ghostscript-tools-dvipdf-9.55.0-16.oe2203sp30>    g*9 ;G|`u` ) 3,0g镣tsyOJxòR O@S Dϝ_9r%(<>NA}E(h+^vUg= QPX^Bh8uwa0 crfؓ)55^dS%+2=̜4#6ڻH{t(Y QhR9fJA B2]PK_@Z#mqb!5t}|pil0P@^zzbߌ=ZѱF|= c56726d8a52fc54f94efeac278040ab7a5c8ed476b7df136a97adcea54a40a8b3137e1ba444d3394568314e9399c94cd5a13f3f0%ˋ#aSU'Ȫ#>= ? d" / N  "(0< B H T  (7Fp|Y(89:aF G H I X Y \ ] ^ b d e f l t u v $w Px \y hz l |    Cghostscript-tools-dvipdf9.55.016.oe2203sp3Ghostscript's 'dvipdf' utilityThis package provides the utility 'dvipdf' for converting of TeX DVI files into PDF files using Ghostscript and dvipsg*9cdc-64g.compass-ciAGPLv3+http://openeuler.orgUnspecifiedhttps://ghostscript.com/linuxx86_64`򁤁g*9g*9g*9195bf15f28f2ef4bd32f4cc23a0e1eef5075744645af85e4af19587c60effed44e2da573b92dcee11044ecc620f5d3eb8f990db23e5060a434cbcb39d06ff795b0078884aef06b90880ce3d94bd8c3d3bc66066f4ea431e01779e7c72feaf9fdrootrootrootrootrootrootghostscript-9.55.0-16.oe2203sp3.src.rpmghostscript-tools-dvipdfghostscript-tools-dvipdf(x86-64)@    /bin/shghostscriptrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)texlive-dvips9.55.0-16.oe2203sp33.0.4-14.6.0-14.0-15.2-14.17.0g*g$g"g@g@fffS$@f8@ene didF@dhliningjie - 9.55.0-16liningjie - 9.55.0-15liningjie - 9.55.0-14liningjie - 9.55.0-13liningjie - 9.55.0-12zhangxianting - 9.55.0-11zhangxianting - 9.55.0-10xuchenchen - 9.55.0-9xuchenchen - 9.55.0-8liningjie - 9.55.0-7dillon chen - 9.55.0-6liningjie - 9.55.0-5liningjie - 9.55.0-4liningjie - 9.55.0-3- Type:CVE - ID:NA - SUG:NA - DECS: Fix CVE-2024-46952- Type:CVE - ID:NA - SUG:NA - DECS: Fix CVE-2024-46951- Type:CVE - ID:NA - SUG:NA - DECS: Fix CVE-2024-46955- Type:CVE - ID:NA - SUG:NA - DECS: Fix CVE-2024-46956- Type:CVE - ID:NA - SUG:NA - DECS: Fix CVE-2024-46953- Type:CVE - ID:NA - SUG:NA - DECS: This is the second part of the fix for CVE-2024-29511- Type:CVE - ID:NA - SUG:NA - DECS: fix CVE-2024-29506 CVE-2024-29507 CVE-2024-29508 CVE-2024-29509 CVE-2024-29511- Type:CVE - ID:NA - SUG:NA - DECS: fix CVE-2024-29510 CVE-2024-33869 CVE-2024-33870- Type:CVE - ID:NA - SUG:NA - DECS: fix CVE-2023-52722- Type:CVE - ID:CVE-2023-46751 - SUG:NA - DESC:fix CVE-2023-46751- Type:CVE - ID:CVE-2023-43115 - SUG:NA - DESC:fix CVE-2023-43115- fix CVE-2023-36664- fix CVE-2023-28879- fix CVE-2023-38559dc-64g.compass-ci 17308204519.55.0-16.oe2203sp39.55.0-16.oe2203sp30-metadata_list-compact_tlv-ghostscript-tools-dvipdf-9.55.0-16.oe2203sp3.x86_640-metadata_list-compact-ghostscript-tools-dvipdf-9.55.0-16.oe2203sp3.x86_64dvipdf/etc/ima/digest_lists.tlv//etc/ima/digest_lists//usr/bin/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection cpioxz2x86_64-openEuler-linux-gnuPOSIX shell script, ASCII text executableRTxb~R☖y+iutf-803cc33c0f31b1b2f7877ec41192a022fa7b4dea13af0fb66e5ff5f8a33610d0d23bbe70494b83ab94dc38b5d564dbb58832575d733097472d6b8ef5e2c0643f5?07zXZ !#,] b2u Q{LZmqO]©)pqL.Ǚ|O:GohۼVFwD $wiPI޺eG{>H 'O4-`"@ujKXɺΡ:eJD喗-VsI)DS3#lO>@1z?JM<*x\"ц*vqJD8#LJ1:maxcVG&8b-Op&Zk*nbyxRuI,WmDB739ڍ'Ż GRzҋsœڛDT 9؝c%0x˃wf/b7UqwO$] ޽vPf]H25tUab9 =\̥?efxV$ jk 8)df%酢j2:{ X^ 8!/wX((tr{L 2T YO?V ]cssdWnI Bu[AgWŎ# IGRk<棭M&_/([p8j{/Rm_^XcݬULK'mnFYz=2 QUL~kRo4dҳ}K,`qdK:D`41p_*%Գ̈Skf#:MË]VMX%u3 trָ^,C.R YZ