- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1257 - Bug Fix Advisory
Synopsis
ghostscript bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
A ghostscript update that fixes several bugs is now available.
Description
The Ghostscript suite provides a PostScript(TM) interpreter, a set of C
procedures (the Ghostscript library, which implements the graphics
capabilities in the PostScript language), and an interpreter for PDF files.
Ghostscript translates PostScript code into many common, bitmapped formats,
like those understood by most printers and displays. This enables users to
display PostScript files and print them on non-PostScript printers.
This update applies the following fixes:
- an incorrect offset computation that occurred when handling subglyphs
made it possible for ghostscript to read uninitialized data. When this
occurred, ghostscript would crash with a segmentation fault. This update
corrects the offset computation, preventing ghostscript from reading
uninitialized data. (BZ#450717)
- the way that the Ghostscript source code used pointer aliasing could
produce unexpected results when strict aliasing optimizations are in use.
To avoid problems, this ghostscript update was built using the
- fno-strict-aliasing option, which disables strict aliasing optimization.
(BZ#465960)
- a typographical error in the gsiparam.h header file made it possible for
some PDF files to cause ghostscript to fall into an infinite loop. This
update fixes the error. (BZ#473889)
- the gdevpsu.c source file incorrectly defined the point size of A3 pages,
which sometimes resulted in incorrect document page sizes. This update
fixes the point size definition error , ensuring that A3 pages are always
printed with the correct size. (BZ#480978)
- this update corrects how the cvrs PostScript operator performs sign
extensions. This fix prevents range errors from occurring on 64-bit
platforms. (BZ#488127)
- this update also fixes ColorSpace initialization in the InkJet Server
(IJS) driver, which is used by hpijs and gimp-print drivers in some
configurations. In previous releases, print jobs that did not initialize
ColorSpace failed whenever they used Ghostscript to render and print PDFs
on devices that used the ijs driver. (BZ#504254)
Users of ghostscript are advised to apply this update.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 450717 - ghostscript segfaults, can't print
- BZ - 465960 - build with -fno-strict-aliasing
- BZ - 473889 - ghostscript hangs on some PDF files
- BZ - 480978 - A3 pagesize pointsize definition wrong in gdevpsu.c
- BZ - 488127 - [RHEL5] ghostscript /rangecheck in --cvrs--
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
ghostscript-8.15.2-9.11.el5.src.rpm | SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4 |
x86_64 | |
ghostscript-8.15.2-9.11.el5.i386.rpm | SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c |
ghostscript-8.15.2-9.11.el5.x86_64.rpm | SHA-256: b2049494b4924c9b23e72bcc716ce2688b12ebf27029e3e84731eb00928991ba |
ghostscript-devel-8.15.2-9.11.el5.i386.rpm | SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74 |
ghostscript-devel-8.15.2-9.11.el5.x86_64.rpm | SHA-256: a920f4f35a015a87c413f29c7c7640cbbe54a6480b7ddb2436a73c409e0d0c33 |
ghostscript-gtk-8.15.2-9.11.el5.x86_64.rpm | SHA-256: ec3ad35dbcdc1a0f60d889a45037b597f9312831e0a36bca7bbf3ea0517b0f48 |
ia64 | |
ghostscript-8.15.2-9.11.el5.ia64.rpm | SHA-256: 5c1ac79392b43367ad3d66218b5f6e2d418c83578189b5117aa4db3cb48c9bda |
ghostscript-devel-8.15.2-9.11.el5.ia64.rpm | SHA-256: 14d20818d9e8221fe70fd65f175e8a0e153d4c1ad9b3d03fcf169f523838fa7a |
ghostscript-gtk-8.15.2-9.11.el5.ia64.rpm | SHA-256: b5203b6cf50ca3c8460d85250a1a150ee95aa56b162629b01bfe50068fa6fb23 |
i386 | |
ghostscript-8.15.2-9.11.el5.i386.rpm | SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c |
ghostscript-devel-8.15.2-9.11.el5.i386.rpm | SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74 |
ghostscript-gtk-8.15.2-9.11.el5.i386.rpm | SHA-256: 76e17f824118ed0da115c764d17efce6db22c6347425c6830b1783c168a58231 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
ghostscript-8.15.2-9.11.el5.src.rpm | SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4 |
x86_64 | |
ghostscript-8.15.2-9.11.el5.i386.rpm | SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c |
ghostscript-8.15.2-9.11.el5.x86_64.rpm | SHA-256: b2049494b4924c9b23e72bcc716ce2688b12ebf27029e3e84731eb00928991ba |
ghostscript-devel-8.15.2-9.11.el5.i386.rpm | SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74 |
ghostscript-devel-8.15.2-9.11.el5.x86_64.rpm | SHA-256: a920f4f35a015a87c413f29c7c7640cbbe54a6480b7ddb2436a73c409e0d0c33 |
ghostscript-gtk-8.15.2-9.11.el5.x86_64.rpm | SHA-256: ec3ad35dbcdc1a0f60d889a45037b597f9312831e0a36bca7bbf3ea0517b0f48 |
i386 | |
ghostscript-8.15.2-9.11.el5.i386.rpm | SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c |
ghostscript-devel-8.15.2-9.11.el5.i386.rpm | SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74 |
ghostscript-gtk-8.15.2-9.11.el5.i386.rpm | SHA-256: 76e17f824118ed0da115c764d17efce6db22c6347425c6830b1783c168a58231 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
ghostscript-8.15.2-9.11.el5.src.rpm | SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4 |
x86_64 | |
ghostscript-8.15.2-9.11.el5.i386.rpm | SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c |
ghostscript-8.15.2-9.11.el5.x86_64.rpm | SHA-256: b2049494b4924c9b23e72bcc716ce2688b12ebf27029e3e84731eb00928991ba |
ghostscript-gtk-8.15.2-9.11.el5.x86_64.rpm | SHA-256: ec3ad35dbcdc1a0f60d889a45037b597f9312831e0a36bca7bbf3ea0517b0f48 |
i386 | |
ghostscript-8.15.2-9.11.el5.i386.rpm | SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c |
ghostscript-gtk-8.15.2-9.11.el5.i386.rpm | SHA-256: 76e17f824118ed0da115c764d17efce6db22c6347425c6830b1783c168a58231 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
ghostscript-8.15.2-9.11.el5.src.rpm | SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4 |
s390x | |
ghostscript-8.15.2-9.11.el5.s390.rpm | SHA-256: 207918309a255f4a10c7bfa3caf80e7815e0787847c401d5f42cfd508c31e10e |
ghostscript-8.15.2-9.11.el5.s390x.rpm | SHA-256: 54d9728a5934ebd9ab129d19700f4ca63a9bf0dea1438afc1b80e29ee8451241 |
ghostscript-devel-8.15.2-9.11.el5.s390.rpm | SHA-256: 3424c15ed330eae8bf938fbe0870a61ffe6a49876ed0c3de8b8cc64766dabef0 |
ghostscript-devel-8.15.2-9.11.el5.s390x.rpm | SHA-256: 3ccdea14befa4cb82f677a066cb0cd4d38f71adc389496404042c496bd282da2 |
ghostscript-gtk-8.15.2-9.11.el5.s390x.rpm | SHA-256: dcafdbc71396b48dad43f9ae0250d6cd42b1788a17388906292b97a2c70b31e2 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
ghostscript-8.15.2-9.11.el5.src.rpm | SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4 |
ppc | |
ghostscript-8.15.2-9.11.el5.ppc.rpm | SHA-256: 204cf24e37ed2b4541c26a5eff1bef2541fe075b7d5cd47618c83b0e60d372ca |
ghostscript-8.15.2-9.11.el5.ppc64.rpm | SHA-256: 69489caed74582eb6f92a1ae2119831186382cac413d4b59ad5d16006c725e75 |
ghostscript-devel-8.15.2-9.11.el5.ppc.rpm | SHA-256: 9a765fca99035924be93a3f2cb21dff9dd10a69c899bd74fa96e9970170bbd93 |
ghostscript-devel-8.15.2-9.11.el5.ppc64.rpm | SHA-256: 1b5de688fef17b792750b8dc1140dce26d52199282d998e1ce1293d5b1203785 |
ghostscript-gtk-8.15.2-9.11.el5.ppc.rpm | SHA-256: 05cd881411d23850171af4bd0ec1cbc20d83eefbaef994a3058e7d4765aeb8c7 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
ghostscript-8.15.2-9.11.el5.src.rpm | SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4 |
x86_64 | |
ghostscript-8.15.2-9.11.el5.i386.rpm | SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c |
ghostscript-8.15.2-9.11.el5.x86_64.rpm | SHA-256: b2049494b4924c9b23e72bcc716ce2688b12ebf27029e3e84731eb00928991ba |
ghostscript-devel-8.15.2-9.11.el5.i386.rpm | SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74 |
ghostscript-devel-8.15.2-9.11.el5.x86_64.rpm | SHA-256: a920f4f35a015a87c413f29c7c7640cbbe54a6480b7ddb2436a73c409e0d0c33 |
ghostscript-gtk-8.15.2-9.11.el5.x86_64.rpm | SHA-256: ec3ad35dbcdc1a0f60d889a45037b597f9312831e0a36bca7bbf3ea0517b0f48 |
i386 | |
ghostscript-8.15.2-9.11.el5.i386.rpm | SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c |
ghostscript-devel-8.15.2-9.11.el5.i386.rpm | SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74 |
ghostscript-gtk-8.15.2-9.11.el5.i386.rpm | SHA-256: 76e17f824118ed0da115c764d17efce6db22c6347425c6830b1783c168a58231 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.