Skip to navigation

Security Advisory Moderate: ghostscript security update

Advisory: RHSA-2009:0420-1
Type: Security Advisory
Severity: Moderate
Issued on: 2009-04-14
Last updated on: 2009-04-14
Affected Products: Red Hat Desktop (v. 3)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.7.z)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.7.z)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2007-6725
CVE-2009-0792

Details

Updated ghostscript packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 3 and 4.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Ghostscript is a set of software that provides a PostScript interpreter, a
set of C procedures (the Ghostscript library, which implements the graphics
capabilities in the PostScript language) and an interpreter for Portable
Document Format (PDF) files.

It was discovered that the Red Hat Security Advisory RHSA-2009:0345 did not
address all possible integer overflow flaws in Ghostscript's International
Color Consortium Format library (icclib). Using specially-crafted ICC
profiles, an attacker could create a malicious PostScript or PDF file with
embedded images that could cause Ghostscript to crash or, potentially,
execute arbitrary code when opened. (CVE-2009-0792)

A missing boundary check was found in Ghostscript's CCITTFax decoding
filter. An attacker could create a specially-crafted PostScript or PDF file
that could cause Ghostscript to crash or, potentially, execute arbitrary
code when opened. (CVE-2007-6725)

Users of ghostscript are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 3)

SRPMS:
ghostscript-7.05-32.1.20.src.rpm     MD5: 33e93b0b8e6850be1f336fd94d7ffec1
 
IA-32:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-devel-7.05-32.1.20.i386.rpm     MD5: 691b697f2f43e7dd2b5f719d132a4f25
hpijs-1.3-32.1.20.i386.rpm     MD5: 2aca10cee0be6d3c4688bd8f54f65f60
 
x86_64:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-7.05-32.1.20.x86_64.rpm     MD5: 32f32722cc6359de15ba9d751e2b8079
ghostscript-devel-7.05-32.1.20.x86_64.rpm     MD5: 590faa2ce1f67b626318eb8883095b37
hpijs-1.3-32.1.20.x86_64.rpm     MD5: 3d303a2d06134d4657e8e7e4b75f6da1
 
Red Hat Desktop (v. 4)

SRPMS:
ghostscript-7.07-33.2.el4_7.8.src.rpm
File outdated by:  RHSA-2012:0096
    MD5: 1b460cb8d00d84ceb884e7d9867a9f1a
 
IA-32:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-devel-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 6435ec582193ceb30f9947d9a28a61fb
ghostscript-gtk-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 6995a34eb79554e55fa14c446561cbf3
 
x86_64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: f20fe64f215619b52456d159d1529891
ghostscript-devel-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: 5b3229fdb68d92a2108b753b63678b1f
ghostscript-gtk-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: e81f1772af484c0eac1cc71bfb78535b
 
Red Hat Enterprise Linux AS (v. 3)

SRPMS:
ghostscript-7.05-32.1.20.src.rpm     MD5: 33e93b0b8e6850be1f336fd94d7ffec1
 
IA-32:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-devel-7.05-32.1.20.i386.rpm     MD5: 691b697f2f43e7dd2b5f719d132a4f25
hpijs-1.3-32.1.20.i386.rpm     MD5: 2aca10cee0be6d3c4688bd8f54f65f60
 
IA-64:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-7.05-32.1.20.ia64.rpm     MD5: 460a302b06fc77ba45f1fc3a96793a32
ghostscript-devel-7.05-32.1.20.ia64.rpm     MD5: 713beebcdb627d4b2e05843ba02cb652
hpijs-1.3-32.1.20.ia64.rpm     MD5: 6536a561d492fb225768130a71e0c871
 
PPC:
ghostscript-7.05-32.1.20.ppc.rpm     MD5: 7e15adef0ec586bc52beb8794072fcfb
ghostscript-7.05-32.1.20.ppc64.rpm     MD5: 9f3b24264756fd50181686e493d59ef5
ghostscript-devel-7.05-32.1.20.ppc.rpm     MD5: 79f4ffc894e11ae8c36e9946c453efd1
hpijs-1.3-32.1.20.ppc.rpm     MD5: 5c3df8ab0c6730484f742f6ebe6a97ff
 
s390:
ghostscript-7.05-32.1.20.s390.rpm     MD5: e5a43d85db3d2bfae27a87613e7516ed
ghostscript-devel-7.05-32.1.20.s390.rpm     MD5: c81c8c935210b71c44c1ecce754a8bd9
hpijs-1.3-32.1.20.s390.rpm     MD5: 9e6f8b4aecf036047cbe4bab4e370de1
 
s390x:
ghostscript-7.05-32.1.20.s390.rpm     MD5: e5a43d85db3d2bfae27a87613e7516ed
ghostscript-7.05-32.1.20.s390x.rpm     MD5: fe1c26d436800143d4ff21790bc9abf7
ghostscript-devel-7.05-32.1.20.s390x.rpm     MD5: 90bc1d4016f6786e1c22ea25a1b3182f
hpijs-1.3-32.1.20.s390x.rpm     MD5: a282ac39eb5bd8ef67df61540ea6a4a9
 
x86_64:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-7.05-32.1.20.x86_64.rpm     MD5: 32f32722cc6359de15ba9d751e2b8079
ghostscript-devel-7.05-32.1.20.x86_64.rpm     MD5: 590faa2ce1f67b626318eb8883095b37
hpijs-1.3-32.1.20.x86_64.rpm     MD5: 3d303a2d06134d4657e8e7e4b75f6da1
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
ghostscript-7.07-33.2.el4_7.8.src.rpm
File outdated by:  RHSA-2012:0096
    MD5: 1b460cb8d00d84ceb884e7d9867a9f1a
 
IA-32:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-devel-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 6435ec582193ceb30f9947d9a28a61fb
ghostscript-gtk-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 6995a34eb79554e55fa14c446561cbf3
 
IA-64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.ia64.rpm
File outdated by:  RHSA-2012:0096
    MD5: ea5904385b529b341de5fb30bb5f0926
ghostscript-devel-7.07-33.2.el4_7.8.ia64.rpm
File outdated by:  RHSA-2012:0096
    MD5: acc86146905d39be2e516d6ab2d514a7
ghostscript-gtk-7.07-33.2.el4_7.8.ia64.rpm
File outdated by:  RHSA-2012:0096
    MD5: 2691d11fa4be2fafa3b71e7fee5c308e
 
PPC:
ghostscript-7.07-33.2.el4_7.8.ppc.rpm
File outdated by:  RHSA-2012:0096
    MD5: 5f36d63b7cbe34b5f818e8c69d102fe1
ghostscript-7.07-33.2.el4_7.8.ppc64.rpm
File outdated by:  RHSA-2012:0096
    MD5: a3d515337cab7564172d2a1b16468bab
ghostscript-devel-7.07-33.2.el4_7.8.ppc.rpm
File outdated by:  RHSA-2012:0096
    MD5: 32a9e1f885933e84a90db1e41bcb716d
ghostscript-gtk-7.07-33.2.el4_7.8.ppc.rpm
File outdated by:  RHSA-2012:0096
    MD5: cc9023ace5ba85921002bfd7d03411e1
 
s390:
ghostscript-7.07-33.2.el4_7.8.s390.rpm
File outdated by:  RHSA-2012:0096
    MD5: 07721999e26dd598381b119273379c41
ghostscript-devel-7.07-33.2.el4_7.8.s390.rpm
File outdated by:  RHSA-2012:0096
    MD5: afae8c956173cc460b9d5804438320e3
ghostscript-gtk-7.07-33.2.el4_7.8.s390.rpm
File outdated by:  RHSA-2012:0096
    MD5: e502c793978a528e80d5a14d7c6bff75
 
s390x:
ghostscript-7.07-33.2.el4_7.8.s390.rpm
File outdated by:  RHSA-2012:0096
    MD5: 07721999e26dd598381b119273379c41
ghostscript-7.07-33.2.el4_7.8.s390x.rpm
File outdated by:  RHSA-2012:0096
    MD5: 23a3619921b43fb6ff155024f4c50d2f
ghostscript-devel-7.07-33.2.el4_7.8.s390x.rpm
File outdated by:  RHSA-2012:0096
    MD5: fe070fd73a99ebf25197262dbbc40266
ghostscript-gtk-7.07-33.2.el4_7.8.s390x.rpm
File outdated by:  RHSA-2012:0096
    MD5: ee974e044441958c13aba8c367b0c32f
 
x86_64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: f20fe64f215619b52456d159d1529891
ghostscript-devel-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: 5b3229fdb68d92a2108b753b63678b1f
ghostscript-gtk-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: e81f1772af484c0eac1cc71bfb78535b
 
Red Hat Enterprise Linux AS (v. 4.7.z)

SRPMS:
ghostscript-7.07-33.2.el4_7.8.src.rpm
File outdated by:  RHSA-2012:0096
    MD5: 1b460cb8d00d84ceb884e7d9867a9f1a
 
IA-32:
ghostscript-7.07-33.2.el4_7.8.i386.rpm     MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-devel-7.07-33.2.el4_7.8.i386.rpm     MD5: 6435ec582193ceb30f9947d9a28a61fb
ghostscript-gtk-7.07-33.2.el4_7.8.i386.rpm     MD5: 6995a34eb79554e55fa14c446561cbf3
 
IA-64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm     MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.ia64.rpm     MD5: ea5904385b529b341de5fb30bb5f0926
ghostscript-devel-7.07-33.2.el4_7.8.ia64.rpm     MD5: acc86146905d39be2e516d6ab2d514a7
ghostscript-gtk-7.07-33.2.el4_7.8.ia64.rpm     MD5: 2691d11fa4be2fafa3b71e7fee5c308e
 
PPC:
ghostscript-7.07-33.2.el4_7.8.ppc.rpm     MD5: 5f36d63b7cbe34b5f818e8c69d102fe1
ghostscript-7.07-33.2.el4_7.8.ppc64.rpm     MD5: a3d515337cab7564172d2a1b16468bab
ghostscript-devel-7.07-33.2.el4_7.8.ppc.rpm     MD5: 32a9e1f885933e84a90db1e41bcb716d
ghostscript-gtk-7.07-33.2.el4_7.8.ppc.rpm     MD5: cc9023ace5ba85921002bfd7d03411e1
 
s390:
ghostscript-7.07-33.2.el4_7.8.s390.rpm     MD5: 07721999e26dd598381b119273379c41
ghostscript-devel-7.07-33.2.el4_7.8.s390.rpm     MD5: afae8c956173cc460b9d5804438320e3
ghostscript-gtk-7.07-33.2.el4_7.8.s390.rpm     MD5: e502c793978a528e80d5a14d7c6bff75
 
s390x:
ghostscript-7.07-33.2.el4_7.8.s390.rpm     MD5: 07721999e26dd598381b119273379c41
ghostscript-7.07-33.2.el4_7.8.s390x.rpm     MD5: 23a3619921b43fb6ff155024f4c50d2f
ghostscript-devel-7.07-33.2.el4_7.8.s390x.rpm     MD5: fe070fd73a99ebf25197262dbbc40266
ghostscript-gtk-7.07-33.2.el4_7.8.s390x.rpm     MD5: ee974e044441958c13aba8c367b0c32f
 
x86_64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm     MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.x86_64.rpm     MD5: f20fe64f215619b52456d159d1529891
ghostscript-devel-7.07-33.2.el4_7.8.x86_64.rpm     MD5: 5b3229fdb68d92a2108b753b63678b1f
ghostscript-gtk-7.07-33.2.el4_7.8.x86_64.rpm     MD5: e81f1772af484c0eac1cc71bfb78535b
 
Red Hat Enterprise Linux ES (v. 3)

SRPMS:
ghostscript-7.05-32.1.20.src.rpm     MD5: 33e93b0b8e6850be1f336fd94d7ffec1
 
IA-32:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-devel-7.05-32.1.20.i386.rpm     MD5: 691b697f2f43e7dd2b5f719d132a4f25
hpijs-1.3-32.1.20.i386.rpm     MD5: 2aca10cee0be6d3c4688bd8f54f65f60
 
IA-64:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-7.05-32.1.20.ia64.rpm     MD5: 460a302b06fc77ba45f1fc3a96793a32
ghostscript-devel-7.05-32.1.20.ia64.rpm     MD5: 713beebcdb627d4b2e05843ba02cb652
hpijs-1.3-32.1.20.ia64.rpm     MD5: 6536a561d492fb225768130a71e0c871
 
x86_64:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-7.05-32.1.20.x86_64.rpm     MD5: 32f32722cc6359de15ba9d751e2b8079
ghostscript-devel-7.05-32.1.20.x86_64.rpm     MD5: 590faa2ce1f67b626318eb8883095b37
hpijs-1.3-32.1.20.x86_64.rpm     MD5: 3d303a2d06134d4657e8e7e4b75f6da1
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
ghostscript-7.07-33.2.el4_7.8.src.rpm
File outdated by:  RHSA-2012:0096
    MD5: 1b460cb8d00d84ceb884e7d9867a9f1a
 
IA-32:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-devel-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 6435ec582193ceb30f9947d9a28a61fb
ghostscript-gtk-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 6995a34eb79554e55fa14c446561cbf3
 
IA-64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.ia64.rpm
File outdated by:  RHSA-2012:0096
    MD5: ea5904385b529b341de5fb30bb5f0926
ghostscript-devel-7.07-33.2.el4_7.8.ia64.rpm
File outdated by:  RHSA-2012:0096
    MD5: acc86146905d39be2e516d6ab2d514a7
ghostscript-gtk-7.07-33.2.el4_7.8.ia64.rpm
File outdated by:  RHSA-2012:0096
    MD5: 2691d11fa4be2fafa3b71e7fee5c308e
 
x86_64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: f20fe64f215619b52456d159d1529891
ghostscript-devel-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: 5b3229fdb68d92a2108b753b63678b1f
ghostscript-gtk-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: e81f1772af484c0eac1cc71bfb78535b
 
Red Hat Enterprise Linux ES (v. 4.7.z)

SRPMS:
ghostscript-7.07-33.2.el4_7.8.src.rpm
File outdated by:  RHSA-2012:0096
    MD5: 1b460cb8d00d84ceb884e7d9867a9f1a
 
IA-32:
ghostscript-7.07-33.2.el4_7.8.i386.rpm     MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-devel-7.07-33.2.el4_7.8.i386.rpm     MD5: 6435ec582193ceb30f9947d9a28a61fb
ghostscript-gtk-7.07-33.2.el4_7.8.i386.rpm     MD5: 6995a34eb79554e55fa14c446561cbf3
 
IA-64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm     MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.ia64.rpm     MD5: ea5904385b529b341de5fb30bb5f0926
ghostscript-devel-7.07-33.2.el4_7.8.ia64.rpm     MD5: acc86146905d39be2e516d6ab2d514a7
ghostscript-gtk-7.07-33.2.el4_7.8.ia64.rpm     MD5: 2691d11fa4be2fafa3b71e7fee5c308e
 
x86_64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm     MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.x86_64.rpm     MD5: f20fe64f215619b52456d159d1529891
ghostscript-devel-7.07-33.2.el4_7.8.x86_64.rpm     MD5: 5b3229fdb68d92a2108b753b63678b1f
ghostscript-gtk-7.07-33.2.el4_7.8.x86_64.rpm     MD5: e81f1772af484c0eac1cc71bfb78535b
 
Red Hat Enterprise Linux WS (v. 3)

SRPMS:
ghostscript-7.05-32.1.20.src.rpm     MD5: 33e93b0b8e6850be1f336fd94d7ffec1
 
IA-32:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-devel-7.05-32.1.20.i386.rpm     MD5: 691b697f2f43e7dd2b5f719d132a4f25
hpijs-1.3-32.1.20.i386.rpm     MD5: 2aca10cee0be6d3c4688bd8f54f65f60
 
IA-64:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-7.05-32.1.20.ia64.rpm     MD5: 460a302b06fc77ba45f1fc3a96793a32
ghostscript-devel-7.05-32.1.20.ia64.rpm     MD5: 713beebcdb627d4b2e05843ba02cb652
hpijs-1.3-32.1.20.ia64.rpm     MD5: 6536a561d492fb225768130a71e0c871
 
x86_64:
ghostscript-7.05-32.1.20.i386.rpm     MD5: 21bd4e3453313c7b7f9547ed745348e9
ghostscript-7.05-32.1.20.x86_64.rpm     MD5: 32f32722cc6359de15ba9d751e2b8079
ghostscript-devel-7.05-32.1.20.x86_64.rpm     MD5: 590faa2ce1f67b626318eb8883095b37
hpijs-1.3-32.1.20.x86_64.rpm     MD5: 3d303a2d06134d4657e8e7e4b75f6da1
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
ghostscript-7.07-33.2.el4_7.8.src.rpm
File outdated by:  RHSA-2012:0096
    MD5: 1b460cb8d00d84ceb884e7d9867a9f1a
 
IA-32:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-devel-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 6435ec582193ceb30f9947d9a28a61fb
ghostscript-gtk-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 6995a34eb79554e55fa14c446561cbf3
 
IA-64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.ia64.rpm
File outdated by:  RHSA-2012:0096
    MD5: ea5904385b529b341de5fb30bb5f0926
ghostscript-devel-7.07-33.2.el4_7.8.ia64.rpm
File outdated by:  RHSA-2012:0096
    MD5: acc86146905d39be2e516d6ab2d514a7
ghostscript-gtk-7.07-33.2.el4_7.8.ia64.rpm
File outdated by:  RHSA-2012:0096
    MD5: 2691d11fa4be2fafa3b71e7fee5c308e
 
x86_64:
ghostscript-7.07-33.2.el4_7.8.i386.rpm
File outdated by:  RHSA-2012:0096
    MD5: 02ae326e6d5cba2c72eaeb954765cf85
ghostscript-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: f20fe64f215619b52456d159d1529891
ghostscript-devel-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: 5b3229fdb68d92a2108b753b63678b1f
ghostscript-gtk-7.07-33.2.el4_7.8.x86_64.rpm
File outdated by:  RHSA-2012:0096
    MD5: e81f1772af484c0eac1cc71bfb78535b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

491853 - CVE-2009-0792 ghostscript, argyllcms: Incomplete fix for CVE-2009-0583
493442 - CVE-2007-6725 ghostscript: DoS (crash) in CCITTFax decoding filter


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/