معرفی شرکت ها


ghostscript-9.25-5.el7.i686.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Interpreter for PostScript language & PDF
ویژگی مقدار
سیستم عامل Linux
توزیع CentOS 7
مخزن Centos os i686
نام بسته ghostscript
نام فایل بسته ghostscript-9.25-5.el7.i686.rpm
نسخه بسته 9.25
انتشار بسته 5.el7
معماری بسته i686
نگهدارنده -
تاریخ ساخت Wed 30 Sep 2020 07
هاست سازنده x86-02.bsys.centos.org
نوع بسته .rpm
آدرس صفحه اصلی https://ghostscript.com/
مجوز AGPLv3+
حجم دانلود 112K
حجم نصب 133.068K
This package provides useful conversion utilities based on Ghostscript software, for converting PS, PDF and other document formats between each other. Ghostscript is a suite of software providing an interpreter for Adobe Systems' PostScript (PS) and Portable Document Format (PDF) page description languages. Its primary purpose includes displaying (rasterization & rendering) and printing of document pages, as well as conversions between different document formats.


جایگزین ها



نیازمندی

مقدار نام
- /bin/sh
- /bin/sh
- /bin/sh
- libICE.so.6
- libSM.so.6
- libX11.so.6
- libXext.so.6
- libXt.so.6
- libc.so.6
- libc.so.6(GLIBC_2.0)
- libc.so.6(GLIBC_2.1.3)
- libc.so.6(GLIBC_2.3.4)
- libc.so.6(GLIBC_2.4)
- libc.so.6(GLIBC_2.7)
= 9.25-5.el7 libgs(x86-32)
- libgs.so.9
- rtld(GNU_HASH)


ارائه دهنده

مقدار نام
= 9.25-5.el7 ghostscript
= 9.25-5.el7 ghostscript(x86-32)


نحوه نصب


نصب پکیج rpm ghostscript:

    sudo yum localinstall ghostscript-9.25-5.el7.i686.rpm


فایل ها

مسیرها
/usr/bin/dvipdf
/usr/bin/eps2eps
/usr/bin/ghostscript
/usr/bin/gs
/usr/bin/gsbj
/usr/bin/gsdj
/usr/bin/gsdj500
/usr/bin/gslj
/usr/bin/gslp
/usr/bin/gsnd
/usr/bin/lprsetup.sh
/usr/bin/pdf2dsc
/usr/bin/pdf2ps
/usr/bin/pf2afm
/usr/bin/pfbtopfa
/usr/bin/pphs
/usr/bin/printafm
/usr/bin/ps2ascii
/usr/bin/ps2epsi
/usr/bin/ps2pdf
/usr/bin/ps2pdf12
/usr/bin/ps2pdf13
/usr/bin/ps2pdf14
/usr/bin/ps2pdfwr
/usr/bin/ps2ps
/usr/bin/ps2ps2
/usr/bin/unix-lpr.sh
/usr/lib/ghostscript
/usr/lib/ghostscript/X11.so
/usr/share/man/de/man1/dvipdf.1.gz
/usr/share/man/de/man1/eps2eps.1.gz
/usr/share/man/de/man1/gsnd.1.gz
/usr/share/man/de/man1/pdf2dsc.1.gz
/usr/share/man/de/man1/pdf2ps.1.gz
/usr/share/man/de/man1/printafm.1.gz
/usr/share/man/de/man1/ps2ascii.1.gz
/usr/share/man/de/man1/ps2pdf.1.gz
/usr/share/man/de/man1/ps2pdf12.1.gz
/usr/share/man/de/man1/ps2pdf13.1.gz
/usr/share/man/de/man1/ps2pdf14.1.gz
/usr/share/man/de/man1/ps2ps.1.gz
/usr/share/man/man1/dvipdf.1.gz
/usr/share/man/man1/eps2eps.1.gz
/usr/share/man/man1/ghostscript.1.gz
/usr/share/man/man1/gs.1.gz
/usr/share/man/man1/gsbj.1.gz
/usr/share/man/man1/gsdj.1.gz
/usr/share/man/man1/gsdj500.1.gz
/usr/share/man/man1/gslj.1.gz
/usr/share/man/man1/gslp.1.gz
/usr/share/man/man1/gsnd.1.gz
/usr/share/man/man1/pdf2dsc.1.gz
/usr/share/man/man1/pdf2ps.1.gz
/usr/share/man/man1/pf2afm.1.gz
/usr/share/man/man1/pfbtopfa.1.gz
/usr/share/man/man1/printafm.1.gz
/usr/share/man/man1/ps2ascii.1.gz
/usr/share/man/man1/ps2epsi.1.gz
/usr/share/man/man1/ps2pdf.1.gz
/usr/share/man/man1/ps2pdf12.1.gz
/usr/share/man/man1/ps2pdf13.1.gz
/usr/share/man/man1/ps2pdf14.1.gz
/usr/share/man/man1/ps2pdfwr.1.gz
/usr/share/man/man1/ps2ps.1.gz


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2020-03-31

1812284 - ghostscript fontconfig support broken when gs used with -dSAFER/-dPARANOIDSAFER

2019-11-08

1769341 - CVE-2019-14869 ghostscript: -dSAFER escape in .charkeys

2019-08-05

Resolves: #1737339 - CVE-2019-10216 ghostscript: -dSAFER escape via .buildfont1 (701394)
Resolves: #1744009 - CVE-2019-14811 ghostscript: Safer Mode Bypass by .forceput Exposure in .pdf_hook_DSC_Creator (701445)
Resolves: #1744013 - CVE-2019-14812 ghostscript: Safer Mode Bypass by .forceput Exposure in setuserparams (701444)
Resolves: #1744004 - CVE-2019-14813 ghostscript: Safer Mode Bypass by .forceput Exposure in setsystemparams (701443)
Resolves: #1744229 - CVE-2019-14817 ghostscript: Safer Mode Bypass by .forceput Exposure in .pdfexectoken and other procedures (701450)

2019-04-02

obsoleted old ghostscript-devel to allow clean upgrade to libgs-devel

2019-02-14

Rebase to latest upstream version (bug #1636115)
Resolves: #1673399 - CVE-2019-3839 ghostscript: missing attack vector
2019-6116
Resolves: #1678172 - CVE-2019-3835 ghostscript: superexec operator
Resolves: #1680026 - CVE-2019-3838 ghostscript: forceput in DefineResource
Resolves: #1670443 - ghostscript: Regression: double comment chars
fix for pdf2dsc regression added to allow fix for CVE-2019-3839

2019-01-16

Remove as many non-standard operators as possible to make the codebase
Resolves: #1621385 - CVE-2018-16511 ghostscript: missing type check in type
Resolves: #1649722 - CVE-2018-16539 ghostscript: incorrect access checking
Resolves: #1621162 - CVE-2018-15908 ghostscript: .tempfile file permission
Resolves: #1621384 - CVE-2018-15909 ghostscript: shading_param incomplete
Resolves: #1652902 - CVE-2018-16863 ghostscript: incomplete fix for
2018-16509
Resolves: #1654045 ghostscript update breaks xdvi (gs: Error: /undefined in flushpage)
Resolves: #1651150 - CVE-2018-15911 ghostscript: uninitialized memory
Resolves: #1650061 - CVE-2018-16802 ghostscript: Incorrect "restoration of
Resolves: #1652936 - CVE-2018-19409 ghostscript: Improperly implemented
Resolves: #1654622 - CVE-2018-16541 ghostscript: incorrect free logic in
Resolves: #1650211 - CVE-2018-17183 ghostscript: User-writable error
Resolves: #1645517 - CVE-2018-18073 ghostscript: saved execution stacks
Resolves: #1648892 - CVE-2018-17961 ghostscript: saved execution stacks
2018-17183)
Resolves: #1643117 - CVE-2018-18284 ghostscript: 1Policy operator
Resolves: #1655939 - CVE-2018-19134 ghostscript: Type confusion in
Resolves: #1657694 - ghostscript: Regression: Warning: Dropping incorrect
-run--)
Resolves: #1661210 pdf2ps reports an error when reading from stdin
Resolves: #1657334 - CVE-2018-16540 ghostscript: use-after-free in
Resolves: #1660570 - CVE-2018-19475 ghostscript: access bypass in
Resolves: #1660829 - CVE-2018-19476 ghostscript: access bypass in
Resolves: #1661279 - CVE-2018-19477 ghostscript: access bypass in
Resolves: #1667443 - CVE-2019-6116 ghostscript: subroutines within
operators must themselves be pseudo-operators
Resolves: #1670443 - ghostscript: Regression: double comment chars

2018-09-10

Added security fixes for:
CVE-2018-16509 (bug #1621158)
CVE-2018-15910 (bug #1621160)
CVE-2018-16542 (bug #1621382)

2018-04-17

Fix MediaPosition, ManualFeed and MediaType with pxl devices (bug #1551782)

2017-07-25

Fix rare Segmentation fault when converting PDF to PNG (bug #1473337)
Raise the default VMThreshold from 1Mb to 8Mb (bug #1479852)

2017-05-11

Security fix for CVE-2017-8291 updated to address SIGSEGV

2017-05-03

Added security fix for CVE-2017-8291 (bug #1446063)

2017-04-11

Updated requirements for lcms2 to avoid possible issues in the future

2017-04-06

Added security fix for CVE-2017-7207 (bug #1434353)
Added explicit requirement for lcms2 version we are build with (bug #1436273)

2017-03-21

Fix infinite 'for' loop in gdevp14.c file (bug #1424752)

2017-02-15

Fix for regression caused by previous CVE fixes (bug #1411725)

2017-01-10

Fix of SIGSEGV in cid_font_data_param when using ps2pdf (bug #1390847)