Severity:
('Low', ['ELSCVE-85779'])
Release date:
2026-04-16 09:58:18 UTC
Description:
- CVE-2024-29508: fix heap-based pointer disclosure in pdf_base_font_alloc
Updated packages:
-
ghostscript-9.54.0-19.el9_6.tuxcare.els2.i686.rpm
sha:4822725a0116c81681e99d7605f79fcc898fd5b7d84cccde1391155fbde5a43c
-
ghostscript-9.54.0-19.el9_6.tuxcare.els2.x86_64.rpm
sha:d66196afecfe8fc83434995616e3cc58efb3032e15c7321347b53e93d1ecdc8f
-
ghostscript-doc-9.54.0-19.el9_6.tuxcare.els2.noarch.rpm
sha:98a0cff6aee7f08dda404d3d04d6a81036920c167389982ca06e2f1c50ce3583
-
ghostscript-gtk-9.54.0-19.el9_6.tuxcare.els2.x86_64.rpm
sha:b949a5385db2e69098aba55297b22517c0c8ae97866ec49e373dec267886489a
-
ghostscript-tools-dvipdf-9.54.0-19.el9_6.tuxcare.els2.x86_64.rpm
sha:33c907a9eabf027914866d09dd1e13910c3b990fa547cd6add55ea90ec1874ff
-
ghostscript-tools-fonts-9.54.0-19.el9_6.tuxcare.els2.i686.rpm
sha:596ff16daf19a3adcd36276e6629c06ab88c2d8dc1abc21ca5521578c7cd4d67
-
ghostscript-tools-fonts-9.54.0-19.el9_6.tuxcare.els2.x86_64.rpm
sha:21987e13d91fd2f575de91ca3de6d5a2f71cf75d8468bebab37353b229519466
-
ghostscript-tools-printing-9.54.0-19.el9_6.tuxcare.els2.i686.rpm
sha:90e037749be1ddc4de338eabf8a3e3e27ac45cbed28c8ad709c28173ec565529
-
ghostscript-tools-printing-9.54.0-19.el9_6.tuxcare.els2.x86_64.rpm
sha:f5353bf6cb8fdba3ba05fb8839ef543e6e6c8cda376261c983194c497fde4bf2
-
ghostscript-x11-9.54.0-19.el9_6.tuxcare.els2.x86_64.rpm
sha:edfcb461257e9f78352ad8457123b4d83191cb2354cf0d805d6eb9825abdbc70
-
libgs-9.54.0-19.el9_6.tuxcare.els2.i686.rpm
sha:6c065825cb5d9959e0b83370d22df0103f89ac5af575b51337906e41fc73e7ff
-
libgs-9.54.0-19.el9_6.tuxcare.els2.x86_64.rpm
sha:594f77251e56d50572bc4d01f006f43f6c7620450ca5f543733e1d46c47c16f9
-
libgs-devel-9.54.0-19.el9_6.tuxcare.els2.i686.rpm
sha:211d68f029c6c01aa83361e9d693d7a85b99ebcf7d0239966e1d074de48fa921
-
libgs-devel-9.54.0-19.el9_6.tuxcare.els2.x86_64.rpm
sha:c4864cf7cc3415c3b270cdd6fbcb348fc54cca912fe33db7ff284bbd214b17b0
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.