Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libgs-devel | Distribution: CentOS |
Version: 10.02.1 | Vendor: CentOS |
Release: 16.el10 | Build date: Wed May 7 14:35:46 2025 |
Group: Unspecified | Build host: x86-05.stream.rdu2.redhat.com |
Size: 52364 | Source RPM: ghostscript-10.02.1-16.el10.src.rpm |
Packager: builder@centos.org | |
Url: https://ghostscript.com/ | |
Summary: Development files for Ghostscript's library |
This package contains development files that are useful for building packages against Ghostscript's library, which provides Ghostscript's core functionality.
AGPL-3.0-or-later
* Wed May 07 2025 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-16 - RHEL-88964 CVE-2025-27832 ghostscript: NPDL device: Compression buffer overflow * Tue Apr 15 2025 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-15 - RHEL-67044 CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space - RHEL-67050 CVE-2024-46952 ghostscript: Buffer Overflow in Ghostscript PDF XRef Stream Handling - RHEL-67050 CVE-2024-46954 ghostscript: Directory Traversal in Ghostscript via Overlong UTF-8 Encoding - RHEL-67050 CVE-2024-46953 ghostscript: Path Traversal and Code Execution via Integer Overflow in Ghostscript - RHEL-67050 CVE-2024-46956 ghostscript: Out-of-Bounds Data Access in Ghostscript Leads to Arbitrary Code Execution * Tue Oct 29 2024 Troy Dawson <tdawson@redhat.com> - 10.02.1-14 - Bump release for October 2024 mass rebuild: Resolves: RHEL-64018 * Wed Jul 17 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-13 - RHEL-46575 CVE-2024-33869 ghostscript: path traversal and command execution due to path reduction * Tue Jul 16 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-12 - RHEL-46149 CVE-2024-29509 ghostscript: heap buffer overflow via the PDFPassword parameter - RHEL-46131 CVE-2024-29508 ghostscript: heap pointer leak in pdf_base_font_alloc() - RHEL-46112 CVE-2024-29507 ghostscript: stack-based buffer overflow via the CIDFSubstPath and CIDFSubstFont parameters - RHEL-46076 CVE-2024-29506 ghostscript: stack-based buffer overflow in the pdfi_apply_filter() - RHEL-44727 CVE-2024-29510 ghostscript: format string injection leads to shell command execution (SAFER bypass) * Thu Jul 11 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-12 - RHEL-44771 CVE-2024-33870 ghostscript: path traversal to arbitrary files if the current directory is in the permitted paths * Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com> - 10.02.1-11 - Bump release for June 2024 mass rebuild * Fri Jun 21 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-10 - RHEL-38835 run the package with correct tests * Thu Jun 20 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-9 - RHEL-38835 CVE-2024-33871 ghostscript: OPVP device arbitrary code execution via custom Driver library * Wed Jan 24 2024 Fedora Release Engineering <releng@fedoraproject.org> - 10.02.1-8 - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild * Mon Jan 22 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-7 - fix rpmlint errors * Sat Jan 20 2024 Michael J Gruber <mjg@fedoraproject.org> - 10.02.1-7 - fix another FTBFS with GCC 14 * Fri Jan 19 2024 Fedora Release Engineering <releng@fedoraproject.org> - 10.02.1-6 - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild * Tue Jan 09 2024 Zdenek Dohnal <zdohnal@redhat.com> - 10.02.1-5 - fix FTBFS with GCC 14 * Tue Nov 07 2023 Michael J Gruber <mjg@fedoraproject.org> - 10.02.1-4 - fix txtwrite device and /selectdevice * Tue Nov 07 2023 Michael J Gruber <mjg@fedoraproject.org> - 10.02.1-3 - revert/adjust spec change for jbig2dec 0.20 and fix FTI (rhbz#2248557) * Tue Nov 07 2023 Richard Lescak <rlescak@redhat.com> - 10.02.1-2 - change jbig2dec requirement to >= 0.19 * Mon Nov 06 2023 Richard Lescak <rlescak@redhat.com> - 10.02.1-1 - rebase to version 10.02.1 (#2238724) * Wed Oct 11 2023 Richard Lescak <rlescak@redhat.com> - 10.01.2-4 - fix for CVE-2023-43115 (#2241112) * Mon Aug 07 2023 Richard Lescak <rlescak@redhat.com> - 10.01.2-3 - fix for CVE-2023-38559 (#2225380) * Wed Jul 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 10.01.2-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild * Fri Jul 14 2023 Michael J Gruber <mjg@fedoraproject.org> - 10.01.2-1 - rebase to bugfix release 10.01.2 (rhbz#2182090) - fix for CVE-2023-36664 (rhbz#2217806)
/usr/include/ghostscript /usr/include/ghostscript/gdevdsp.h /usr/include/ghostscript/gserrors.h /usr/include/ghostscript/iapi.h /usr/include/ghostscript/ierrors.h /usr/lib64/libgs.so
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed May 21 03:34:15 2025