Skip to navigation

Security Advisory Moderate: ghostscript security update

Advisory: RHSA-2009:0421-1
Type: Security Advisory
Severity: Moderate
Issued on: 2009-04-14
Last updated on: 2009-04-14
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
CVEs (cve.mitre.org): CVE-2007-6725
CVE-2008-6679
CVE-2009-0196
CVE-2009-0792

Details

Updated ghostscript packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Ghostscript is a set of software that provides a PostScript interpreter, a
set of C procedures (the Ghostscript library, which implements the graphics
capabilities in the PostScript language) and an interpreter for Portable
Document Format (PDF) files.

It was discovered that the Red Hat Security Advisory RHSA-2009:0345 did not
address all possible integer overflow flaws in Ghostscript's International
Color Consortium Format library (icclib). Using specially-crafted ICC
profiles, an attacker could create a malicious PostScript or PDF file with
embedded images that could cause Ghostscript to crash or, potentially,
execute arbitrary code when opened. (CVE-2009-0792)

A buffer overflow flaw and multiple missing boundary checks were found in
Ghostscript. An attacker could create a specially-crafted PostScript or PDF
file that could cause Ghostscript to crash or, potentially, execute
arbitrary code when opened. (CVE-2008-6679, CVE-2007-6725, CVE-2009-0196)

Red Hat would like to thank Alin Rad Pop of Secunia Research for
responsibly reporting the CVE-2009-0196 flaw.

Users of ghostscript are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
ghostscript-8.15.2-9.4.el5_3.7.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: 06cc2117eaee6400beaa15522897cf9c
 
IA-32:
ghostscript-devel-8.15.2-9.4.el5_3.7.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: e61c9ee901ed81f8f111da8b9f8fe69a
 
x86_64:
ghostscript-devel-8.15.2-9.4.el5_3.7.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: e61c9ee901ed81f8f111da8b9f8fe69a
ghostscript-devel-8.15.2-9.4.el5_3.7.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 3917ae8fd0c3910382ef5734eb108c72
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
ghostscript-8.15.2-9.4.el5_3.7.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: 06cc2117eaee6400beaa15522897cf9c
 
IA-32:
ghostscript-8.15.2-9.4.el5_3.7.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: afe0353445e950a362b4c3162d694090
ghostscript-devel-8.15.2-9.4.el5_3.7.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: e61c9ee901ed81f8f111da8b9f8fe69a
ghostscript-gtk-8.15.2-9.4.el5_3.7.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: 4d4bcea5613156023ce16020cc3b2010
 
IA-64:
ghostscript-8.15.2-9.4.el5_3.7.ia64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 09fca14e5bea08ae8523b256804465b4
ghostscript-devel-8.15.2-9.4.el5_3.7.ia64.rpm
File outdated by:  RHBA-2013:1277
    MD5: fba2408f28f4442d63099c3639a4458d
ghostscript-gtk-8.15.2-9.4.el5_3.7.ia64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 3b1e7be4332c2fd780e15b137c9f4afc
 
PPC:
ghostscript-8.15.2-9.4.el5_3.7.ppc.rpm
File outdated by:  RHBA-2013:1277
    MD5: 7a79669c3658c862b5f3569870276478
ghostscript-8.15.2-9.4.el5_3.7.ppc64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 812e5029db8b3276abfca45c4a836e85
ghostscript-devel-8.15.2-9.4.el5_3.7.ppc.rpm
File outdated by:  RHBA-2013:1277
    MD5: c9d449de99eebb1368b8f39b475b785b
ghostscript-devel-8.15.2-9.4.el5_3.7.ppc64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 9a0b030e9a7de01c47ac44278b272105
ghostscript-gtk-8.15.2-9.4.el5_3.7.ppc.rpm
File outdated by:  RHBA-2013:1277
    MD5: b171eae0f55c25c489471fbd8057b8cc
 
s390x:
ghostscript-8.15.2-9.4.el5_3.7.s390.rpm
File outdated by:  RHBA-2013:1277
    MD5: de4d0ada19f98a7477744a6cd70ebd34
ghostscript-8.15.2-9.4.el5_3.7.s390x.rpm
File outdated by:  RHBA-2013:1277
    MD5: 7f95fe1466401aef64058e61f13b5c2d
ghostscript-devel-8.15.2-9.4.el5_3.7.s390.rpm
File outdated by:  RHBA-2013:1277
    MD5: 62c86cfc2d2d78d14f5bab04949082d8
ghostscript-devel-8.15.2-9.4.el5_3.7.s390x.rpm
File outdated by:  RHBA-2013:1277
    MD5: 189060ee7b12691b92b2ab052877bc98
ghostscript-gtk-8.15.2-9.4.el5_3.7.s390x.rpm
File outdated by:  RHBA-2013:1277
    MD5: 9483b9836d7599f1f7a632e13e31dd3d
 
x86_64:
ghostscript-8.15.2-9.4.el5_3.7.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: afe0353445e950a362b4c3162d694090
ghostscript-8.15.2-9.4.el5_3.7.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: d9a76db2ab7c589a2c5eee0bd69a652d
ghostscript-devel-8.15.2-9.4.el5_3.7.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: e61c9ee901ed81f8f111da8b9f8fe69a
ghostscript-devel-8.15.2-9.4.el5_3.7.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 3917ae8fd0c3910382ef5734eb108c72
ghostscript-gtk-8.15.2-9.4.el5_3.7.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 32830d5a6932805ee2c565fb5d28bcc4
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
ghostscript-8.15.2-9.4.el5_3.7.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: 06cc2117eaee6400beaa15522897cf9c
 
IA-32:
ghostscript-8.15.2-9.4.el5_3.7.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: afe0353445e950a362b4c3162d694090
ghostscript-gtk-8.15.2-9.4.el5_3.7.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: 4d4bcea5613156023ce16020cc3b2010
 
x86_64:
ghostscript-8.15.2-9.4.el5_3.7.i386.rpm
File outdated by:  RHBA-2013:1277
    MD5: afe0353445e950a362b4c3162d694090
ghostscript-8.15.2-9.4.el5_3.7.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: d9a76db2ab7c589a2c5eee0bd69a652d
ghostscript-gtk-8.15.2-9.4.el5_3.7.x86_64.rpm
File outdated by:  RHBA-2013:1277
    MD5: 32830d5a6932805ee2c565fb5d28bcc4
 
Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
ghostscript-8.15.2-9.4.el5_3.7.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: 06cc2117eaee6400beaa15522897cf9c
 
IA-32:
ghostscript-8.15.2-9.4.el5_3.7.i386.rpm     MD5: afe0353445e950a362b4c3162d694090
ghostscript-devel-8.15.2-9.4.el5_3.7.i386.rpm     MD5: e61c9ee901ed81f8f111da8b9f8fe69a
ghostscript-gtk-8.15.2-9.4.el5_3.7.i386.rpm     MD5: 4d4bcea5613156023ce16020cc3b2010
 
IA-64:
ghostscript-8.15.2-9.4.el5_3.7.ia64.rpm     MD5: 09fca14e5bea08ae8523b256804465b4
ghostscript-devel-8.15.2-9.4.el5_3.7.ia64.rpm     MD5: fba2408f28f4442d63099c3639a4458d
ghostscript-gtk-8.15.2-9.4.el5_3.7.ia64.rpm     MD5: 3b1e7be4332c2fd780e15b137c9f4afc
 
PPC:
ghostscript-8.15.2-9.4.el5_3.7.ppc.rpm     MD5: 7a79669c3658c862b5f3569870276478
ghostscript-8.15.2-9.4.el5_3.7.ppc64.rpm     MD5: 812e5029db8b3276abfca45c4a836e85
ghostscript-devel-8.15.2-9.4.el5_3.7.ppc.rpm     MD5: c9d449de99eebb1368b8f39b475b785b
ghostscript-devel-8.15.2-9.4.el5_3.7.ppc64.rpm     MD5: 9a0b030e9a7de01c47ac44278b272105
ghostscript-gtk-8.15.2-9.4.el5_3.7.ppc.rpm     MD5: b171eae0f55c25c489471fbd8057b8cc
 
s390x:
ghostscript-8.15.2-9.4.el5_3.7.s390.rpm     MD5: de4d0ada19f98a7477744a6cd70ebd34
ghostscript-8.15.2-9.4.el5_3.7.s390x.rpm     MD5: 7f95fe1466401aef64058e61f13b5c2d
ghostscript-devel-8.15.2-9.4.el5_3.7.s390.rpm     MD5: 62c86cfc2d2d78d14f5bab04949082d8
ghostscript-devel-8.15.2-9.4.el5_3.7.s390x.rpm     MD5: 189060ee7b12691b92b2ab052877bc98
ghostscript-gtk-8.15.2-9.4.el5_3.7.s390x.rpm     MD5: 9483b9836d7599f1f7a632e13e31dd3d
 
x86_64:
ghostscript-8.15.2-9.4.el5_3.7.i386.rpm     MD5: afe0353445e950a362b4c3162d694090
ghostscript-8.15.2-9.4.el5_3.7.x86_64.rpm     MD5: d9a76db2ab7c589a2c5eee0bd69a652d
ghostscript-devel-8.15.2-9.4.el5_3.7.i386.rpm     MD5: e61c9ee901ed81f8f111da8b9f8fe69a
ghostscript-devel-8.15.2-9.4.el5_3.7.x86_64.rpm     MD5: 3917ae8fd0c3910382ef5734eb108c72
ghostscript-gtk-8.15.2-9.4.el5_3.7.x86_64.rpm     MD5: 32830d5a6932805ee2c565fb5d28bcc4
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
ghostscript-8.15.2-9.4.el5_3.7.src.rpm
File outdated by:  RHBA-2013:1277
    MD5: 06cc2117eaee6400beaa15522897cf9c
 
IA-32:
ghostscript-8.15.2-9.4.el5_3.7.i386.rpm     MD5: afe0353445e950a362b4c3162d694090
ghostscript-devel-8.15.2-9.4.el5_3.7.i386.rpm     MD5: e61c9ee901ed81f8f111da8b9f8fe69a
ghostscript-gtk-8.15.2-9.4.el5_3.7.i386.rpm     MD5: 4d4bcea5613156023ce16020cc3b2010
 
IA-64:
ghostscript-8.15.2-9.4.el5_3.7.ia64.rpm     MD5: 09fca14e5bea08ae8523b256804465b4
ghostscript-devel-8.15.2-9.4.el5_3.7.ia64.rpm     MD5: fba2408f28f4442d63099c3639a4458d
ghostscript-gtk-8.15.2-9.4.el5_3.7.ia64.rpm     MD5: 3b1e7be4332c2fd780e15b137c9f4afc
 
x86_64:
ghostscript-8.15.2-9.4.el5_3.7.i386.rpm     MD5: afe0353445e950a362b4c3162d694090
ghostscript-8.15.2-9.4.el5_3.7.x86_64.rpm     MD5: d9a76db2ab7c589a2c5eee0bd69a652d
ghostscript-devel-8.15.2-9.4.el5_3.7.i386.rpm     MD5: e61c9ee901ed81f8f111da8b9f8fe69a
ghostscript-devel-8.15.2-9.4.el5_3.7.x86_64.rpm     MD5: 3917ae8fd0c3910382ef5734eb108c72
ghostscript-gtk-8.15.2-9.4.el5_3.7.x86_64.rpm     MD5: 32830d5a6932805ee2c565fb5d28bcc4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

491853 - CVE-2009-0792 ghostscript, argyllcms: Incomplete fix for CVE-2009-0583
493379 - CVE-2009-0196 ghostscript: Missing boundary check in Ghostscript's jbig2dec library
493442 - CVE-2007-6725 ghostscript: DoS (crash) in CCITTFax decoding filter
493445 - CVE-2008-6679 ghostscript: Buffer overflow in BaseFont writer module for pdfwrite defice


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/