ghostscript-tools-fonts-9.54.0-17.el9_4> M Mv ĉJ4!!%joLne)Ip-Bm5 ']freleng@rockylinux.org p-Bm5 ']ESL+B yd4UFS){ 7Dd Օ rr p`1ꛫά-mEގՊt LJbS#98֙Ù ׺юXXH^7EL$jF蘕W;%Hěl-Vc~~6&z XR{[|n.k{%6 Py4υ!\ O,|gvPK\]קּe#JJ5v~~\c1An5:]<\Dz~֠3\O#`ֲ!S| S)Tm0 gJǴ evI)KhOS$iK~ =$' s zNvƺ BT:괦tђMn-?! rȯbYfO\ܶ +7Vrx @%!_sK=?qd! * G=E      :`|W(8 9 : G H I 0X <Y D\ d] ^ b d Pe Uf Zl ]t xu v wxy,0Cghostscript-tools-fonts9.54.017.el9_4Ghostscript's font utilitiesThis package provides utilities which are useful when you are working with AFM, PFB or PFA files, mostly for conversion purposes.f0pb-23b938b4-b78c-4da2-b9fe-df22226a5ae3-b-aarch64 Rocky Linux 9.4Rocky Enterprise Software FoundationAGPLv3+Rocky Linux Build System (Peridot) Unspecifiedhttps://ghostscript.com/linuxaarch64ZZ큤fffffff6e73e54a37df57301b9b4c41ec22219bc0cdd6be0cf7c15e1148f7e4b7e8d694f54f475ccf55a1ec72fad31898b7408b08e1127f0e0d2e01d240260629b68d38fc533e468c4f335499f681e371a55342a8ca2091557e91ab53ce0cc8075b4d42b611db0892aba93cc4b183203539545e448dbb4b7c08e428a1ab9a8a27143f092d5827a6011e46d662dfb4547d3f54b59a2b481df427d33808df7851662bb84bf56c0f71c92c87499194395901cbd65e0741c3181f0a2a411bab506be30b1c30430b58b8ea3d229d018f0348747c49e22c4dac5664dd151bed9849543cbd9c7erootrootrootrootrootrootrootrootrootrootrootrootrootrootghostscript-9.54.0-17.el9_4.src.rpmghostscript-tools-fontsghostscript-tools-fonts(aarch-64)@    /usr/bin/shghostscript(aarch-64)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)9.54.0-17.el9_43.0.4-14.6.0-14.0-15.4.18-14.16.1.3ffj@fb@e;@d@ddTdV@cۥc#@Zdenek Dohnal - 9.54.0-17Zdenek Dohnal - 9.54.0-16Zdenek Dohnal - 9.54.0-15Richard Lescak - 9.54.0-14Richard Lescak - 9.54.0-13Richard Lescak - 9.54.0-12Richard Lescak - 9.54.0-11Richard Lescak - 9.54.0-10Richard Lescak - 9.54.0-9Richard Lescak - 9.54.0-8- RHEL-44759 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths - RHEL-44745 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction - RHEL-44731 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass)- RHEL-39110 fix regression discovered in OPVP device- RHEL-39110 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library- fix for CVE-2023-43115 - Resolves: RHEL-10185- fix for CVE-2023-38559 - Resolves: rhbz#2224372- fix for CVE-2023-36664 - Resolves: rhbz#2217810- fix for CVE-2023-28879 - Resolves: rhbz#2188300- fix embedding of CIDFonts - Resolves: rhbz#2179023- set the page size for A4 correctly in ESC/Page driver - Resolves: rhbz#2164613- fix loading of CIDFonts (#2138795)de9.54.0-17.el9_49.54.0-17.el9_4pf2afmpfbtopfaprintafmprintafm.1.gzpf2afm.1.gzpfbtopfa.1.gzprintafm.1.gz/usr/bin//usr/share/man/de/man1//usr/share/man/man1/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpiozstd19aarch64-redhat-linux-gnua /usr/bin/sh script, ASCII text executabletroff or preprocessor input, UTF-8 Unicode text (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RRRutf-83e59c93f8fc6c07b6d29f021c51e1b37953f2d4903fedf39589a21224ee9d4d29654126ef389df55dd2b21d06a915fd00a08a9d71d8f2622223dd67f435f454b?0(/hId}071081ed166d7f4dcf6011./usr/bin/pf2afm#!sh # Make an AFM file from PFB /Ad (optionally)s. Usage: # fontnameOutput goes to., which must not already exist.See .psr more details. Thisfini changed nstmatthecutab setke GS_EXECUTABLE=gs gs="`dir\"$0\"`/$" if te! -x "$gs";n fi -q -dNODISPLAY -P-SAFERDE --@" 283btopfaConvert .ar[ $# -eq 2 ] ou=$2 el1 ]`bas1" \`seecho " [a]" 1>&2xit 1- 1"" 318frintPetricsistd4a4ed926are/man/d1/1.gzmێ0j-HUiUU%TV Z r8 6{x@ݪaό][+U R{]u-‚L}%8Õ=r'zXGѐA`']Jn1FyyXqEUMېj!Cx6V|!z?JG=GC,myrUen"jLHhC% KrF@Ro7F "`:9:Z/3~f;1}D~I)R9N&͓l]-L%p3^8Osq/Mռ$w H,IL7)m.+6 SoI9{SQP8{r?~Gv>ϣfԡ3n9'=sCW>FaUWK?96- ė>aՉi% 9[p'_5df1f2A0O9%ƛG ҕ*qqkFI6&D]iF7oi =֘}]aL`ڬgA+<5:[;3,,bw8bDb/La r;oym(g,+U =$i۩K!2X:V*qv?8=Ɂiqo*YpK6Cm1_/>mUIX^qJ$Z{Ngx/vȎO*Ap:Yqk㣈zZQb}65a3UN0EQ`BJ#&",LSƎl4ᵰ4ssbl(la kn-fg vkwUG9d m}D([acoZQNqm^X췑:>! 5!OI30Rŷu)s2Q|7OŸthudEnHU#{&j#ډ3H:`1;g̫FhwÊr%@8ta6MLRG;mȷw{h@'2-1j%d<-#7yW[zT /hJPȂp(5 7I~EjkabAmwϫ4+TbiRHC3a>.$+tEʍt8yI5:8ω7hK7%iΣ1ܡt0=)i\ S_!֦;Ɯ[:IOcHsY/Ga1/蚢WоbvBAR Na-k8^sc{5`bTRAILER!!!QTjFd$f`U ?91 ~4O#hzls~s¼ LLw2@Km#rx9uܤR=i8gôcq2cE58ي#'E #r~lEBh)Z޺%R٥"g08[wNčǧ5Hf󉦤#Wo#s஛el0톈 f*