Release date:
2025-06-13 14:59:22 UTC
Description:
- CVE-2024-46956: fix out-of-bounds data access in filenameforall to prevent
arbitrary code execution
Updated packages:
-
ghostscript-9.54.0-11.el9_2.tuxcare.els4.i686.rpm
sha:1edf29403436c8028f1c57053a267172ca53cfdddb19a3b65cb269a3050648f3
-
ghostscript-9.54.0-11.el9_2.tuxcare.els4.x86_64.rpm
sha:0afab548ff6fd496966ab76c9c7fe3fef0b231ad0bc85efe1aa89b70e1df18a4
-
ghostscript-doc-9.54.0-11.el9_2.tuxcare.els4.noarch.rpm
sha:bb2f229a8436c272c47ddbad219c38d41512dcf294daf811bb4aa1b67891c51b
-
ghostscript-gtk-9.54.0-11.el9_2.tuxcare.els4.x86_64.rpm
sha:de6f4cb4345fda44d38e7e49db23a5ca44621761addf510c01d7341b5f84b798
-
ghostscript-tools-dvipdf-9.54.0-11.el9_2.tuxcare.els4.x86_64.rpm
sha:837cd2031c8dcda6f5ea0cd136c4b8d1f151053f8fe0e518b122ca26bc0922a2
-
ghostscript-tools-fonts-9.54.0-11.el9_2.tuxcare.els4.i686.rpm
sha:74e719e2641d6162c1fea587249be3e21b58eaf8d13f780f3e78f7cf4a079f12
-
ghostscript-tools-fonts-9.54.0-11.el9_2.tuxcare.els4.x86_64.rpm
sha:d778d41970b23e4fb18eeefc7cafa7809345604af5d176c4255f1f6ecc99ff8a
-
ghostscript-tools-printing-9.54.0-11.el9_2.tuxcare.els4.i686.rpm
sha:955fee20ebf8b5e49ad1ac7b56ae941803eb6a5446e6bf4fbbc785c805673ebb
-
ghostscript-tools-printing-9.54.0-11.el9_2.tuxcare.els4.x86_64.rpm
sha:b1e70cf9aa4ac5cf9922c05bf49b511cfb51947cbcee7964693d23f11ad00d57
-
ghostscript-x11-9.54.0-11.el9_2.tuxcare.els4.x86_64.rpm
sha:3befb505e0787f8290a0031a0b41fae6ff534583b87a49217d20fd5fde624f1c
-
libgs-9.54.0-11.el9_2.tuxcare.els4.i686.rpm
sha:f907d82982897d58e285b8f94a64d53ce53e656c9f94ea0d135aa30bfba6c41b
-
libgs-9.54.0-11.el9_2.tuxcare.els4.x86_64.rpm
sha:3e9d88b12ea32c33ac21d8b27ed14724353bd0788c9a142652af7f5761b8053b
-
libgs-devel-9.54.0-11.el9_2.tuxcare.els4.i686.rpm
sha:78b9087d9e3e2f94e05343070500ebd16d4ec3c101acbc46edfde5976dceb9b8
-
libgs-devel-9.54.0-11.el9_2.tuxcare.els4.x86_64.rpm
sha:f1e3fcd354eb9858befdb5b1544d2867ef97da4b79b964677bd2c151576cf577
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.