Versions Packages Information History CVEs Related Badges Report

Versions for ghostscript

538 package(s) known

Repository Package name Version Category Maintainer(s)
AIX Open Source Packages ghostscript 9.06 Potentially vulnerable - -
AIX Open Source Packages ghostscript 9.06 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.71 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.71 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.70 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.70 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.70 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.64 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.62 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.62 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.62 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.61 Potentially vulnerable - -
AIX Open Source Packages ghostscript 8.60 Potentially vulnerable - -
AIX Toolbox ghostscript 9.50 Potentially vulnerable Applications/Publishing -
AIX Toolbox ghostscript 9.27 Potentially vulnerable Applications/Publishing -
AIX Toolbox ghostscript 9.25 Potentially vulnerable Applications/Publishing -
AIX Toolbox ghostscript 5.50 Potentially vulnerable Applications/Publishing -
AlmaLinux 8
AppStream
ghostscript 9.27 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
AppStream
ghostscript 9.54.0 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
main
ghostscript-dbg 9.26 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.8
main
ghostscript-dev 9.26 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.8
main
ghostscript-doc 9.26 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.8
main
ghostscript-gtk 9.26 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.8
main
ghostscript 9.26 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.9
main
ghostscript-doc 9.26 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.9
main
ghostscript 9.26 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.9
main
ghostscript-dev 9.26 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.9
main
ghostscript-dbg 9.26 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.9
main
ghostscript-gtk 9.26 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.10
main
ghostscript-dbg 9.27 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.10
main
ghostscript-doc 9.27 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.10
main
ghostscript 9.27 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.10
main
ghostscript-gtk 9.27 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.10
main
ghostscript-dev 9.27 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.11
main
ghostscript-gtk 9.50 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.11
main
ghostscript 9.50 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.11
main
ghostscript-dbg 9.50 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.11
main
ghostscript-doc 9.50 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.11
main
ghostscript-dev 9.50 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.12
main
ghostscript-dbg 9.52 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.12
main
ghostscript-dev 9.52 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.12
main
ghostscript-gtk 9.52 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.12
main
ghostscript 9.52 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.12
main
ghostscript-doc 9.52 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.13
main
ghostscript-gtk 9.53.3 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.13
main
ghostscript 9.53.3 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.13
main
ghostscript-doc 9.53.3 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.13
main
ghostscript-dbg 9.53.3 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.13
main
ghostscript-dev 9.53.3 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.14
main
ghostscript-doc 9.54.0 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.14
main
ghostscript-dev 9.54.0 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.14
main
ghostscript-dbg 9.54.0 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.14
main
ghostscript 9.54.0 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.14
main
ghostscript-gtk 9.54.0 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.15
main
ghostscript-dev 9.55.0 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.15
main
ghostscript-doc 9.55.0 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.15
main
ghostscript-gtk 9.55.0 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.15
main
ghostscript-dbg 9.55.0 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.15
main
ghostscript 9.55.0 Potentially vulnerable - cbanta@gmail.com
Alpine Linux 3.16
main
ghostscript-doc 9.56.1 - cbanta@gmail.com
Alpine Linux 3.16
main
ghostscript 9.56.1 - cbanta@gmail.com
Alpine Linux 3.16
main
ghostscript-gtk 9.56.1 - cbanta@gmail.com
Alpine Linux 3.16
main
ghostscript-dev 9.56.1 - cbanta@gmail.com
Alpine Linux 3.16
main
ghostscript-dbg 9.56.1 - cbanta@gmail.com
Alpine Linux 3.17
main
ghostscript-doc 10.0.0 - cbanta@gmail.com
Alpine Linux 3.17
main
ghostscript 10.0.0 - cbanta@gmail.com
Alpine Linux 3.17
main
ghostscript-gtk 10.0.0 - cbanta@gmail.com
Alpine Linux 3.17
main
ghostscript-dev 10.0.0 - cbanta@gmail.com
Alpine Linux 3.17
main
ghostscript-dbg 10.0.0 - cbanta@gmail.com
Alpine Linux Edge
main
ghostscript-gtk 10.01.0 - cbanta@gmail.com
Alpine Linux Edge
main
ghostscript-dev 10.01.0 - cbanta@gmail.com
Alpine Linux Edge
main
ghostscript-dbg 10.01.0 - cbanta@gmail.com
Alpine Linux Edge
main
ghostscript 10.01.0 - cbanta@gmail.com
Alpine Linux Edge
main
ghostscript-doc 10.01.0 - cbanta@gmail.com
ALT Linux p9 ghostscript 9.27 Potentially vulnerable Publishing darktemplar@altlinux.org
ALT Linux p10 ghostscript 9.54.0 Potentially vulnerable Publishing george@altlinux.org
ALT Sisyphus ghostscript 9.54.0 Potentially vulnerable Publishing george@altlinux.org
Amazon Linux 1
main
ghostscript 8.70 Potentially vulnerable Applications/Publishing -
Amazon Linux 1
updates
ghostscript 8.70 Potentially vulnerable Applications/Publishing -
Amazon Linux 2 ghostscript 9.25 Potentially vulnerable Unspecified -
Amazon Linux 2 ghostscript 9.25 Potentially vulnerable Unspecified -
Amazon Linux 2 ghostscript 9.25 Potentially vulnerable Unspecified -
Amazon Linux 2 ghostscript 9.06 Potentially vulnerable Applications/Publishing -
Amazon Linux 2 ghostscript 9.06 Potentially vulnerable Applications/Publishing -
Amazon Linux 2 ghostscript 9.06 Potentially vulnerable Applications/Publishing -
Amazon Linux 2 ghostscript 9.06 Potentially vulnerable Applications/Publishing -
AOSC ghostscript 9.54.0 Potentially vulnerable doc fallback-mnt-aosc@repology
AOSC ghostscript+32 9.27 Potentially vulnerable doc fallback-mnt-aosc@repology
Apertis v2020
v2020/development
ghostscript 9.27 Potentially vulnerable main debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Apertis v2021
v2021/development
ghostscript 9.27 Potentially vulnerable main debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Apertis v2022
v2022/development
ghostscript 9.53.3 Potentially vulnerable main debian-printing@lists.debian.org, dr@jones.dk
Apertis v2023
v2023/development
ghostscript 9.53.3 Potentially vulnerable - debian-printing@lists.debian.org, dr@jones.dk
Apertis v2024 Development
v2024dev1/development
ghostscript 9.53.3 Potentially vulnerable - debian-printing@lists.debian.org, dr@jones.dk
AppGet Ghostscript 952 - -
Arch
extra
ghostpcl 10.01.1 - -
Arch
extra
ghostxps 10.01.1 - -
Arch
extra
ghostscript 10.01.1 - -
Arch Linux 32 i486
extra
ghostxps 10.0.0 - -
Arch Linux 32 i486
extra
ghostpcl 10.0.0 - -
Arch Linux 32 i486
extra
ghostscript 10.0.0 - -
Arch Linux 32 i686
extra
ghostscript 10.0.0 - -
Arch Linux 32 i686
extra
ghostxps 10.0.0 - -
Arch Linux 32 i686
extra
ghostpcl 10.0.0 - -
Arch Linux 32 pentium4
extra
ghostpcl 10.0.0 - -
Arch Linux 32 pentium4
extra
ghostxps 10.0.0 - -
Arch Linux 32 pentium4
extra
ghostscript 10.0.0 - -
Arch Linux ARM aarch64
extra
ghostscript 10.01.1 - -
Arch Linux ARM aarch64
extra
ghostpcl 10.01.1 - -
Arch Linux ARM aarch64
extra
ghostxps 10.01.1 - -
Arch Linux ARM armv7h
extra
ghostscript 10.01.1 - -
Arch Linux ARM armv7h
extra
ghostpcl 10.01.1 - -
Arch Linux ARM armv7h
extra
ghostxps 10.01.1 - -
ArchPOWER powerpc ghostscript-debug 10.0.0 - -
ArchPOWER powerpc ghostpcl 10.0.0 - -
ArchPOWER powerpc ghostxps 10.0.0 - -
ArchPOWER powerpc ghostscript 10.0.0 - -
ArchPOWER powerpc64le ghostxps 10.0.0 - -
ArchPOWER powerpc64le ghostpcl 10.0.0 - -
ArchPOWER powerpc64le ghostscript 10.0.0 - -
ArchPOWER powerpc64le ghostscript-debug 10.0.0 - -
ArchPOWER riscv64 ghostscript-debug 10.0.0 - -
ArchPOWER riscv64 ghostpcl 10.0.0 - -
ArchPOWER riscv64 ghostscript 10.0.0 - -
ArchPOWER riscv64 ghostxps 10.0.0 - -
AUR ghostscript-git 9.25.r6012.g95281026d - severach@aur
AUR ghostxps-git 9.25.r6012.g95281026d - severach@aur
AUR ghostpcl-git 9.25.r6012.g95281026d - severach@aur
Artix
world
ghostscript 10.01.1 - -
Artix
world
ghostpcl 10.01.1 - -
Artix
world
ghostxps 10.01.1 - -
Astra Orel Stable
main
ghostscript 9.26a Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Ataraxia GNU/Linux ghostscript 9.54.0 Potentially vulnerable office nagakamira@gmail.com
CentOS 6
os
ghostscript 8.70 Potentially vulnerable Applications/Publishing -
CentOS 6
updates
ghostscript 8.70 Potentially vulnerable Applications/Publishing -
CentOS 7
os
ghostscript 9.25 Potentially vulnerable Unspecified -
CentOS 8
AppStream
ghostscript 9.27 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 8
AppStream
ghostscript 9.27 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 8
AppStream
ghostscript 9.27 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 8
AppStream
ghostscript 9.27 Potentially vulnerable Unspecified bugs@centos.org
CentOS Stream 9
AppStream
ghostscript 9.54.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
AppStream
ghostscript 9.54.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
AppStream
ghostscript 9.54.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
AppStream
ghostscript 9.54.0 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
AppStream
ghostscript 9.54.0 Potentially vulnerable Unspecified builder@centos.org
Chocolatey Ghostscript 10.0.0.20230317 - -
CRUX 3.4
opt
ghostscript 9.27 Potentially vulnerable - jue@crux.nu
CRUX 3.5
opt
ghostscript 9.53.3 Potentially vulnerable - jue@crux.nu
CRUX 3.6
opt
ghostscript 9.56.1 - jue@crux.nu
CRUX 3.7
opt
ghostscript 10.01.1 - jue@crux.nu
Cygwin ghostscript 10.0.0 Graphics ken.brown@cygwin
Cygwin ghostscript-debuginfo 10.0.0 Debug ken.brown@cygwin
Cygwin libgs-devel 10.0.0 Devel ken.brown@cygwin
Cygwin libgs10 10.0.0 Libs ken.brown@cygwin
Cygwin libgs9 10.0.0 Libs ken.brown@cygwin
Debian 9
stretch/updates/main
ghostscript 9.26a Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Debian 9
stretch/main
ghostscript 9.26a Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Debian 10
buster/main
ghostscript 9.27 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Debian 10
buster/updates/main
ghostscript 9.27 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Debian 11
bullseye/main
ghostscript 9.53.3 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk
Debian 11
bullseye-security/main
ghostscript 9.53.3 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk
Debian 12
bookworm/main
ghostscript 10.0.0 text packages@qa.debian.org
Debian Unstable
sid/main
ghostscript 10.0.0 text packages@qa.debian.org
Deepin
main
ghostscript 9.53.3 Potentially vulnerable - debian-printing@lists.debian.org, dr@jones.dk
Deepin
main
ghostscript 9.27 Potentially vulnerable - debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Deepin
main
ghostscript 9.27 Potentially vulnerable - debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Devuan 1.0
jessie/main
ghostscript 9.06 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Devuan 2.0
ascii/main
ghostscript 9.26a Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Devuan 3.0
beowulf/main
ghostscript 9.27 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Devuan 4.0
chimaera/main
ghostscript 9.53.3 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk
Devuan Unstable
unstable/main
ghostscript 10.0.0 text packages@qa.debian.org
DistroWatch.com ghostscript 10.01.1 - -
DPorts print/ghostscript9-agpl-base 9.56.1 print hrs@freebsd.org
DPorts print/ghostscript9-agpl-x11 9.56.1 print hrs@freebsd.org
DPorts print/ghostscript9-base 9.06 Potentially vulnerable print ports@freebsd.org
DPorts print/ghostscript9-x11 9.06 Potentially vulnerable print ports@freebsd.org
DPorts print/ghostscript8-base 8.71 Potentially vulnerable print ports@freebsd.org
DPorts print/ghostscript8-x11 8.71 Potentially vulnerable print ports@freebsd.org
DPorts print/ghostscript7-base 7.07 Potentially vulnerable print hrs@freebsd.org
DPorts print/ghostscript7-commfont 7.07 Potentially vulnerable print hrs@freebsd.org
DPorts print/ghostscript7-jpnfont 7.07 Potentially vulnerable print hrs@freebsd.org
DPorts print/ghostscript7-korfont 7.07 Potentially vulnerable print hrs@freebsd.org
DPorts print/ghostscript7-x11 7.07 Potentially vulnerable print hrs@freebsd.org
Entware
mipselsf-k3.4
ghostscript 10.0.0 utils fallback-mnt-entware@repology
Entware
mipssf-k3.4
ghostscript 10.0.0 utils fallback-mnt-entware@repology
Entware
x64-k3.2
ghostscript 10.0.0 utils fallback-mnt-entware@repology
Entware
aarch64-k3.10
ghostscript 10.0.0 utils fallback-mnt-entware@repology
Entware
armv5sf-k3.2
ghostscript 10.0.0 utils fallback-mnt-entware@repology
Entware
armv7sf-k2.6
ghostscript 10.0.0 utils fallback-mnt-entware@repology
Entware
armv7sf-k3.2
ghostscript 10.0.0 utils fallback-mnt-entware@repology
EuroLinux 8
appstream
ghostscript 9.27 Potentially vulnerable Unspecified -
EuroLinux 8
appstream
ghostscript 9.25 Potentially vulnerable Unspecified -
EuroLinux 8
appstream
ghostscript 9.25 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
ghostscript 9.54.0 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
ghostscript 9.54.0 Potentially vulnerable Unspecified -
EuroLinux 9
appstream
ghostscript 9.54.0 Potentially vulnerable Unspecified -
EuroLinux 9
baseos
ghostscript 9.54.0 Potentially vulnerable Unspecified -
Exherbo
arbor
app-text/ghostscript 10.0.0 app-text fallback-mnt-exherbo@repology
Fedora 26
release
ghostscript 9.20 Potentially vulnerable Applications/Publishing -
Fedora 26
updates
ghostscript 9.20 Potentially vulnerable Applications/Publishing -
Fedora 27
updates
ghostscript 9.22 Potentially vulnerable Applications/Publishing -
Fedora 27
release
ghostscript 9.20 Potentially vulnerable Applications/Publishing -
Fedora 28
updates
ghostscript 9.26 Potentially vulnerable Unspecified -
Fedora 28
release
ghostscript 9.23 Potentially vulnerable Unspecified -
Fedora 29
updates
ghostscript 9.27 Potentially vulnerable Unspecified -
Fedora 29
release
ghostscript 9.25 Potentially vulnerable Unspecified -
Fedora 30
updates
ghostscript 9.27 Potentially vulnerable Unspecified -
Fedora 30
release
ghostscript 9.26 Potentially vulnerable Unspecified -
Fedora 31
updates
ghostscript 9.27 Potentially vulnerable Unspecified -
Fedora 31
release
ghostscript 9.27 Potentially vulnerable Unspecified -
Fedora 32
updates
ghostscript 9.53.3 Potentially vulnerable Unspecified -
Fedora 32
release
ghostscript 9.52 Potentially vulnerable Unspecified -
Fedora 33
updates
ghostscript 9.55.0 Potentially vulnerable Unspecified -
Fedora 33
release
ghostscript 9.53.1 Potentially vulnerable Unspecified -
Fedora 34
updates
ghostscript 9.55.0 Potentially vulnerable Unspecified -
Fedora 34
release
ghostscript 9.53.3 Potentially vulnerable Unspecified -
Fedora 35
updates
ghostscript 9.56.1 Unspecified -
Fedora 35
release
ghostscript 9.54.0 Potentially vulnerable Unspecified -
Fedora 36
updates
ghostscript 9.56.1 Unspecified -
Fedora 36
release
ghostscript 9.55.0 Potentially vulnerable Unspecified -
Fedora 37
release
ghostscript 9.56.1 Unspecified -
Fedora 37
updates
ghostscript 9.56.1 Unspecified -
Fedora 38
development
ghostscript 10.0.0 Unspecified -
Fedora Rawhide
development
ghostscript 10.0.0 Unspecified -
FreeBSD Ports print/ghostscript10 10.01.0 print michael.osipov@siemens.com
FreeBSD Ports print/ghostscript9-agpl-base 9.56.1 print hrs@freebsd.org
FreeBSD Ports print/ghostscript9-agpl-x11 9.56.1 print hrs@freebsd.org
FreeBSD Ports print/ghostscript9-base 9.06 Potentially vulnerable print ports@freebsd.org
FreeBSD Ports print/ghostscript9-x11 9.06 Potentially vulnerable print ports@freebsd.org
FreeBSD Ports print/ghostscript8-base 8.71 Potentially vulnerable print ports@freebsd.org
FreeBSD Ports print/ghostscript8-x11 8.71 Potentially vulnerable print ports@freebsd.org
FreeBSD Ports print/ghostscript7-base 7.07 Potentially vulnerable print hrs@freebsd.org
FreeBSD Ports print/ghostscript7-commfont 7.07 Potentially vulnerable print hrs@freebsd.org
FreeBSD Ports print/ghostscript7-jpnfont 7.07 Potentially vulnerable print hrs@freebsd.org
FreeBSD Ports print/ghostscript7-korfont 7.07 Potentially vulnerable print hrs@freebsd.org
FreeBSD Ports print/ghostscript7-x11 7.07 Potentially vulnerable print hrs@freebsd.org
Gentoo app-text/ghostscript-gpl 10.01.0 app-text codec@gentoo.org, printing@gentoo.org
Gentoo app-text/ghostscript-gpl 10.0.0 app-text codec@gentoo.org, printing@gentoo.org
GNU Guix ghostscript-with-x 9.54.0 Potentially vulnerable - -
GNU Guix ghostscript 9.54.0 Potentially vulnerable - -
GNU Guix ghostscript-with-cups 9.54.0 Potentially vulnerable - -
GoboLinux Ghostscript 9.50 Potentially vulnerable - -
HaikuPorts master app-text/ghostscript_gpl 9.55.0 Potentially vulnerable app-text -
HaikuPorts master app-text/ghostscript_gpl 8.14 Potentially vulnerable app-text -
Homebrew ghostscript 10.01.1 - -
HP-UX 11.31
ia64_32
ghostscript 9.14.1 Potentially vulnerable - -
HP-UX 11.31
ia64_64
ghostscript 9.14.1 Potentially vulnerable - -
HP-UX 11.31
hppa_32
ghostscript 9.14.1 Potentially vulnerable - -
HP-UX 11.31
hppa_32
ghostscript 9.06.0 Potentially vulnerable - -
IBM i ghostscript 9.52 Potentially vulnerable Unspecified -
Kali Linux Rolling
main
ghostscript 10.0.0 text packages@qa.debian.org
KaOS
main
ghostscript 10.0.0 - demm@kaosx.us
KaOS Build
build
ghostscript 10.01.1 - demm@kaosx.us
LiGurOS stable app-text/ghostscript-gpl 10.0.0 app-text codec@gentoo.org, printing@gentoo.org
LiGurOS develop app-text/ghostscript-gpl 10.01.0 app-text codec@gentoo.org, printing@gentoo.org
LiGurOS develop app-text/ghostscript-gpl 10.0.0 app-text codec@gentoo.org, printing@gentoo.org
MacPorts ghostscript 9.56.1 print nomaintainer@macports.org
Mageia 7
core/updates
ghostscript 9.27 Potentially vulnerable Publishing -
Mageia 7
core/release
ghostscript 9.27 Potentially vulnerable Publishing -
Mageia 7
core/updates
ghostscript 9.27 Potentially vulnerable Publishing -
Mageia 7
core/updates
ghostscript 9.27 Potentially vulnerable Publishing -
Mageia 7
core/updates
ghostscript 9.27 Potentially vulnerable Publishing -
Mageia 8
core/updates
ghostscript 9.53.3 Potentially vulnerable Publishing -
Mageia 8
core/updates
ghostscript 9.53.3 Potentially vulnerable Publishing -
Mageia 8
core/updates
ghostscript 9.53.3 Potentially vulnerable Publishing -
Mageia 8
core/release
ghostscript 9.53.3 Potentially vulnerable Publishing -
Mageia Cauldron
core/release
ghostscript 10.00.0 Publishing -
Manjaro Stable
extra
ghostscript 10.0.0 - -
Manjaro Stable
extra
ghostpcl 10.0.0 - -
Manjaro Stable
extra
ghostxps 10.0.0 - -
Manjaro Testing
extra
ghostxps 10.01.1 - -
Manjaro Testing
extra
ghostpcl 10.01.1 - -
Manjaro Testing
extra
ghostscript 10.01.1 - -
Manjaro Unstable
extra
ghostpcl 10.01.1 - -
Manjaro Unstable
extra
ghostxps 10.01.1 - -
Manjaro Unstable
extra
ghostscript 10.01.1 - -
MidnightBSD mports print/ghostscript9-agpl-x11 9.56.1 print -
MidnightBSD mports print/ghostscript9-agpl-base 9.56.1 print -
MidnightBSD mports print/ghostscript9-base 9.06 Potentially vulnerable print -
MidnightBSD mports print/ghostscript9-x11 9.06 Potentially vulnerable print -
MidnightBSD mports print/ghostscript8-x11 8.71 Potentially vulnerable print -
MidnightBSD mports print/ghostscript8-base 8.71 Potentially vulnerable print -
MSYS2 mingw
x86_64
mingw-w64-x86_64-ghostscript 9.53.3 Potentially vulnerable - -
MSYS2 mingw
i686
mingw-w64-i686-ghostscript 9.53.3 Potentially vulnerable - -
nixpkgs stable 21.11 ghostscript 9.53.3 Potentially vulnerable - viric@viric.name
nixpkgs stable 21.11 ghostscript-with-X 9.53.3 Potentially vulnerable - viric@viric.name
nixpkgs stable 22.05 ghostscript-with-X 9.56.1 - viric@viric.name
nixpkgs stable 22.05 ghostscript-with-X 9.56.1 - viric@viric.name
nixpkgs stable 22.11 ghostscript-with-X 9.56.1 - viric@viric.name
nixpkgs stable 22.11 ghostscript-with-X 9.56.1 - viric@viric.name
nixpkgs unstable ghostscript-with-X 9.56.1 - viric@viric.name
nixpkgs unstable ghostscript-with-X 9.56.1 - viric@viric.name
nixpkgs unstable ghostscript 9.56.1 - viric@viric.name
Npackd Stable Ghostscript 10 Tools -
Npackd Stable Ghostscript 9.56.1 Tools -
Npackd Stable Ghostscript 9.56 Tools -
Npackd Stable Ghostscript 9.55 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.54 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.53.3 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.53.2 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.52 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.51 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.50 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.27 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.26 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.25 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.24 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.23 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.22 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.21 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.20 Potentially vulnerable Tools -
Npackd Stable Ghostscript 9.19 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 10 Tools -
Npackd Stable64 Ghostscript 64 bit 9.56.1 Tools -
Npackd Stable64 Ghostscript 64 bit 9.56 Tools -
Npackd Stable64 Ghostscript 64 bit 9.55 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.54 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.53.3 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.52 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.51 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.50 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.27 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.26 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.25 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.24 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.23 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.22 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.21 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.20 Potentially vulnerable Tools -
Npackd Stable64 Ghostscript 64 bit 9.19 Potentially vulnerable Tools -
OpenBSD Ports print/ghostscript/gnu 10.0.0 lang openbsd-ports@schlecht.dev
OpenBSD Ports print/ghostscript/gnu 10.0.0 lang openbsd-ports@schlecht.dev
OpenBSD Ports print/ghostscript/gnu 10.0.0 lang openbsd-ports@schlecht.dev
OpenBSD Ports print/ghostscript/gnu 10.0.0 lang openbsd-ports@schlecht.dev
OpenBSD Ports print/ghostscript/gnu 10.0.0 lang openbsd-ports@schlecht.dev
OpenBSD Ports print/ghostscript/gnu 10.0.0 lang openbsd-ports@schlecht.dev
openEuler 20.03
source
ghostscript 9.27 Potentially vulnerable Unspecified -
openEuler 22.03
source
ghostscript 9.55.0 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
ghostscript 10.0.0 System/Printing -
OpenIndiana packages
hipster
ghostscript 10.0.0 System/Printing -
OpenIndiana packages
hipster
ghostscript 9.26 Potentially vulnerable System/Printing -
openmamba
devel-autodist
ghostscript 10.0.0 Applications/Publishing silvan.calarco@mambasoft.it
openmamba
devel
ghostscript 9.56.1 Applications/Publishing silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
ghostscript 9.26 Potentially vulnerable Publishing bero@lindev.ch
OpenMandriva 4.1
main/release
ghostscript 9.26 Potentially vulnerable Publishing nobodydead@gmail.com
OpenMandriva 4.2
main/release
ghostscript 9.53.3 Potentially vulnerable Publishing bero@lindev.ch
OpenMandriva 4.3
main/release
ghostscript 9.53.3 Potentially vulnerable Publishing tpgxyz@gmail.com
OpenMandriva Rolling
main/release
ghostscript 10.01.0-rc2 Publishing bero@lindev.ch
OpenMandriva Cooker
main/release
ghostscript 10.01.0 Publishing bero@lindev.ch
OpenPKG ghostscript 9.56.1 Postscript -
openSUSE Leap 42.3
updates/oss
ghostscript 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript-mini 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript-mini 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript 9.26 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript-mini 9.26 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript 9.25 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript-mini 9.25 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript 9.15 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript 9.15 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript-mini 9.15 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
updates/oss
ghostscript-mini 9.15 Potentially vulnerable System/Libraries -
openSUSE Leap 42.3
main/oss
ghostscript 9.15 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript 9.27 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript 9.27 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript-mini 9.27 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript-mini 9.27 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript-mini 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript-mini 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript-mini 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript 9.26 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript-mini 9.26 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript 9.25 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript-mini 9.25 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
main/oss
ghostscript 9.23 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript 9.23 Potentially vulnerable System/Libraries -
openSUSE Leap 15.0
updates/oss
ghostscript-mini 9.23 Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
updates/oss
ghostscript 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
updates/oss
ghostscript 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
updates/oss
ghostscript-mini 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
updates/oss
ghostscript-mini 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
updates/oss
ghostscript 9.27 Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
updates/oss
ghostscript 9.27 Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
updates/oss
ghostscript-mini 9.27 Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
updates/oss
ghostscript-mini 9.27 Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
updates/oss
ghostscript 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
updates/oss
ghostscript-mini 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 15.1
main/oss
ghostscript 9.26a Potentially vulnerable System/Libraries -
openSUSE Leap 15.2
updates/oss
ghostscript 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.2
main/oss
ghostscript 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.2
updates/oss
ghostscript 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.2
updates/oss
ghostscript-mini 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.2
updates/oss
ghostscript-mini 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.3
main/oss
ghostscript 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.4
main/oss
ghostscript 9.52 Potentially vulnerable System/Libraries -
openSUSE Leap 15.5
main/oss
ghostscript 9.52 Potentially vulnerable System/Libraries -
openSUSE Tumbleweed
src-oss
ghostscript 9.56.1 Productivity/Office/Other -
Parabola
extra
ghostscript 10.01.1 - -
Parabola
extra
ghostpcl 10.01.1 - -
Parabola
extra
ghostxps 10.01.1 - -
Pardus 17
updates/main
ghostscript 9.26a Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
updates/main
ghostscript 9.26a Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
updates/main
ghostscript 9.26a Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
updates/main
ghostscript 9.26a Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
updates/main
ghostscript 9.26a Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
main
ghostscript 9.26a Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
updates/main
ghostscript 9.26 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
updates/main
ghostscript 9.26 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
updates/main
ghostscript 9.25 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
updates/main
ghostscript 9.20 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
updates/main
ghostscript 9.20 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 17
updates/main
ghostscript 9.20 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 19
main
ghostscript 9.27 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 19
updates/main
ghostscript 9.27 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Pardus 21
updates/main
ghostscript 9.53.3 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk
Pardus 21
main
ghostscript 9.53.3 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk
Parrot
parrot-updates/main
ghostscript 9.53.3 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk
Parrot
parrot/main
ghostscript 9.53.3 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk
PCLinuxOS ghostscript 9.22 Potentially vulnerable System/Libraries -
Pisi Linux
main
ghostscript 9.53 Potentially vulnerable library admins@pisilinux.org
pkgsrc current print/ghostscript-agpl 10.0.0 print pkgsrc-users@netbsd.org
pkgsrc current print/ghostscript-gpl 9.06 Potentially vulnerable print pkgsrc-users@netbsd.org
pkgsrc current print/ghostscript 9.05 Potentially vulnerable print pkgsrc-users@netbsd.org
PLD Linux ghostscript 9.56.1 - -
PureOS Amber ghostscript 9.27 Potentially vulnerable misc debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
PureOS Amber ghostscript 9.27 Potentially vulnerable misc debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
PureOS landing ghostscript 9.53.3 Potentially vulnerable misc debian-printing@lists.debian.org, dr@jones.dk
Raspbian Oldstable
main
ghostscript 9.27 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Raspbian Stable
main
ghostscript 9.53.3 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk
Raspbian Testing
main
ghostscript 10.0.0 text packages@qa.debian.org
Ravenports ghostscript 10.00.0 print fallback-mnt-ravenports@repology
ReactOS rapps Ghostscript 9.23 Potentially vulnerable - -
Rocky Linux 8
AppStream
ghostscript 9.27 Potentially vulnerable Unspecified infrastructure@rockylinux.org
Rocky Linux 9
AppStream
ghostscript 9.54.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rocky Linux 9
CRB
ghostscript 9.54.0 Potentially vulnerable Unspecified releng@rockylinux.org
Rosa 2014.1
main/updates
ghostscript 9.14 Potentially vulnerable - -
Rosa 2014.1
main/release
ghostscript 9.14 Potentially vulnerable - -
Rosa 2016.1
main/updates
ghostscript 9.27 Potentially vulnerable - -
Rosa 2016.1
main/release
ghostscript 9.19 Potentially vulnerable - -
Rosa 2021.1
main/release
ghostscript 9.54.0 Potentially vulnerable Publishing s.matveev@rosalinux.ru
Rosa Server 6.9
base/release
ghostscript 8.70 Potentially vulnerable Applications/Publishing andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
ghostscript 8.70 Potentially vulnerable Applications/Publishing andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
ghostscript 9.07 Potentially vulnerable Applications/Publishing alex2048@mail.ru
Rosa Server 7.5
base/release
ghostscript 9.07 Potentially vulnerable Applications/Publishing alex2048@mail.ru
Rosa Server 7.5
base/release
ghostscript 9.07 Potentially vulnerable Applications/Publishing alex2048@mail.ru
Scientific Linux 7.x ghostscript 9.25 Potentially vulnerable Unspecified -
Scientific Linux 7.x ghostscript 9.25 Potentially vulnerable Unspecified -
Scientific Linux 7.x ghostscript 9.25 Potentially vulnerable Unspecified -
Scientific Linux 7.x ghostscript 9.25 Potentially vulnerable Unspecified -
Scientific Linux 7.x ghostscript 9.25 Potentially vulnerable Unspecified -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scientific Linux 7.x ghostscript 9.07 Potentially vulnerable Applications/Publishing -
Scoop
main
ghostscript 10.01.1 - -
Slackware 14.2
patches
ghostscript 9.26 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
ghostscript 9.19 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
ghostscript 9.55.0 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
ghostscript 9.56.1 - volkerdi@slackware.com
Slackware64 14.2
patches
ghostscript 9.26 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
ghostscript 9.19 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
ghostscript 9.55.0 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
ghostscript 9.56.1 - volkerdi@slackware.com
Slackwarearm 14.2
patches
ghostscript 9.26 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
ghostscript 9.19 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
ghostscript 9.55.0 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking ghostscript 9.55.0 Potentially vulnerable office jozee@slitaz.org
SliTaz Cooking ghostscript-dev 9.55.0 Potentially vulnerable development jozee@slitaz.org
SliTaz Next ghostscript 9.22 Potentially vulnerable office devel@slitaz.org
SliTaz Next ghostscript-dev 9.22 Potentially vulnerable development devel@slitaz.org
SliTaz Next ghostscript 9.22 Potentially vulnerable office devel@slitaz.org
SliTaz Next ghostscript-dev 9.22 Potentially vulnerable development devel@slitaz.org
Spack ghostscript 10.0.0 - fallback-mnt-spack@repology
T2 SDE ghostscript 9.56.1 extra/printing extra/office jsaw@gmx.net
Termux ghostscript 10.01.0 - termux@github
Trisquel 6.0
toutatis-updates/main
ghostscript 9.05 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Trisquel 6.0
toutatis-security/main
ghostscript 9.05 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Trisquel 6.0
toutatis/main
ghostscript 9.05 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Trisquel 7.0
belenos-updates/main
ghostscript 9.26+0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Trisquel 7.0
belenos-security/main
ghostscript 9.26+0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Trisquel 7.0
belenos/main
ghostscript 9.10 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Trisquel 8.0
flidas-updates/main
ghostscript 9.26+0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Trisquel 8.0
flidas-security/main
ghostscript 9.26+0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Trisquel 8.0
flidas/main
ghostscript 9.18~0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Trisquel 9.0
etiona-updates/main
ghostscript 9.26+0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Trisquel 9.0
etiona-security/main
ghostscript 9.26+0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Trisquel 9.0
etiona/main
ghostscript 9.22+1 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Trisquel 10.0
nabia/main
ghostscript 9.50 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Trisquel 10.0
nabia-security/main
ghostscript 9.50 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Trisquel 10.0
nabia-updates/main
ghostscript 9.50 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Trisquel 11.0
aramo-updates/main
ghostscript 9.55.0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk
Trisquel 11.0
aramo-security/main
ghostscript 9.55.0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk
Trisquel 11.0
aramo/main
ghostscript 9.55.0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk
UBI 8
appstream
ghostscript 9.27 Potentially vulnerable Unspecified -
Ubuntu 14.04
trusty-updates/main
ghostscript 9.26+0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Ubuntu 14.04
trusty/main
ghostscript 9.10 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Ubuntu 16.04
xenial-updates/main
ghostscript 9.26+0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Ubuntu 16.04
xenial/main
ghostscript 9.18~0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, michael.s.gilbert@gmail.com
Ubuntu 18.04
bionic-updates/main
ghostscript 9.26+0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Ubuntu 18.04
bionic/main
ghostscript 9.22+1 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Ubuntu 20.04
focal/main
ghostscript 9.50 Potentially vulnerable text debian-printing@lists.debian.org, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Ubuntu 20.04
focal-updates/main
ghostscript 9.50 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk, mgilbert@debian.org, roucaries.bastien+debian@gmail.com
Ubuntu 22.04
jammy/main
ghostscript 9.55.0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk
Ubuntu 22.04
jammy-updates/main
ghostscript 9.55.0 Potentially vulnerable text ubuntu-devel-discuss@lists.ubuntu.com, dr@jones.dk
Ubuntu 22.10
kinetic/main
ghostscript 9.56.1 text dr@jones.dk
Ubuntu 23.04
lunar/main
ghostscript 10.0.0 text packages@qa.debian.org
Void Linux x86_64
x86_64
ghostscript 10.0.0 - orphan@voidlinux.org
Void Linux x86_64
x86_64
ghostscript-devel 10.0.0 - orphan@voidlinux.org
Void Linux x86_64
x86_64
libgs 10.0.0 - orphan@voidlinux.org
Void Linux x86_64
x86_64
libijs 10.0.0 - orphan@voidlinux.org
Wikidata Ghostscript 10.01.0 - -
winget GPL Ghostscript 10.00.0 pdf -
winget GPL Ghostscript 9.56.1 pdf -
winget GPL Ghostscript 9.56.0 pdf -
winget GPL Ghostscript 9.55.0 Potentially vulnerable pdf -
winget GPL Ghostscript 9.54.0 Potentially vulnerable pdf -
winget GhostScript 9.53.3 Potentially vulnerable pdf -
winget GhostScript 9.53.2 Potentially vulnerable pdf -
winget GhostScript 9.53.1 Potentially vulnerable pdf -
winget GhostScript 9.53 Potentially vulnerable pdf -
winget GhostScript 9.52 Potentially vulnerable pdf-tools -
yiffOS Knot ghostscript 9.56.1 - evie@eviee.gay