Sponsored Content
Special Forums Cybersecurity Security Advisories (RSS) Ubuntu: 961-1: Ghostscript vulnerabilities Post 302437047 by Linux Bot on Tuesday 13th of July 2010 10:00:03 PM
Old 07-13-2010
Ubuntu: 961-1: Ghostscript vulnerabilities

LinuxSecurity.com: David Srbecky discovered that Ghostscript incorrectly handled debuglogging. If a user or automated system were tricked into opening a craftedPDF file, an attacker could cause a denial of service or execute arbitrarycode with privileges of the user invoking the program. This issue onlyaffected Ubuntu 9.04 and Ubuntu 9.10. The default compiler options for [More...]

More...
 
PS2PS(1)							 Ghostscript Tools							  PS2PS(1)

NAME
ps2ps, eps2eps - Ghostscript PostScript "distiller" SYNOPSIS
ps2ps [ options ] input.ps output.ps eps2eps [ options ] input.eps output.eps DESCRIPTION
ps2ps uses gs(1) to convert PostScript(tm) file "input.ps" to simpler, normalized and (usually) faster PostScript in "output.ps". Normally the output is allowed to use PostScript Level 2 or Level 3 constructs, but the -dLanguageLevel=1 option restricts the output to Level 1. eps2eps performs the equivalent optimization for Encapsulated PostScript (EPS) files. Both accept any general Ghostscript command line options, and respectively options specific to the pswrite and epswrite devices. FILES
Run "gs -h" to find the location of Ghostscript documentation on your system, from which you can get more details. BUGS
The pswrite device used by both ps2ps and eps2eps produces much lower level output than is desirable. Use with caution. SEE ALSO
ps2pdf(1), ps2ascii(1), ps2epsi(1) VERSION
This document was last revised for Ghostscript version 8.70. AUTHOR
Artifex Software, Inc. are the primary maintainers of Ghostscript. 8.70 31 July 2009 PS2PS(1)
All times are GMT -4. The time now is 03:01 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy