Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:1257 - Bug Fix Advisory
Issued:
2009-09-02
Updated:
2009-09-02

RHBA-2009:1257 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

ghostscript bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

A ghostscript update that fixes several bugs is now available.

Description

The Ghostscript suite provides a PostScript(TM) interpreter, a set of C
procedures (the Ghostscript library, which implements the graphics
capabilities in the PostScript language), and an interpreter for PDF files.
Ghostscript translates PostScript code into many common, bitmapped formats,
like those understood by most printers and displays. This enables users to
display PostScript files and print them on non-PostScript printers.

This update applies the following fixes:

  • an incorrect offset computation that occurred when handling subglyphs

made it possible for ghostscript to read uninitialized data. When this
occurred, ghostscript would crash with a segmentation fault. This update
corrects the offset computation, preventing ghostscript from reading
uninitialized data. (BZ#450717)

  • the way that the Ghostscript source code used pointer aliasing could

produce unexpected results when strict aliasing optimizations are in use.
To avoid problems, this ghostscript update was built using the

  • fno-strict-aliasing option, which disables strict aliasing optimization.

(BZ#465960)

  • a typographical error in the gsiparam.h header file made it possible for

some PDF files to cause ghostscript to fall into an infinite loop. This
update fixes the error. (BZ#473889)

  • the gdevpsu.c source file incorrectly defined the point size of A3 pages,

which sometimes resulted in incorrect document page sizes. This update
fixes the point size definition error , ensuring that A3 pages are always
printed with the correct size. (BZ#480978)

  • this update corrects how the cvrs PostScript operator performs sign

extensions. This fix prevents range errors from occurring on 64-bit
platforms. (BZ#488127)

  • this update also fixes ColorSpace initialization in the InkJet Server

(IJS) driver, which is used by hpijs and gimp-print drivers in some
configurations. In previous releases, print jobs that did not initialize
ColorSpace failed whenever they used Ghostscript to render and print PDFs
on devices that used the ijs driver. (BZ#504254)

Users of ghostscript are advised to apply this update.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 450717 - ghostscript segfaults, can't print
  • BZ - 465960 - build with -fno-strict-aliasing
  • BZ - 473889 - ghostscript hangs on some PDF files
  • BZ - 480978 - A3 pagesize pointsize definition wrong in gdevpsu.c
  • BZ - 488127 - [RHEL5] ghostscript /rangecheck in --cvrs--

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
ghostscript-8.15.2-9.11.el5.src.rpm SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4
x86_64
ghostscript-8.15.2-9.11.el5.i386.rpm SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c
ghostscript-8.15.2-9.11.el5.x86_64.rpm SHA-256: b2049494b4924c9b23e72bcc716ce2688b12ebf27029e3e84731eb00928991ba
ghostscript-devel-8.15.2-9.11.el5.i386.rpm SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74
ghostscript-devel-8.15.2-9.11.el5.x86_64.rpm SHA-256: a920f4f35a015a87c413f29c7c7640cbbe54a6480b7ddb2436a73c409e0d0c33
ghostscript-gtk-8.15.2-9.11.el5.x86_64.rpm SHA-256: ec3ad35dbcdc1a0f60d889a45037b597f9312831e0a36bca7bbf3ea0517b0f48
ia64
ghostscript-8.15.2-9.11.el5.ia64.rpm SHA-256: 5c1ac79392b43367ad3d66218b5f6e2d418c83578189b5117aa4db3cb48c9bda
ghostscript-devel-8.15.2-9.11.el5.ia64.rpm SHA-256: 14d20818d9e8221fe70fd65f175e8a0e153d4c1ad9b3d03fcf169f523838fa7a
ghostscript-gtk-8.15.2-9.11.el5.ia64.rpm SHA-256: b5203b6cf50ca3c8460d85250a1a150ee95aa56b162629b01bfe50068fa6fb23
i386
ghostscript-8.15.2-9.11.el5.i386.rpm SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c
ghostscript-devel-8.15.2-9.11.el5.i386.rpm SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74
ghostscript-gtk-8.15.2-9.11.el5.i386.rpm SHA-256: 76e17f824118ed0da115c764d17efce6db22c6347425c6830b1783c168a58231

Red Hat Enterprise Linux Workstation 5

SRPM
ghostscript-8.15.2-9.11.el5.src.rpm SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4
x86_64
ghostscript-8.15.2-9.11.el5.i386.rpm SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c
ghostscript-8.15.2-9.11.el5.x86_64.rpm SHA-256: b2049494b4924c9b23e72bcc716ce2688b12ebf27029e3e84731eb00928991ba
ghostscript-devel-8.15.2-9.11.el5.i386.rpm SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74
ghostscript-devel-8.15.2-9.11.el5.x86_64.rpm SHA-256: a920f4f35a015a87c413f29c7c7640cbbe54a6480b7ddb2436a73c409e0d0c33
ghostscript-gtk-8.15.2-9.11.el5.x86_64.rpm SHA-256: ec3ad35dbcdc1a0f60d889a45037b597f9312831e0a36bca7bbf3ea0517b0f48
i386
ghostscript-8.15.2-9.11.el5.i386.rpm SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c
ghostscript-devel-8.15.2-9.11.el5.i386.rpm SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74
ghostscript-gtk-8.15.2-9.11.el5.i386.rpm SHA-256: 76e17f824118ed0da115c764d17efce6db22c6347425c6830b1783c168a58231

Red Hat Enterprise Linux Desktop 5

SRPM
ghostscript-8.15.2-9.11.el5.src.rpm SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4
x86_64
ghostscript-8.15.2-9.11.el5.i386.rpm SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c
ghostscript-8.15.2-9.11.el5.x86_64.rpm SHA-256: b2049494b4924c9b23e72bcc716ce2688b12ebf27029e3e84731eb00928991ba
ghostscript-gtk-8.15.2-9.11.el5.x86_64.rpm SHA-256: ec3ad35dbcdc1a0f60d889a45037b597f9312831e0a36bca7bbf3ea0517b0f48
i386
ghostscript-8.15.2-9.11.el5.i386.rpm SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c
ghostscript-gtk-8.15.2-9.11.el5.i386.rpm SHA-256: 76e17f824118ed0da115c764d17efce6db22c6347425c6830b1783c168a58231

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
ghostscript-8.15.2-9.11.el5.src.rpm SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4
s390x
ghostscript-8.15.2-9.11.el5.s390.rpm SHA-256: 207918309a255f4a10c7bfa3caf80e7815e0787847c401d5f42cfd508c31e10e
ghostscript-8.15.2-9.11.el5.s390x.rpm SHA-256: 54d9728a5934ebd9ab129d19700f4ca63a9bf0dea1438afc1b80e29ee8451241
ghostscript-devel-8.15.2-9.11.el5.s390.rpm SHA-256: 3424c15ed330eae8bf938fbe0870a61ffe6a49876ed0c3de8b8cc64766dabef0
ghostscript-devel-8.15.2-9.11.el5.s390x.rpm SHA-256: 3ccdea14befa4cb82f677a066cb0cd4d38f71adc389496404042c496bd282da2
ghostscript-gtk-8.15.2-9.11.el5.s390x.rpm SHA-256: dcafdbc71396b48dad43f9ae0250d6cd42b1788a17388906292b97a2c70b31e2

Red Hat Enterprise Linux for Power, big endian 5

SRPM
ghostscript-8.15.2-9.11.el5.src.rpm SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4
ppc
ghostscript-8.15.2-9.11.el5.ppc.rpm SHA-256: 204cf24e37ed2b4541c26a5eff1bef2541fe075b7d5cd47618c83b0e60d372ca
ghostscript-8.15.2-9.11.el5.ppc64.rpm SHA-256: 69489caed74582eb6f92a1ae2119831186382cac413d4b59ad5d16006c725e75
ghostscript-devel-8.15.2-9.11.el5.ppc.rpm SHA-256: 9a765fca99035924be93a3f2cb21dff9dd10a69c899bd74fa96e9970170bbd93
ghostscript-devel-8.15.2-9.11.el5.ppc64.rpm SHA-256: 1b5de688fef17b792750b8dc1140dce26d52199282d998e1ce1293d5b1203785
ghostscript-gtk-8.15.2-9.11.el5.ppc.rpm SHA-256: 05cd881411d23850171af4bd0ec1cbc20d83eefbaef994a3058e7d4765aeb8c7

Red Hat Enterprise Linux Server from RHUI 5

SRPM
ghostscript-8.15.2-9.11.el5.src.rpm SHA-256: a5bea05ba9efdcc024e000da625d14267a470c53f3fbf463eedce6979703c3c4
x86_64
ghostscript-8.15.2-9.11.el5.i386.rpm SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c
ghostscript-8.15.2-9.11.el5.x86_64.rpm SHA-256: b2049494b4924c9b23e72bcc716ce2688b12ebf27029e3e84731eb00928991ba
ghostscript-devel-8.15.2-9.11.el5.i386.rpm SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74
ghostscript-devel-8.15.2-9.11.el5.x86_64.rpm SHA-256: a920f4f35a015a87c413f29c7c7640cbbe54a6480b7ddb2436a73c409e0d0c33
ghostscript-gtk-8.15.2-9.11.el5.x86_64.rpm SHA-256: ec3ad35dbcdc1a0f60d889a45037b597f9312831e0a36bca7bbf3ea0517b0f48
i386
ghostscript-8.15.2-9.11.el5.i386.rpm SHA-256: cf214e7cc22aa12b71c159920d706874139f7db59fb8658e8942778d85cfba8c
ghostscript-devel-8.15.2-9.11.el5.i386.rpm SHA-256: 0d55b36590afe68c9d7a95a93bdc160b8780fd7665c203b8d7ef09235d159c74
ghostscript-gtk-8.15.2-9.11.el5.i386.rpm SHA-256: 76e17f824118ed0da115c764d17efce6db22c6347425c6830b1783c168a58231

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility