Skip to navigation

Bug Fix Advisory ghostscript bug fix update

Advisory: RHBA-2011:1286-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-09-13
Last updated on: 2011-09-13
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated ghostscript package that fixes two bugs is now available for Red Hat
Enterprise Linux 5.

The Ghostscript suite provides a PostScript(TM) interpreter, a set of C
procedures (the Ghostscript library, which implements the graphics capabilities
in the PostScript language), and an interpreter for PDF files. Ghostscript
translates PostScript code into many common, bitmapped formats, especially
formats understood by most printers and displays. This enables users to display
PostScript files and print them on non-PostScript printers.

This update fixes the following bugs:

* Prior to this update, the page orientation was incorrect when pages in
landscape orientation were converted to the PXL raster format. This update
matches landscape page sizes as well as portrait page sizes, and sets the
orientation parameter correctly when a match is found. (BZ#734764)

* Prior to this update, certain input files containing CID Type2 fonts were
rendered with incorrect character spacing. This update modifies the code so that
all input files with CID Type2 fonts are rendered correctly. (BZ#734767)

Users are advised to upgrade to this updated package, which fixes these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259/

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
ghostscript-8.70-6.el5_7.3.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: e57398b3f8b4d940bb64e9d171028392
SHA-256: 207b46fd7f06ea811054a927081cdfd22c27c7b9249078185bdb82c2aa6391d0
 
IA-32:
ghostscript-devel-8.70-6.el5_7.3.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: a77e55b159d1a07e0d15cdb659259e57
SHA-256: 7cfcd5256c12801c74ac4034ed3094bff9289d1ddf92e0b0f86fbb783323a208
 
x86_64:
ghostscript-devel-8.70-6.el5_7.3.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: a77e55b159d1a07e0d15cdb659259e57
SHA-256: 7cfcd5256c12801c74ac4034ed3094bff9289d1ddf92e0b0f86fbb783323a208
ghostscript-devel-8.70-6.el5_7.3.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 98004dffa2e588a85c3d3386031f3213
SHA-256: de3d67d3c7b1fd578d3e79cce481755bda155f2ed6bd69a0c4d322ea9d4998a6
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ghostscript-8.70-6.el5_7.3.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: e57398b3f8b4d940bb64e9d171028392
SHA-256: 207b46fd7f06ea811054a927081cdfd22c27c7b9249078185bdb82c2aa6391d0
 
IA-32:
ghostscript-8.70-6.el5_7.3.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: a41399c15aad50d841fbe97fc3d68fc4
SHA-256: 96d544e65f3273326d82da289fae198b310be8709c87062de777c82f47819b59
ghostscript-devel-8.70-6.el5_7.3.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: a77e55b159d1a07e0d15cdb659259e57
SHA-256: 7cfcd5256c12801c74ac4034ed3094bff9289d1ddf92e0b0f86fbb783323a208
ghostscript-gtk-8.70-6.el5_7.3.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: ffc3d03f6ece454dc39872269813d960
SHA-256: 3a04a2fe0be576e368db3fdb863e9c580f19408db3f88619b1296171f4f15fbc
 
IA-64:
ghostscript-8.70-6.el5_7.3.ia64.rpm
File outdated by:  RHBA-2013:1277
    MD5: acadb890135f2b6857234db013da0cd7
SHA-256: c806fe29fd52e598e08a0590ac6a66c15323de31a54f3c392d749da6f3f81729
ghostscript-devel-8.70-6.el5_7.3.ia64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 4270774dcb9e38f6e09bed769d92a280
SHA-256: 09aaf618b3dc1258c559174bde30f175954f4c4c0a1c51b31383cb362e1fa5e0
ghostscript-gtk-8.70-6.el5_7.3.ia64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 2b852567b6ba157c6a3d14ccef11b0b9
SHA-256: a60d2fcf07f637505e4c56c0967185d89ee3535f769fed011cf8796d51464661
 
PPC:
ghostscript-8.70-6.el5_7.3.ppc.rpm
File outdated by:  RHBA-2013:1277
    MD5: 366620a8b8a5bfa2f29a5ac141ee123c
SHA-256: 14b628582b577de8cd038e0ec1fa3bb73f8b5585ca1c049523e1b1fb4cf458b3
ghostscript-8.70-6.el5_7.3.ppc64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 20ae93269a892d4bb73449def50331b3
SHA-256: 6d1b553a0ed7c4372b2f7bcda89bdb549b8079c4dd32c1e963c9b41341a0baa5
ghostscript-devel-8.70-6.el5_7.3.ppc.rpm
File outdated by:  RHBA-2013:1277
    MD5: c055781f8b893d7cc95d7b23aab765c2
SHA-256: a0bc869e92828b7091998441453df2b8709b786ca0cf033f65b33d2e8b034998
ghostscript-devel-8.70-6.el5_7.3.ppc64.rpm
File outdated by:  RHBA-2013:1277
    MD5: fc1dc36b42a28e31ec1d9f5105ba42f6
SHA-256: 4d5442081541ae88c4ca79abf72ac31754115b45c255c8c373dc7221d0369c98
ghostscript-gtk-8.70-6.el5_7.3.ppc.rpm
File outdated by:  RHBA-2013:1277
    MD5: 6d8d438791fa48364d32cb620a25458a
SHA-256: 77f0f6451fae0fc571cb4ec65bbfe88f697d1a3e2a8767ef82dc1c54fd919f65
 
s390x:
ghostscript-8.70-6.el5_7.3.s390.rpm
File outdated by:  RHBA-2013:1277
    MD5: 470399c104dc52f11564b58680005dba
SHA-256: d7afb49f484e40fe9f82eeef61efbb4315774eafa02e916690911907ae38b247
ghostscript-8.70-6.el5_7.3.s390x.rpm
File outdated by:  RHBA-2013:1277
    MD5: 9019ac5c7a3d2d7882373e7b9cdcfa3c
SHA-256: b91fe0adb784e356faf0c3dd9ca2d58a85ab983fa7b72ef435bdcfc0e8f53e55
ghostscript-devel-8.70-6.el5_7.3.s390.rpm
File outdated by:  RHBA-2013:1277
    MD5: 8a45cf9372119479fd33d42cc7aa2956
SHA-256: dff61d40014b5f99c8c2eb26acb9c53a5523735f04e8eb4392731363e4dbccd8
ghostscript-devel-8.70-6.el5_7.3.s390x.rpm
File outdated by:  RHBA-2013:1277
    MD5: b0c81af1db7cc43a59503422abea8a65
SHA-256: 2819a6e3dbc99b2e1e7c0e2217bd4f6cdea023ce74c496d44d5d672a2bd5f5bc
ghostscript-gtk-8.70-6.el5_7.3.s390x.rpm
File outdated by:  RHBA-2013:1277
    MD5: 324c2bd851abd69cbf6ebb7ce629d98a
SHA-256: 3425a09d74c568acba79d3279de58c2f83cee84c2aad3b7a572cb442751034e9
 
x86_64:
ghostscript-8.70-6.el5_7.3.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: a41399c15aad50d841fbe97fc3d68fc4
SHA-256: 96d544e65f3273326d82da289fae198b310be8709c87062de777c82f47819b59
ghostscript-8.70-6.el5_7.3.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: c40cb46d4e35ffbea9c4cf29c03e2c15
SHA-256: f78cd4f5066584100a7307af5372dcd52c5ad34f156a9ce15482e71509e046ef
ghostscript-devel-8.70-6.el5_7.3.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: a77e55b159d1a07e0d15cdb659259e57
SHA-256: 7cfcd5256c12801c74ac4034ed3094bff9289d1ddf92e0b0f86fbb783323a208
ghostscript-devel-8.70-6.el5_7.3.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 98004dffa2e588a85c3d3386031f3213
SHA-256: de3d67d3c7b1fd578d3e79cce481755bda155f2ed6bd69a0c4d322ea9d4998a6
ghostscript-gtk-8.70-6.el5_7.3.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 2235ef651926005b7a30dbda8466e4b4
SHA-256: cad2952c3b1e48936e0b47c4cf3c9d75a488eb78fdd320782b97aaa785543119
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
ghostscript-8.70-6.el5_7.3.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: e57398b3f8b4d940bb64e9d171028392
SHA-256: 207b46fd7f06ea811054a927081cdfd22c27c7b9249078185bdb82c2aa6391d0
 
IA-32:
ghostscript-8.70-6.el5_7.3.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: a41399c15aad50d841fbe97fc3d68fc4
SHA-256: 96d544e65f3273326d82da289fae198b310be8709c87062de777c82f47819b59
ghostscript-gtk-8.70-6.el5_7.3.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: ffc3d03f6ece454dc39872269813d960
SHA-256: 3a04a2fe0be576e368db3fdb863e9c580f19408db3f88619b1296171f4f15fbc
 
x86_64:
ghostscript-8.70-6.el5_7.3.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: a41399c15aad50d841fbe97fc3d68fc4
SHA-256: 96d544e65f3273326d82da289fae198b310be8709c87062de777c82f47819b59
ghostscript-8.70-6.el5_7.3.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: c40cb46d4e35ffbea9c4cf29c03e2c15
SHA-256: f78cd4f5066584100a7307af5372dcd52c5ad34f156a9ce15482e71509e046ef
ghostscript-gtk-8.70-6.el5_7.3.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 2235ef651926005b7a30dbda8466e4b4
SHA-256: cad2952c3b1e48936e0b47c4cf3c9d75a488eb78fdd320782b97aaa785543119
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

734767 - Incorrect spacing with a CIDType2 font with a gsub table



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/