampled_data_c.patch
|
Added fix for vulnerability CVE-2021-45949
|
2022-02-23 10:12:30 +01:00 |
|
ghostscript-9.54.0-gdevtxtw-null-also-pointers.patch
|
Added fix for segfault bug
|
2021-09-16 11:45:14 +02:00 |
|
ghostscript-9.54.0-include-pipe-handle-in-validation.patch
|
Added fix for CVE-2021-3781
|
2021-09-16 11:55:00 +02:00 |
|
ghostscript-9.54.0-pdfwrite-Substituted-TTF-CIDFont-CID-hand.patch
|
fix embedding of CIDFonts
|
2023-03-17 16:03:15 +01:00 |
|
ghostscript.spec
|
RHEL-88966 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow
|
2025-05-07 13:39:32 +02:00 |
|
gs-cve-2023-46751.patch
|
RHEL-18397 CVE-2023-46751 ghostscript: dangling pointer in gdev_prn_open_printer_seekable()
|
2025-04-16 12:31:40 +02:00 |
|
gs-cve-2024-33871.patch
|
RHEL-38839 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library
|
2024-06-20 09:39:37 +02:00 |
|
gs-CVE-2024-33869.patch
|
RHEL-44745 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction
|
2024-07-09 18:42:05 +02:00 |
|
gs-CVE-2024-33870.patch
|
RHEL-44759 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
|
2024-07-09 14:25:02 +02:00 |
|
sources
|
Update to 9.54.0
|
2021-07-26 22:17:33 +02:00 |