Opened 13 months ago

Closed 13 months ago

Last modified 9 months ago

#17851 closed enhancement (fixed)

ghostscript-10.01.1

Reported by: Douglas R. Reno Owned by: pierre
Priority: high Milestone: 12.0
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New minor version

Change History (8)

comment:1 by Xi Ruoyao, 13 months ago

This 10.01.0 release removes the "-dNEWPDF=false" command line option to fall back to the deprecated, old PDF interpreter.

comment:2 by pierre, 13 months ago

Owner: changed from blfs-book to pierre
Status: newassigned

comment:3 by pierre, 13 months ago

Summary: ghostscript-10.01.0ghostscript-10.01.1

Now 10.01.1. Looks like they had forgotten the tarballs in 10.01.0...

Last edited 13 months ago by pierre (previous) (diff)

comment:4 by pierre, 13 months ago

Version 10.01.1 (2023-03-27)

Highlights in this release include:

We've continued to improve the performance of the PDF interpreter written in C and improve it's behaviour in edge and out-of-specification cases.

Our efforts in code hygiene and maintainability continue.

The usual round of bug fixes, compatibility changes, and incremental improvements.

(9.53.0) We have added the capability to build with the Tesseract OCR engine. In such a build, new devices are available (pdfocr8/pdfocr24/pdfocr32) which render the output file to an image, OCR that image, and output the image "wrapped" up as a PDF file, with the OCR generated text information included as "invisible" text (in PDF terms, text rendering mode 3).

Mainly due to time constraints, we only support including Tesseract from source included in our release packages, and not linking to Tesseract/Leptonica shared libraries. Whether we add this capability will be largely dependent on community demand for the feature.

See Enabling OCR for more details.

comment:5 by pierre, 13 months ago

Resolution: fixed
Status: assignedclosed

Fixed at commit 15a1a0cd

comment:6 by Douglas R. Reno, 13 months ago

Priority: normalhigh

A delayed security advisory is required for "Shell in the Ghost", also known as CVE-2023-28879. It has been rated as Critical (9.8/10), and allows for trivial remote code execution when processing Postscript files. From the advisory upstream:

Users of Ghostscript are urged to update their software to the latest
version immediately. By doing so, they will be able to mitigate the risk
associated with this vulnerability and ensure the security and integrity
of their systems. 

comment:7 by Douglas R. Reno, 13 months ago

SA-11.3-019 issued, and an email has been sent to the lists.

comment:8 by Bruce Dubbs, 9 months ago

Milestone: 11.412.0

Milestone renamed

Note: See TracTickets for help on using tickets.