Skip to navigation

Bug Fix Advisory ghostscript bug fix update

Advisory: RHBA-2010:0646-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-08-24
Last updated on: 2010-08-24
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated ghostscript packages that fix various bugs and add an enhancement are
now available.

The Ghostscript suite provides a PostScript(TM) interpreter, a set of C
procedures (the Ghostscript library, which implements the graphics capabilities
in the PostScript language), and an interpreter for PDF files. Ghostscript
translates PostScript code into many common, bitmapped formats, like those
understood by most printers and displays. This enables users to display
PostScript files and print them on non-PostScript printers.

This update fixes the following bug:

* due to the incorrect page size handling, converting a PDF file to PostScript
may have caused the correct page size information to be lost. As a result, the
printed output may have been misplaced or partially visible only. With this
update, the conversion from PDF to PostScript works as expected. (BZ#592962)

All users of Ghostscript are advised to upgrade to these updated packages, which
resolve this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
ghostscript-8.15.2-9.12.el5_5.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: fb0be5a6fbcf4998edcdcfa92a186e39
SHA-256: db865b32e477486e452fc975e1ed0a0a1bbff07aa1c17e5cff57057a8e073814
 
IA-32:
ghostscript-devel-8.15.2-9.12.el5_5.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: c189bc6a025acf42e8169e61e95073bd
SHA-256: 6352add7e45b70ff19c7d89536049e3e72bcc795e8c0936c166948bf289398d3
 
x86_64:
ghostscript-devel-8.15.2-9.12.el5_5.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: c189bc6a025acf42e8169e61e95073bd
SHA-256: 6352add7e45b70ff19c7d89536049e3e72bcc795e8c0936c166948bf289398d3
ghostscript-devel-8.15.2-9.12.el5_5.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: b57f2957aff956f91ce03a506f031bef
SHA-256: a2567bf197133a96c660b0690bc6eab677ab88e58007d96e6df1374b06b743e8
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ghostscript-8.15.2-9.12.el5_5.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: fb0be5a6fbcf4998edcdcfa92a186e39
SHA-256: db865b32e477486e452fc975e1ed0a0a1bbff07aa1c17e5cff57057a8e073814
 
IA-32:
ghostscript-8.15.2-9.12.el5_5.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: 92a18808cf47664c3922487112b5333c
SHA-256: 82905b8e0da8fe93a1a06bbbe9d47ba512e93664745be55baca0346973016dd5
ghostscript-devel-8.15.2-9.12.el5_5.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: c189bc6a025acf42e8169e61e95073bd
SHA-256: 6352add7e45b70ff19c7d89536049e3e72bcc795e8c0936c166948bf289398d3
ghostscript-gtk-8.15.2-9.12.el5_5.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: 69769c484dafea59171b1376d22cad07
SHA-256: 3acb5d85bb010d1b1bee38ef4b32b16fcc9ee20d2d48696cb52af0ad4558bcc8
 
IA-64:
ghostscript-8.15.2-9.12.el5_5.ia64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 5ae9f6581742665042329a817bb35a3d
SHA-256: b493b2a95aec6b87b70727da6542df1fc9e1c3b066a116ee06af328fdfa02066
ghostscript-devel-8.15.2-9.12.el5_5.ia64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 60e494fe4221f8419369367ee2535dc2
SHA-256: bc128a9780051fb8310af88d7b82e8901d9a68c46fd5af3c29802529e41cf92f
ghostscript-gtk-8.15.2-9.12.el5_5.ia64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 4aae028fc16ff52a19f2dea853ee52de
SHA-256: e2fe6028aadcd7d5c4f6a8fcc96c9ffd5743c7e3463777317e2784991df865dc
 
PPC:
ghostscript-8.15.2-9.12.el5_5.ppc.rpm
File outdated by:  RHBA-2013:1277
    MD5: d5fd9a91837a53a9dfea29ce939356c7
SHA-256: 348086aa3fd7fdb485c639b6bff04b8642e3fd18c817b7967d633b11d2e3b201
ghostscript-8.15.2-9.12.el5_5.ppc64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 00d932c0afe3ff6a84e86b2af71f2e9a
SHA-256: b1ad53dd20b6d7bd7c513b9a987dd3cbbb901b71ef765108fc0fd3dd25af384e
ghostscript-devel-8.15.2-9.12.el5_5.ppc.rpm
File outdated by:  RHBA-2013:1277
    MD5: 2c3316f577aeb8e7cdd2bd1629b711e5
SHA-256: 8f1057db3300702f722a92c180713ed0da87a0234e31cf85ab16b76e7977bfbb
ghostscript-devel-8.15.2-9.12.el5_5.ppc64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 1924849f8ca25afc9a4a3fc0741ec1d7
SHA-256: e051bb74fc510cf6fce4420aeed6f89f03f918f5be664cf0aef5e0c76e83c030
ghostscript-gtk-8.15.2-9.12.el5_5.ppc.rpm
File outdated by:  RHBA-2013:1277
    MD5: a7999729666933f308d22bacbde3ceeb
SHA-256: 221c19f7c916d159fe81f8b24ba263b87f37f0394b53c3802b1707d74aa90ac2
 
s390x:
ghostscript-8.15.2-9.12.el5_5.s390.rpm
File outdated by:  RHBA-2013:1277
    MD5: 3a30291b9ee0b6e36dfa167172d8c580
SHA-256: 62453522f915e0439912dd538f2b0720fb08ac08a17c8502f4fd38b8eb36ecf0
ghostscript-8.15.2-9.12.el5_5.s390x.rpm
File outdated by:  RHBA-2013:1277
    MD5: 58a40403678e0e3fe255638d601ab1c3
SHA-256: 3a018da8ceade0e0a7f8a4abcb3a8eed57e608a7c651f1b346bfc3db7bc86b50
ghostscript-devel-8.15.2-9.12.el5_5.s390.rpm
File outdated by:  RHBA-2013:1277
    MD5: e5c0f9b97c4bb509869a66559952ec06
SHA-256: 254dde58f3c9796fe2ae4973c42148ae8ec3338d8c98e9d00d248bd022608479
ghostscript-devel-8.15.2-9.12.el5_5.s390x.rpm
File outdated by:  RHBA-2013:1277
    MD5: f8de053125b1613bae64752581c60e7d
SHA-256: c0e637bdbecd968052a4a77376bb82d097cfe9dacf20a552e0b5a075961fa5fa
ghostscript-gtk-8.15.2-9.12.el5_5.s390x.rpm
File outdated by:  RHBA-2013:1277
    MD5: 3a68315fbdbc55c969572dcd4a766c97
SHA-256: 586bf9f1b8d093bb59126626f09d11444f88e42981d997f2b45cd901fc08b8d6
 
x86_64:
ghostscript-8.15.2-9.12.el5_5.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: 92a18808cf47664c3922487112b5333c
SHA-256: 82905b8e0da8fe93a1a06bbbe9d47ba512e93664745be55baca0346973016dd5
ghostscript-8.15.2-9.12.el5_5.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: f88f12036fdd1a17408af7f08c23073a
SHA-256: 16d4661f3bbe6a2018883ebe024ff4e7e4c46ac2e14d875f313198a844d1c13b
ghostscript-devel-8.15.2-9.12.el5_5.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: c189bc6a025acf42e8169e61e95073bd
SHA-256: 6352add7e45b70ff19c7d89536049e3e72bcc795e8c0936c166948bf289398d3
ghostscript-devel-8.15.2-9.12.el5_5.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: b57f2957aff956f91ce03a506f031bef
SHA-256: a2567bf197133a96c660b0690bc6eab677ab88e58007d96e6df1374b06b743e8
ghostscript-gtk-8.15.2-9.12.el5_5.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 7d190b0b26c78f4591817941918859d4
SHA-256: 09099689cbde8f40881336e9fcf0c2b79d579532bf5b31f785a8d43b512e1ac4
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
ghostscript-8.15.2-9.12.el5_5.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: fb0be5a6fbcf4998edcdcfa92a186e39
SHA-256: db865b32e477486e452fc975e1ed0a0a1bbff07aa1c17e5cff57057a8e073814
 
IA-32:
ghostscript-8.15.2-9.12.el5_5.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: 92a18808cf47664c3922487112b5333c
SHA-256: 82905b8e0da8fe93a1a06bbbe9d47ba512e93664745be55baca0346973016dd5
ghostscript-gtk-8.15.2-9.12.el5_5.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: 69769c484dafea59171b1376d22cad07
SHA-256: 3acb5d85bb010d1b1bee38ef4b32b16fcc9ee20d2d48696cb52af0ad4558bcc8
 
x86_64:
ghostscript-8.15.2-9.12.el5_5.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: 92a18808cf47664c3922487112b5333c
SHA-256: 82905b8e0da8fe93a1a06bbbe9d47ba512e93664745be55baca0346973016dd5
ghostscript-8.15.2-9.12.el5_5.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: f88f12036fdd1a17408af7f08c23073a
SHA-256: 16d4661f3bbe6a2018883ebe024ff4e7e4c46ac2e14d875f313198a844d1c13b
ghostscript-gtk-8.15.2-9.12.el5_5.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 7d190b0b26c78f4591817941918859d4
SHA-256: 09099689cbde8f40881336e9fcf0c2b79d579532bf5b31f785a8d43b512e1ac4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

592962 - ghostscript does not preserve page size and margins with PDF to PS conversion



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/