diff --git a/ghostscript-10.03.0.tar.xz b/ghostscript-10.05.1.tar.xz similarity index 84% rename from ghostscript-10.03.0.tar.xz rename to ghostscript-10.05.1.tar.xz index 09029738e4b27ed686e0875559e69fc31150ce05..60ed4881ec9a5bd56426841eea93d542c9486a89 100644 Binary files a/ghostscript-10.03.0.tar.xz and b/ghostscript-10.05.1.tar.xz differ diff --git a/ghostscript.spec b/ghostscript.spec index c875b532061dc71dfd0621ec4b500eccababbf27..2a7ddff853db37f2d8d3d5af658acf286fc8c6e9 100644 --- a/ghostscript.spec +++ b/ghostscript.spec @@ -1,4 +1,4 @@ -%define anolis_release 8 +%define anolis_release 1 %global _hardened_build 1 %global _docdir_fmt %{name} @@ -8,7 +8,7 @@ Name: ghostscript Summary: Interpreter for PostScript language & PDF -Version: 10.03.0 +Version: 10.05.1 Release: %{anolis_release}%{?dist} License: AGPLv3+ URL: https://ghostscript.com/ @@ -35,63 +35,63 @@ Patch0: ghostscript-10.01.0-fix-linkage.patch # CVE-2024-29510 # Tracking bug: https://security-tracker.debian.org/tracker/CVE-2024-29510 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=3b1735085ecef20b29e8db3416ab36de93e86d1f -Patch1: Bugfix-for-CVE-2024-29510.patch +#Patch1: Bugfix-for-CVE-2024-29510.patch # CVE-2024-33870 # Tracking bug: https://security-tracker.debian.org/tracker/CVE-2024-33870 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=79aef19c685984dc3da2dc090450407d9fbcff80 -Patch2: Bugfix-for-CVE-2024-33870.patch +#Patch2: Bugfix-for-CVE-2024-33870.patch # CVE-2024-33869 # Tracking bug: https://security-tracker.debian.org/tracker/CVE-2024-33869 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=5ae2e320d69a7d0973011796bd388cd5befa1a43 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f5336e5b4154f515ac83bc5b9eba94302e6618d4 -Patch3: Bugfix-for-CVE-2024-33869.patch +#Patch3: Bugfix-for-CVE-2024-33869.patch # CVE-2024-33871 # Tracking bug: https://security-tracker.debian.org/tracker/CVE-2024-33871 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=7145885041bb52cc23964f0aa2aec1b1c82b5908 -Patch4: Bugfix-for-CVE-2024-33871.patch +#Patch4: Bugfix-for-CVE-2024-33871.patch # CVE-2025-27830 # Tracking bug: https://bugs.ghostscript.com/show_bug.cgi?id=708241 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=dc17ab3fe8c -Patch5: bugfix-for-cve-2025-27830.patch +#Patch5: bugfix-for-cve-2025-27830.patch # CVE-2025-27831 # Tracking bug: https://bugs.ghostscript.com/show_bug.cgi?id=708132 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=e4db46d7529a -Patch6: bugfix-for-cve-2025-27831.patch +#Patch6: bugfix-for-cve-2025-27831.patch # CVE-2025-27832 # Tracking bug: https://bugs.ghostscript.com/show_bug.cgi?id=708133 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=36ac25fca7b -Patch7: bugfix-for-cve-2025-27832.patch +#Patch7: bugfix-for-cve-2025-27832.patch # CVE-2025-27833 # Tracking bug: https://bugs.ghostscript.com/show_bug.cgi?id=708259 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=477e36cfa1f -Patch8: bugfix-for-cve-2025-27833.patch +#Patch8: bugfix-for-cve-2025-27833.patch # CVE-2025-27834 # Tracking bug: https://bugs.ghostscript.com/show_bug.cgi?id=708253 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=3885f830772 -Patch9: bugfix-for-cve-2025-27834.patch +#Patch9: bugfix-for-cve-2025-27834.patch # CVE-2025-27835 # Tracking bug: https://bugs.ghostscript.com/show_bug.cgi?id=708131 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=920fae68870 -Patch10: bugfix-for-cve-2025-27835.patch +#Patch10: bugfix-for-cve-2025-27835.patch # CVE-2025-27836 # Tracking bug: https://bugs.ghostscript.com/show_bug.cgi?id=708192 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=db77f4c0ce0 -Patch11: bugfix-for-cve-2025-27836.patch +#Patch11: bugfix-for-cve-2025-27836.patch # CVE-2025-27837 # Tracking bug: https://bugs.ghostscript.com/show_bug.cgi?id=708192 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=db77f4c0ce0 -Patch12: bugfix-for-cve-2025-27837.patch +#Patch12: bugfix-for-cve-2025-27837.patch # CVE-2024-46954 (parent) # CVE-2025-46646 @@ -99,8 +99,8 @@ Patch12: bugfix-for-cve-2025-27837.patch # Tracking bug: https://bugs.ghostscript.com/show_bug.cgi?id=708311 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/patch/?id=55f587dd039282316f512e1bea64218fd991f934 # Upstream fix: https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=f14ea81e6c3d2f51593f23cdf13c4679a18f1a3f -Patch13: bugfix-for-cve-2024-46954.patch -Patch14: bugfix-for-cve-2025-46646.patch +#Patch13: bugfix-for-cve-2024-46954.patch +#Patch14: bugfix-for-cve-2025-46646.patch %description Ghostscript is an interpreter for PostScript® and Portable Document Format (PDF) files. @@ -295,6 +295,10 @@ install -m 0755 -d %{buildroot}%{_datadir}/%{name}/conf.d/ %changelog +* Mon Jun 27 2025 lzq11122 - 10.05.1-1 +- Update to version 10.05.1 from 10.03.0 +- fix CVE-2025-46646 + * Tue Apr 29 2025 tomcruiseqi <10762123+tomcruiseqi@user.noreply.gitee.com> - 10.03.0-8 - Fix CVE-2025-46646