- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0284 - Bug Fix Advisory
Synopsis
ghostscript bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ghostscript packages that fix several bugs and add an enhancement are
now available for Red Hat Enterprise Linux 5.
Description
The Ghostscript suite provides a PostScript interpreter, a set of C procedures
(the Ghostscript library, which implements the graphics capabilities in the
PostScript language), and an interpreter for PDF files. Ghostscript translates
PostScript code into many common bitmapped formats like those understood by most
printers and displays. This enables users to display PostScript files and print
them on non-PostScript printers.
These updated ghostscript packages provide fixes for the following bugs:
- Previously, using the ps2pdf utility to convert a PostScript file to the PDF
format caused the resulting document to be created with non-working hyperlinks.
This update applies an upstream patch that resolves this issue, and ps2pdf now
creates PDF files with correct hyperlinks. (BZ#675307)
- Prior to this update, certain input files containing CID Type2 fonts were
rendered with incorrect character spacing. This update modifies the code so that
all input files with CID Type2 fonts are rendered correctly. (BZ#688996)
- Prior to this update, the page orientation was incorrect when pages in
landscape orientation were converted to the PXL raster format. This update
matches landscape page sizes as well as portrait page sizes, and sets the
orientation parameter correctly when a match is found. (BZ#692165)
In addition, these updated ghostscript packages provide the following
enhancement:
- Improved support for the PDF/A format has been back-ported from upstream.
(BZ#710074)
Users are advised to upgrade to these updated ghostscript packages, which
resolve these issues and add this enhancement.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 688996 - Incorrect spacing with a CIDType2 font with a gsub table
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
ghostscript-8.70-14.el5.src.rpm | SHA-256: fdc16dd8f88cad07057bb510bdb32664e6294168148bb72a37c9aa5c688b42f2 |
x86_64 | |
ghostscript-8.70-14.el5.i386.rpm | SHA-256: 74d2a32fa0d771348a9d224559eddf1f27d0cb556995926ecc09c8ba4785a2c7 |
ghostscript-8.70-14.el5.x86_64.rpm | SHA-256: db045a82eb649d2b6ba31572ee06f51bce41b7f65e92fb87244dc2e49d6f50b7 |
ghostscript-devel-8.70-14.el5.i386.rpm | SHA-256: 20db582a40b51e1dc86883ec814e6822efc5ff649d0530c01736a425e420dedd |
ghostscript-devel-8.70-14.el5.x86_64.rpm | SHA-256: 406c727f3a2fed0c7b91c8b2ba959824a2bb240b971f412ea3b5eeecb38bd742 |
ghostscript-gtk-8.70-14.el5.x86_64.rpm | SHA-256: b0e81afb931726fdc1377b908fb97326045ecc589a42acc292318e4e3536f9ad |
ia64 | |
ghostscript-8.70-14.el5.ia64.rpm | SHA-256: da52fb60dfbce93f518ef340cb0ee0310a1b1b3e9977249e6c7682822565a47a |
ghostscript-devel-8.70-14.el5.ia64.rpm | SHA-256: 2de2a8535f206d386e4255942df7b7ed70f9f3f06d8e227b9f63a45bde83be30 |
ghostscript-gtk-8.70-14.el5.ia64.rpm | SHA-256: e8362856dfbda7ca13355673bad7d78289c0a584d245200e564d2996bf0281d2 |
i386 | |
ghostscript-8.70-14.el5.i386.rpm | SHA-256: 74d2a32fa0d771348a9d224559eddf1f27d0cb556995926ecc09c8ba4785a2c7 |
ghostscript-devel-8.70-14.el5.i386.rpm | SHA-256: 20db582a40b51e1dc86883ec814e6822efc5ff649d0530c01736a425e420dedd |
ghostscript-gtk-8.70-14.el5.i386.rpm | SHA-256: 28a9e0b28647e58ffb95dbf6559614787dec87bb2ab27cd28fca5c2d053fbc0b |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
ghostscript-8.70-14.el5.src.rpm | SHA-256: fdc16dd8f88cad07057bb510bdb32664e6294168148bb72a37c9aa5c688b42f2 |
x86_64 | |
ghostscript-8.70-14.el5.i386.rpm | SHA-256: 74d2a32fa0d771348a9d224559eddf1f27d0cb556995926ecc09c8ba4785a2c7 |
ghostscript-8.70-14.el5.x86_64.rpm | SHA-256: db045a82eb649d2b6ba31572ee06f51bce41b7f65e92fb87244dc2e49d6f50b7 |
ghostscript-devel-8.70-14.el5.i386.rpm | SHA-256: 20db582a40b51e1dc86883ec814e6822efc5ff649d0530c01736a425e420dedd |
ghostscript-devel-8.70-14.el5.x86_64.rpm | SHA-256: 406c727f3a2fed0c7b91c8b2ba959824a2bb240b971f412ea3b5eeecb38bd742 |
ghostscript-gtk-8.70-14.el5.x86_64.rpm | SHA-256: b0e81afb931726fdc1377b908fb97326045ecc589a42acc292318e4e3536f9ad |
i386 | |
ghostscript-8.70-14.el5.i386.rpm | SHA-256: 74d2a32fa0d771348a9d224559eddf1f27d0cb556995926ecc09c8ba4785a2c7 |
ghostscript-devel-8.70-14.el5.i386.rpm | SHA-256: 20db582a40b51e1dc86883ec814e6822efc5ff649d0530c01736a425e420dedd |
ghostscript-gtk-8.70-14.el5.i386.rpm | SHA-256: 28a9e0b28647e58ffb95dbf6559614787dec87bb2ab27cd28fca5c2d053fbc0b |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
ghostscript-8.70-14.el5.src.rpm | SHA-256: fdc16dd8f88cad07057bb510bdb32664e6294168148bb72a37c9aa5c688b42f2 |
x86_64 | |
ghostscript-8.70-14.el5.i386.rpm | SHA-256: 74d2a32fa0d771348a9d224559eddf1f27d0cb556995926ecc09c8ba4785a2c7 |
ghostscript-8.70-14.el5.x86_64.rpm | SHA-256: db045a82eb649d2b6ba31572ee06f51bce41b7f65e92fb87244dc2e49d6f50b7 |
ghostscript-gtk-8.70-14.el5.x86_64.rpm | SHA-256: b0e81afb931726fdc1377b908fb97326045ecc589a42acc292318e4e3536f9ad |
i386 | |
ghostscript-8.70-14.el5.i386.rpm | SHA-256: 74d2a32fa0d771348a9d224559eddf1f27d0cb556995926ecc09c8ba4785a2c7 |
ghostscript-gtk-8.70-14.el5.i386.rpm | SHA-256: 28a9e0b28647e58ffb95dbf6559614787dec87bb2ab27cd28fca5c2d053fbc0b |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
ghostscript-8.70-14.el5.src.rpm | SHA-256: fdc16dd8f88cad07057bb510bdb32664e6294168148bb72a37c9aa5c688b42f2 |
s390x | |
ghostscript-8.70-14.el5.s390.rpm | SHA-256: d0b75258c67c518624f961f67646af000f9c39754ca49cbb020a3b08d28417aa |
ghostscript-8.70-14.el5.s390x.rpm | SHA-256: 138947c07f746e91a741115b66f7da80da083f495776c91805fcf7a14d820577 |
ghostscript-devel-8.70-14.el5.s390.rpm | SHA-256: 15b91f678cd59f8df7ce5f5dbcacc497fd7bd9942f0d8ac1fb4a375d07927aac |
ghostscript-devel-8.70-14.el5.s390x.rpm | SHA-256: 327862c47b78e14a315e35cf8c4d88de89d9cc27858b79b85b78404a843391e0 |
ghostscript-gtk-8.70-14.el5.s390x.rpm | SHA-256: 15528e4a58968f5b394cc1a70551436b69380d3227cdbbcd09248860f32d048e |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
ghostscript-8.70-14.el5.src.rpm | SHA-256: fdc16dd8f88cad07057bb510bdb32664e6294168148bb72a37c9aa5c688b42f2 |
ppc | |
ghostscript-8.70-14.el5.ppc.rpm | SHA-256: 8f53700038680843eceb95fc0d312d14021124f614a259b3b6537c2ae29cd3ff |
ghostscript-8.70-14.el5.ppc64.rpm | SHA-256: e0cd04d39fc51364ad1f19534c82ad21dc90d35e4285c4227cd4b65cc858c198 |
ghostscript-devel-8.70-14.el5.ppc.rpm | SHA-256: 0cb950a55928710eb45e163d63ebda26b605c9fe84c8c477df8a8490a2a08c7f |
ghostscript-devel-8.70-14.el5.ppc64.rpm | SHA-256: 2434dd04beea7df33782df62d4824fb83e901b61c1fc2dcaf8e42505f676a2aa |
ghostscript-gtk-8.70-14.el5.ppc.rpm | SHA-256: ecfdaedebe38037e9a343d9bb00af8447f73c8d4db0f17331e88d06311f45bd9 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
ghostscript-8.70-14.el5.src.rpm | SHA-256: fdc16dd8f88cad07057bb510bdb32664e6294168148bb72a37c9aa5c688b42f2 |
x86_64 | |
ghostscript-8.70-14.el5.i386.rpm | SHA-256: 74d2a32fa0d771348a9d224559eddf1f27d0cb556995926ecc09c8ba4785a2c7 |
ghostscript-8.70-14.el5.x86_64.rpm | SHA-256: db045a82eb649d2b6ba31572ee06f51bce41b7f65e92fb87244dc2e49d6f50b7 |
ghostscript-devel-8.70-14.el5.i386.rpm | SHA-256: 20db582a40b51e1dc86883ec814e6822efc5ff649d0530c01736a425e420dedd |
ghostscript-devel-8.70-14.el5.x86_64.rpm | SHA-256: 406c727f3a2fed0c7b91c8b2ba959824a2bb240b971f412ea3b5eeecb38bd742 |
ghostscript-gtk-8.70-14.el5.x86_64.rpm | SHA-256: b0e81afb931726fdc1377b908fb97326045ecc589a42acc292318e4e3536f9ad |
i386 | |
ghostscript-8.70-14.el5.i386.rpm | SHA-256: 74d2a32fa0d771348a9d224559eddf1f27d0cb556995926ecc09c8ba4785a2c7 |
ghostscript-devel-8.70-14.el5.i386.rpm | SHA-256: 20db582a40b51e1dc86883ec814e6822efc5ff649d0530c01736a425e420dedd |
ghostscript-gtk-8.70-14.el5.i386.rpm | SHA-256: 28a9e0b28647e58ffb95dbf6559614787dec87bb2ab27cd28fca5c2d053fbc0b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.