.fmf
|
adding gating.yaml for ci
|
2022-01-11 10:52:46 +01:00 |
.gitignore
|
rebase to version 10.02.1 (#2238724)
|
2023-11-06 16:36:44 +01:00 |
0001-Bug-707130-Cast-to-void-to-avoid-compiler-warning.patch
|
fix FTBFS with GCC 14
|
2024-01-09 16:47:51 +01:00 |
0001-Bug-707510-3-Bounds-checks-when-using-CIDFont-relate.patch
|
RHEL-46112 CVE-2024-29507 ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters
|
2024-07-16 18:19:08 +02:00 |
0001-Bug-707510-don-t-allow-PDF-files-with-bad-Filters-to.patch
|
RHEL-46076 CVE-2024-29506 ghostscript: stack-based buffer overflow in the pdfi_apply_filter()
|
2024-07-16 18:39:16 +02:00 |
0001-Bug-707510-don-t-use-strlen-on-passwords.patch
|
RHEL-46149 CVE-2024-29509 ghostscript: heap buffer overflow via the PDFPassword parameter
|
2024-07-16 17:28:17 +02:00 |
0001-Bug-707510-review-printing-of-pointers.patch
|
RHEL-46131 CVE-2024-29508 ghostscript: heap pointer leak in pdf_base_font_alloc()
|
2024-07-16 17:42:23 +02:00 |
0001-Bug-707686.patch
|
RHEL-44771 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths
|
2024-07-11 17:51:48 +02:00 |
0001-Bug-707691.patch
|
RHEL-46575 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction
|
2024-07-17 08:44:35 +02:00 |
0001-Bug-707788-Fix-decode_utf8-to-forbid-overlong-encodi.patch
|
RHEL-67050 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding
|
2025-04-16 12:49:17 +02:00 |
0001-Bug-707793-Check-for-overflow-validating-format-stri.patch
|
RHEL-67050 CVE-2024-46953 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript
|
2025-04-16 12:50:01 +02:00 |
0001-Bug-708133-Avoid-integer-overflow-leading-to-buffer-.patch
|
RHEL-88964 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow
|
2025-05-07 12:56:45 +02:00 |
0001-OPVP-device-prevent-unsafe-parameter-change-with-SAF.patch
|
RHEL-38835 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library
|
2024-06-20 09:35:04 +02:00 |
0001-PDF-interpreter-sanitise-W-array-values-in-Xref-stre.patch
|
RHEL-67050 CVE-2024-46952 ghostscript: Buffer Overflow in Ghostscript PDF XRef Stream Handling
|
2025-04-16 12:48:51 +02:00 |
0001-PostScript-interpreter-fix-buffer-length-check.patch
|
RHEL-67050 CVE-2024-46956 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution
|
2025-04-16 12:50:34 +02:00 |
0001-PS-interpreter-check-the-type-of-the-Pattern-Impleme.patch
|
RHEL-67044 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space
|
2025-04-16 12:48:19 +02:00 |
0001-Uniprint-device-prevent-string-configuration-changes.patch
|
RHEL-44727 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)
|
2024-07-16 19:04:20 +02:00 |
0001-X-device-fix-compiler-warning.patch
|
fix another FTBFS with GCC 14
|
2024-01-20 17:44:21 +01:00 |
ci.fmf
|
Adjust plans and gating.yaml
|
2024-05-23 13:31:51 +02:00 |
gating.yaml
|
Fix spaces
|
2024-08-06 13:41:36 +02:00 |
ghostscript-10.02.1-PostScript-Fix-selectdevice.patch
|
fix txtwrite device and /selectdevice
|
2023-11-08 00:30:32 +01:00 |
ghostscript-10.02.1-txtwrite-device-needs-to-countdown-the-device-on-tex.patch
|
fix txtwrite device and /selectdevice
|
2023-11-08 00:30:32 +01:00 |
ghostscript.spec
|
RHEL-88964 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow
|
2025-05-07 12:56:45 +02:00 |
plans.fmf
|
update plans
|
2024-06-20 13:52:30 +00:00 |
sources
|
rebase to version 10.02.1 (#2238724)
|
2023-11-06 16:36:44 +01:00 |