This website requires JavaScript.
Explore
Help
Sign In
rpms
/
ghostscript
Watch
6
Star
0
Fork
0
You've already forked ghostscript
Code
Issues
Pull Requests
Releases
Activity
A PostScript interpreter and renderer
30
Commits
8
Branches
46
Tags
1.7
MiB
Diff
100%
335a631ca9
Go to file
HTTPS
Download ZIP
Download TAR.GZ
Download BUNDLE
Open with VS Code
Open with VSCodium
Open with Intellij IDEA
Cite this repository
APA
BibTeX
Cancel
Zdenek Dohnal
335a631ca9
RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
...
Resolves: RHEL-67053
2025-04-16 12:35:33 +02:00
.gitignore
Update to 9.54.0
2021-07-26 22:17:33 +02:00
0001-Bug-705911-Fix-Ghostscript-s-encoding-decoding-of-UT.patch
RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
2025-04-16 12:35:33 +02:00
0001-Bug-707788-Fix-decode_utf8-to-forbid-overlong-encodi.patch
RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
2025-04-16 12:35:33 +02:00
0001-PS-interpreter-check-the-type-of-the-Pattern-Impleme.patch
RHEL-67048 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space
2025-04-16 12:34:00 +02:00
0001-Uniprint-device-prevent-string-configuration-changes.patch
RHEL-44731 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)
2024-07-09 19:13:25 +02:00
gating.yaml
gating.yaml: Use rhel-9
2021-05-11 13:32:38 +02:00
ghostscript-9.54.0-covscan-fixes.patch
Fix patch for covscan issues
2022-02-24 13:25:44 +01:00
ghostscript-9.54.0-CVE-2023-28879.patch
fix for CVE-2023-28879
2023-05-11 11:19:23 +02:00
ghostscript-9.54.0-CVE-2023-36664.patch
fix for CVE-2023-36664
2023-08-01 13:52:16 +02:00
ghostscript-9.54.0-CVE-2023-38559.patch
fix for CVE-2023-38559
2023-08-04 14:33:36 +02:00
ghostscript-9.54.0-CVE-2023-43115.patch
fix for CVE-2023-43115
2023-10-27 13:38:37 +02:00
ghostscript-9.54.0-Deal-with-different-VM-modes-during-CIDFont-loading.patch
Fix loading of CIDFonts
2022-12-09 14:37:39 +01:00
ghostscript-9.54.0-ESC-Page-driver-does-not-set-page-size-correctly.patch
set the page size for A4 correctly in ESC/Page driver
2023-02-02 18:18:43 +01:00
ghostscript-9.54.0-Fix-op-stack-management-in-sampled_data_c.patch
Added fix for vulnerability CVE-2021-45949
2022-02-23 10:12:30 +01:00
ghostscript-9.54.0-gdevtxtw-null-also-pointers.patch
Added fix for segfault bug
2021-09-16 11:45:14 +02:00
ghostscript-9.54.0-include-pipe-handle-in-validation.patch
Added fix for CVE-2021-3781
2021-09-16 11:55:00 +02:00
ghostscript-9.54.0-pdfwrite-Substituted-TTF-CIDFont-CID-hand.patch
fix embedding of CIDFonts
2023-03-17 16:03:15 +01:00
ghostscript.spec
RHEL-67053 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
2025-04-16 12:35:33 +02:00
gs-cve-2023-46751.patch
RHEL-18397 CVE-2023-46751 ghostscript: dangling pointer in gdev_prn_open_printer_seekable()
2025-04-16 12:31:40 +02:00
gs-cve-2024-33871.patch
RHEL-38839 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library
2024-06-20 09:39:37 +02:00
gs-CVE-2024-33869.patch
RHEL-44745 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction
2024-07-09 18:42:05 +02:00
gs-CVE-2024-33870.patch
RHEL-44759 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
2024-07-09 14:25:02 +02:00
sources
Update to 9.54.0
2021-07-26 22:17:33 +02:00