- Issued:
- 2008-05-21
- Updated:
- 2008-05-21
RHBA-2008:0067 - Bug Fix Advisory
Synopsis
a2ps bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated a2ps package that fixes a bug is now available.
Description
The a2ps filter converts text and other types of files to PostScript(TM).
When processing PostScript files, the output file rendered as though the
input file were plain text, instead of PostScript. For example, running
the "a2ps -o output.ps [/path/to/postscript/file.ps]" command, where
"[/path/to/postscript/file.ps]" is the path to a PostScript file, created
an "output.ps" file that contained PostScript code in plain text, instead
of a correctly rendered PostScript file.
All a2ps users are advised to upgrade to this updated package, which
resolves this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 241855 - a2ps process postscript as text
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
a2ps-4.13b-57.2.el5.src.rpm | SHA-256: 95153c32493c7bc87e46345a18826e9a9d8b39a94ecd9df7183e6563eb1cbdce |
x86_64 | |
a2ps-4.13b-57.2.el5.x86_64.rpm | SHA-256: 041d5a80ee5452d3194cd0af37149c9d5a91fc9c2f0a936a7962fdeb704f5d35 |
ia64 | |
a2ps-4.13b-57.2.el5.ia64.rpm | SHA-256: a4795fd036a7c267a8dc95db264fed597ee6133baa7e060144b3707e2f29e556 |
i386 | |
a2ps-4.13b-57.2.el5.i386.rpm | SHA-256: 34b58d1ea66bba05fe31f33cd37d80e0a8a5ac22e293ea49bcd9577e5d7ea83d |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
a2ps-4.13b-57.2.el5.src.rpm | SHA-256: 95153c32493c7bc87e46345a18826e9a9d8b39a94ecd9df7183e6563eb1cbdce |
x86_64 | |
a2ps-4.13b-57.2.el5.x86_64.rpm | SHA-256: 041d5a80ee5452d3194cd0af37149c9d5a91fc9c2f0a936a7962fdeb704f5d35 |
i386 | |
a2ps-4.13b-57.2.el5.i386.rpm | SHA-256: 34b58d1ea66bba05fe31f33cd37d80e0a8a5ac22e293ea49bcd9577e5d7ea83d |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
a2ps-4.13b-57.2.el5.src.rpm | SHA-256: 95153c32493c7bc87e46345a18826e9a9d8b39a94ecd9df7183e6563eb1cbdce |
x86_64 | |
a2ps-4.13b-57.2.el5.x86_64.rpm | SHA-256: 041d5a80ee5452d3194cd0af37149c9d5a91fc9c2f0a936a7962fdeb704f5d35 |
i386 | |
a2ps-4.13b-57.2.el5.i386.rpm | SHA-256: 34b58d1ea66bba05fe31f33cd37d80e0a8a5ac22e293ea49bcd9577e5d7ea83d |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
a2ps-4.13b-57.2.el5.src.rpm | SHA-256: 95153c32493c7bc87e46345a18826e9a9d8b39a94ecd9df7183e6563eb1cbdce |
s390x | |
a2ps-4.13b-57.2.el5.s390x.rpm | SHA-256: 13368b96e3dfd32e476e334df6a8a21ffc6233eb1591d40ac7b2b097a8c46d87 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
a2ps-4.13b-57.2.el5.src.rpm | SHA-256: 95153c32493c7bc87e46345a18826e9a9d8b39a94ecd9df7183e6563eb1cbdce |
ppc | |
a2ps-4.13b-57.2.el5.ppc.rpm | SHA-256: 1785357a0fedf8674483a7ee1998ece2b5d1f806c25299da161370c32312ecbf |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
a2ps-4.13b-57.2.el5.src.rpm | SHA-256: 95153c32493c7bc87e46345a18826e9a9d8b39a94ecd9df7183e6563eb1cbdce |
x86_64 | |
a2ps-4.13b-57.2.el5.x86_64.rpm | SHA-256: 041d5a80ee5452d3194cd0af37149c9d5a91fc9c2f0a936a7962fdeb704f5d35 |
i386 | |
a2ps-4.13b-57.2.el5.i386.rpm | SHA-256: 34b58d1ea66bba05fe31f33cd37d80e0a8a5ac22e293ea49bcd9577e5d7ea83d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.