ghostscript-tools-dvipdf-9.54.0-17.el9_4> M Mv ĉJ4!!%joLne)Ip-Bm5 ']freleng@rockylinux.org p-Bm5 ']P/[V%)5$}릣y HQ&ʲ|~ĕM;BU^u@nF ;EbyTJ^Y ]S%΋(f|vm1w"4\Ifa8}{v)ҙ @XNbGAKheJ:3Wpo} pkۢ׍| Pf>3h%J/W*GB Enu5SE3Z^\a3?j4ԩD EZކGCV 5"w @!_oXJEau0]pfۤpSij<@c%v/LT^=~s7D戥bNtWXXZVQ|)q2)X=V<$.n- ӻIz?ƵSueslەuD-sshi>C7S ^]ɮҾ1;w>N~`b9f5504f2ed015e558dbec0b65e4f25e95aa1732f80fb752923268370764cf8c1ad07c3ec6230e83b53f443e5961638e894a6d45%‚/bZܳ LW' 8>= a? Qd" + J5= x     0L(8 9D : G H I X Y \ ] ^ b .d xe }f l t u v w x y      Cghostscript-tools-dvipdf9.54.017.el9_4Ghostscript's 'dvipdf' utilityThis package provides the utility 'dvipdf' for converting of TeX DVI files into PDF files using Ghostscript and dvips.f0pb-23b938b4-b78c-4da2-b9fe-df22226a5ae3-b-aarch64Rocky Linux 9.4Rocky Enterprise Software FoundationAGPLv3+Rocky Linux Build System (Peridot) Unspecifiedhttps://ghostscript.com/linuxaarch64]큤fff0c5cbaa7d624aff6e787ca367f26dde387df62d30637baf71e0b3e3ddecfc1706b00d4f6d80819b0d4660e6c513560b5b9dffd743f6140cbd9c68a2cdb50dcff6911f3ce1d465767d7e0c80d2d7a78d7147978c8b89f3267b16f71d376bd109frootrootrootrootrootrootghostscript-9.54.0-17.el9_4.src.rpmghostscript-tools-dvipdfghostscript-tools-dvipdf(aarch-64)@    /usr/bin/dvips/usr/bin/shghostscript(aarch-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)9.54.0-17.el9_43.0.4-14.6.0-14.0-15.4.18-14.16.1.3ffj@fb@e;@d@ddTdV@cۥc#@Zdenek Dohnal - 9.54.0-17Zdenek Dohnal - 9.54.0-16Zdenek Dohnal - 9.54.0-15Richard Lescak - 9.54.0-14Richard Lescak - 9.54.0-13Richard Lescak - 9.54.0-12Richard Lescak - 9.54.0-11Richard Lescak - 9.54.0-10Richard Lescak - 9.54.0-9Richard Lescak - 9.54.0-8- RHEL-44759 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths - RHEL-44745 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction - RHEL-44731 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)- RHEL-39110 fix regression discovered in OPVP device- RHEL-39110 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library- fix for CVE-2023-43115 - Resolves: RHEL-10185- fix for CVE-2023-38559 - Resolves: rhbz#2224372- fix for CVE-2023-36664 - Resolves: rhbz#2217810- fix for CVE-2023-28879 - Resolves: rhbz#2188300- fix embedding of CIDFonts - Resolves: rhbz#2179023- set the page size for A4 correctly in ESC/Page driver - Resolves: rhbz#2164613- fix loading of CIDFonts (#2138795)de9.54.0-17.el9_49.54.0-17.el9_4dvipdfdvipdf.1.gzdvipdf.1.gz/usr/bin//usr/share/man/de/man1//usr/share/man/man1/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpiozstd19aarch64-redhat-linux-gnua /usr/bin/sh script, ASCII text executabletroff or preprocessor input, UTF-8 Unicode text (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)Rutf-802f67d9cfeada4c2b87208948c112ed4401683b4ac37314fc4acfcbffeba9529e9c6ace48e998650275af89a50603459d745929601fef76b5c339a1a43f065a7?0(/h ;c< \#36-6㇃0kOLS;[D[ѴeYґ0n:$ٚ2* QzcAk9Ȳ%&Jbh?͚s]#HY=TlOOt:=;y2hX5 ׽PQb[Nycyq>CT%-ZP>F~Ph+K몫u߷^bQiU/. 7ۿ7O{wL&nss.yه>9{=~On>h~͌񞫽YzzOg/KSS-Ffn>O&Smןw;U>$0՜h=MZ p)dj}_%<4{ X.9!|E4 9cq]ZtQK ?}jj:DV"Zc ]虻%8-MX \Sik^^j6 *ɉц 񘵪pHPQ毇)\&`'O뵔梟nˠi `U1c]HY>|^Cv91@vOFIp\:3G E- K(ė4 ^LMfMry{x9$۶ʦ֩5L5eGc&jP+-4CȆw9ZV]yqoRqڮVJzi7ꣾCR&]:ggݯis8MH?:mUgԃ;X@r C^wqB9KDP U#a@ٲ^p[@O*سNP+3%Kel(G1Nl]@ @) OL곲ӓ*$@V-$~C$q "F>`imHQJʇ8lXq@"fQ9 bJ9hiM2$|&\+ + ۦ%v^݀/]ڸk\9CdbC ۊ9:QEa!TP&(lʼn7߯BԒ4m (HA 0teRTg2JRTR Z0Wh%ГWkrT@*̓F \"ֺ#: U~M6I]mwM,$j;l (NM]C*0OcRȲ0<귡 V ^Z6ehdS MnzhԲqk|b+iM/mP>:8 x]*ۼ࿪́gSр (O|YȝKU"VM9&/eS;FS^ɂ|