An update for ghostscript is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impact ofModerate.

A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
The Ghostscript suite contains utilities for rendering PostScript and PDFdocuments.

Ghostscript translates PostScript code to common bitmap formats sothat the code can be displayed or printed.Security Fix(es):* It was found that the ghostscript functions getenv, filenameforall and.libfile did not honor the -dSAFER option, usually used when processinguntrusted documents, leading to information disclosure.

A specially craftedpostscript document could read environment variable, list directory and retrievefile content respectively, from the target. (CVE-2013-5653, CVE-2016-7977)* It was found that the ghostscript function .setdevice suffered ause-after-free vulnerability due to an incorrect reference count.

A speciallycrafted postscript document could trigger code execution in the context of thegs process. (CVE-2016-7978)* It was found that the ghostscript function .initialize_dsc_parser did notvalidate its parameter before using it, allowing a type confusion flaw.

Aspecially crafted postscript document could cause a crash code execution in thecontext of the gs process. (CVE-2016-7979)* It was found that ghostscript did not sufficiently check the validity ofparameters given to the .sethalftone5 function.

A specially crafted postscriptdocument could cause a crash, or execute arbitrary code in the context of the gsprocess. (CVE-2016-8602)
Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
ghostscript-9.07-20.el7_3.1.src.rpm
    MD5: dea26b55613c6f15352eaf6773880b1eSHA-256: 5d6ec482ec5824f23e91674bcee06ea7876510e5ce398c29c01002c3f5409c57
 
x86_64:
ghostscript-9.07-20.el7_3.1.i686.rpm
    MD5: 88e4d0367683c9dd122f70098b53df68SHA-256: 7184576e1a52069d60e6c47db88305603dcd14a2d8a65bc4185fae99e97defdc
ghostscript-9.07-20.el7_3.1.x86_64.rpm
    MD5: 077d4e144e9ae0650437f0b503a594dcSHA-256: 4277836b8c275c10ea8f057fe00f92e498d6be4fb2c1516a4588cc0d4e6d3042
ghostscript-cups-9.07-20.el7_3.1.x86_64.rpm
    MD5: bbdb4682f6fe820f99b1204e3fc12007SHA-256: 164928a4174df13cab9c084fd1b031d01dddd75b6279ae6b74a267cd62995f28
ghostscript-debuginfo-9.07-20.el7_3.1.i686.rpm
    MD5: b772841d53ce7e9045f0b01326d3dc01SHA-256: ad66574f5aa9935279820153ccf987e3128f85ed4a1743a1cceec238e9e1fe49
ghostscript-debuginfo-9.07-20.el7_3.1.x86_64.rpm
    MD5: 3efa812e601f295d9aeb1302305559c5SHA-256: 0e122fc4bc4f8b95cc82540746800cf5fe9995504e70c0636486f7ae09e688d9
ghostscript-devel-9.07-20.el7_3.1.i686.rpm
    MD5: 0b7af4db9dada5985de4e9a5f399bee4SHA-256: c93240704eaca8a7e8ad8de7294d6f26a94f3e17b4101920cda337bf4ae8a914
ghostscript-devel-9.07-20.el7_3.1.x86_64.rpm
    MD5: e8d830e3800c89afd8e174a49aa5395aSHA-256: fa275a34edfc90504a8e1242d116252469f98534a29fb71624e44c61cab5b2bd
ghostscript-doc-9.07-20.el7_3.1.noarch.rpm
    MD5: 3ecb96beef5200c1db0041a4a7c10699SHA-256: fe4a9211a648d5613df1a1aeff56982b6fb15012cba38bf6e9145f2a7933141f
ghostscript-gtk-9.07-20.el7_3.1.x86_64.rpm
    MD5: 02f48f4773345d49b5f6f72d1a80f509SHA-256: f951d6c98a603b6f735c8161504757344466a283c7ba77a54999827f0f77f8e7
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
ghostscript-9.07-20.el7_3.1.src.rpm
    MD5: dea26b55613c6f15352eaf6773880b1eSHA-256: 5d6ec482ec5824f23e91674bcee06ea7876510e5ce398c29c01002c3f5409c57
 
x86_64:
ghostscript-9.07-20.el7_3.1.i686.rpm
    MD5: 88e4d0367683c9dd122f70098b53df68SHA-256: 7184576e1a52069d60e6c47db88305603dcd14a2d8a65bc4185fae99e97defdc
ghostscript-9.07-20.el7_3.1.x86_64.rpm
    MD5: 077d4e144e9ae0650437f0b503a594dcSHA-256: 4277836b8c275c10ea8f057fe00f92e498d6be4fb2c1516a4588cc0d4e6d3042
ghostscript-cups-9.07-20.el7_3.1.x86_64.rpm
    MD5: bbdb4682f6fe820f99b1204e3fc12007SHA-256: 164928a4174df13cab9c084fd1b031d01dddd75b6279ae6b74a267cd62995f28
ghostscript-debuginfo-9.07-20.el7_3.1.i686.rpm
    MD5: b772841d53ce7e9045f0b01326d3dc01SHA-256: ad66574f5aa9935279820153ccf987e3128f85ed4a1743a1cceec238e9e1fe49
ghostscript-debuginfo-9.07-20.el7_3.1.x86_64.rpm
    MD5: 3efa812e601f295d9aeb1302305559c5SHA-256: 0e122fc4bc4f8b95cc82540746800cf5fe9995504e70c0636486f7ae09e688d9
ghostscript-devel-9.07-20.el7_3.1.i686.rpm
    MD5: 0b7af4db9dada5985de4e9a5f399bee4SHA-256: c93240704eaca8a7e8ad8de7294d6f26a94f3e17b4101920cda337bf4ae8a914
ghostscript-devel-9.07-20.el7_3.1.x86_64.rpm
    MD5: e8d830e3800c89afd8e174a49aa5395aSHA-256: fa275a34edfc90504a8e1242d116252469f98534a29fb71624e44c61cab5b2bd
ghostscript-doc-9.07-20.el7_3.1.noarch.rpm
    MD5: 3ecb96beef5200c1db0041a4a7c10699SHA-256: fe4a9211a648d5613df1a1aeff56982b6fb15012cba38bf6e9145f2a7933141f
ghostscript-gtk-9.07-20.el7_3.1.x86_64.rpm
    MD5: 02f48f4773345d49b5f6f72d1a80f509SHA-256: f951d6c98a603b6f735c8161504757344466a283c7ba77a54999827f0f77f8e7
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
ghostscript-9.07-20.el7_3.1.src.rpm
    MD5: dea26b55613c6f15352eaf6773880b1eSHA-256: 5d6ec482ec5824f23e91674bcee06ea7876510e5ce398c29c01002c3f5409c57
 
PPC:
ghostscript-9.07-20.el7_3.1.ppc.rpm
    MD5: 5d08ea00fa02d30117a47b6b70fe22c3SHA-256: e74986fbfbb618322aa81de9221a3f15a02ba030d3d2a6ecd6d4260ee92f5455
ghostscript-9.07-20.el7_3.1.ppc64.rpm
    MD5: dc72995fa41532dd486952d6cf0808dbSHA-256: 51a737250241dc2f1bec57500cb100639c923c1a420c96891a0eefc07f8f1c85
ghostscript-cups-9.07-20.el7_3.1.ppc64.rpm
    MD5: c9a06b3b6379734f48917ff1efa36feaSHA-256: 20d27d27c8a5062d698b1b2bcb067d6e3978ecedc46d091dcb7bd55d6f1b6df3
ghostscript-debuginfo-9.07-20.el7_3.1.ppc.rpm
    MD5: 98300f93e3cdb01256fddbbffcbf19ceSHA-256: cb17de73b789df5ae5b604b11f8fa85d3330791ac3529db18fb7c592b5eca9b2
ghostscript-debuginfo-9.07-20.el7_3.1.ppc64.rpm
    MD5: 3e5b1b39ddcecbe13020da1080e53cfdSHA-256: 4b27fcf505ab971d9c75d781d5975a58a4640ca613220439d9abb9fc10472745
ghostscript-devel-9.07-20.el7_3.1.ppc.rpm
    MD5: 32b4dc7e4602151be1872c0195cb9618SHA-256: 956670fc61424b88a19989750433530d440c854659a02db008ab415f5533903b
ghostscript-devel-9.07-20.el7_3.1.ppc64.rpm
    MD5: d33312870ccaf37dbd23581dba646f39SHA-256: 6905fbf49aa1ca938b4949a5028cc2cf915ea6ecd61123e9ba27530b62916a56
ghostscript-doc-9.07-20.el7_3.1.noarch.rpm
    MD5: 3ecb96beef5200c1db0041a4a7c10699SHA-256: fe4a9211a648d5613df1a1aeff56982b6fb15012cba38bf6e9145f2a7933141f
ghostscript-gtk-9.07-20.el7_3.1.ppc64.rpm
    MD5: 6c9e54a0abeeb9ab7183e5f87f351226SHA-256: 4caed5a1dcdff57bc58c0e820801d12d2e54ef5c47d2951169623724a5b3dbbb
 
PPC64LE:
ghostscript-9.07-20.el7_3.1.ppc64le.rpm
    MD5: 5a816e8005c2fa3adb558feb5785fc39SHA-256: b62256a81a0f19f4aa3e6ee20063c894dce166bfdc83ee880fa7583842758cf1
ghostscript-cups-9.07-20.el7_3.1.ppc64le.rpm
    MD5: 98b8c6be813ec1be2bd85fb6a05feafaSHA-256: da3702df6f11f5d5e055616f5281da6384aaf69f1932702da04cf76154bbc47a
ghostscript-debuginfo-9.07-20.el7_3.1.ppc64le.rpm
    MD5: c99bde8d804d4dd956024d7fcd0b65b5SHA-256: d514d6bac3d6966f81379c67d45753898d8be735d53ad11337287172f852ab40
ghostscript-devel-9.07-20.el7_3.1.ppc64le.rpm
    MD5: 58d679989dbb53f71dafcb0cb835941dSHA-256: fe26eda86c7bca389f6bb1f33ec1027401730c242f04d2af288cbd5091eb8cc4
ghostscript-doc-9.07-20.el7_3.1.noarch.rpm
    MD5: 3ecb96beef5200c1db0041a4a7c10699SHA-256: fe4a9211a648d5613df1a1aeff56982b6fb15012cba38bf6e9145f2a7933141f
ghostscript-gtk-9.07-20.el7_3.1.ppc64le.rpm
    MD5: fb6d661d8a1a7a23c5cc76a9087bb7b1SHA-256: ba3128fc04805cccb0a854e0a9951f8acdf8163bcef0d74c6a52adcd628ac596
 
s390x:
ghostscript-9.07-20.el7_3.1.s390.rpm
    MD5: bfcaaef29fb5c2a6dd161259f97980eaSHA-256: 8c6778a2a3bd139f706e7f6c0d29207cc3764de5f446240f78ae1aa22a23baf9
ghostscript-9.07-20.el7_3.1.s390x.rpm
    MD5: f26d68dcf97c50f1428102367a760b65SHA-256: 98abe9c6b32fb03f2467d7fbe4c7c13d52ed4ecefb07005d5f5f17731a37b9fd
ghostscript-cups-9.07-20.el7_3.1.s390x.rpm
    MD5: 8e2d3bf4c7c4ec6b1519aa628d89a4c9SHA-256: 224a64d9658774066e1dd2ac379470040eb0b94d166ebccf9d7e812378b3dfdb
ghostscript-debuginfo-9.07-20.el7_3.1.s390.rpm
    MD5: 27d3a6eb8e1fd58f9bb79673c24d98b6SHA-256: a02922e3c715ff836a6cff6826c52f059b211f4a1e78f7ebbfd71262deffbafb
ghostscript-debuginfo-9.07-20.el7_3.1.s390x.rpm
    MD5: 4ef7ec86888ecc6c2b91a54c75adaff6SHA-256: 331c16ef7916bf2337c3141445256c0b8e47faca751c5f3c2e472848c1552097
ghostscript-devel-9.07-20.el7_3.1.s390.rpm
    MD5: ac7f81425cb469e3ff4b4b50750e444aSHA-256: 8b1b43c25aef2a233c8946dce2ce7dd3b623b3cb17bb19a8641070923b1ba1fb
ghostscript-devel-9.07-20.el7_3.1.s390x.rpm
    MD5: c754a7d1a1c813ceb6ceca38bf519e29SHA-256: 9556005a6d56da11832a229d6f61df31703378a1e517aa2901a2847235fb6a3a
ghostscript-doc-9.07-20.el7_3.1.noarch.rpm
    MD5: 3ecb96beef5200c1db0041a4a7c10699SHA-256: fe4a9211a648d5613df1a1aeff56982b6fb15012cba38bf6e9145f2a7933141f
ghostscript-gtk-9.07-20.el7_3.1.s390x.rpm
    MD5: 8faaa9f691df33770c351698382381b4SHA-256: 245df5e09c64ad10b1fc52283df77e670fe9dfb4d48f21eace4ea5b84422e353
 
x86_64:
ghostscript-9.07-20.el7_3.1.i686.rpm
    MD5: 88e4d0367683c9dd122f70098b53df68SHA-256: 7184576e1a52069d60e6c47db88305603dcd14a2d8a65bc4185fae99e97defdc
ghostscript-9.07-20.el7_3.1.x86_64.rpm
    MD5: 077d4e144e9ae0650437f0b503a594dcSHA-256: 4277836b8c275c10ea8f057fe00f92e498d6be4fb2c1516a4588cc0d4e6d3042
ghostscript-cups-9.07-20.el7_3.1.x86_64.rpm
    MD5: bbdb4682f6fe820f99b1204e3fc12007SHA-256: 164928a4174df13cab9c084fd1b031d01dddd75b6279ae6b74a267cd62995f28
ghostscript-debuginfo-9.07-20.el7_3.1.i686.rpm
    MD5: b772841d53ce7e9045f0b01326d3dc01SHA-256: ad66574f5aa9935279820153ccf987e3128f85ed4a1743a1cceec238e9e1fe49
ghostscript-debuginfo-9.07-20.el7_3.1.x86_64.rpm
    MD5: 3efa812e601f295d9aeb1302305559c5SHA-256: 0e122fc4bc4f8b95cc82540746800cf5fe9995504e70c0636486f7ae09e688d9
ghostscript-devel-9.07-20.el7_3.1.i686.rpm
    MD5: 0b7af4db9dada5985de4e9a5f399bee4SHA-256: c93240704eaca8a7e8ad8de7294d6f26a94f3e17b4101920cda337bf4ae8a914
ghostscript-devel-9.07-20.el7_3.1.x86_64.rpm
    MD5: e8d830e3800c89afd8e174a49aa5395aSHA-256: fa275a34edfc90504a8e1242d116252469f98534a29fb71624e44c61cab5b2bd
ghostscript-doc-9.07-20.el7_3.1.noarch.rpm
    MD5: 3ecb96beef5200c1db0041a4a7c10699SHA-256: fe4a9211a648d5613df1a1aeff56982b6fb15012cba38bf6e9145f2a7933141f
ghostscript-gtk-9.07-20.el7_3.1.x86_64.rpm
    MD5: 02f48f4773345d49b5f6f72d1a80f509SHA-256: f951d6c98a603b6f735c8161504757344466a283c7ba77a54999827f0f77f8e7
 
Red Hat Enterprise Linux Server TUS (v. 7.3)

SRPMS:
ghostscript-9.07-20.el7_3.1.src.rpm
    MD5: dea26b55613c6f15352eaf6773880b1eSHA-256: 5d6ec482ec5824f23e91674bcee06ea7876510e5ce398c29c01002c3f5409c57
 
x86_64:
ghostscript-9.07-20.el7_3.1.i686.rpm
    MD5: 88e4d0367683c9dd122f70098b53df68SHA-256: 7184576e1a52069d60e6c47db88305603dcd14a2d8a65bc4185fae99e97defdc
ghostscript-9.07-20.el7_3.1.x86_64.rpm
    MD5: 077d4e144e9ae0650437f0b503a594dcSHA-256: 4277836b8c275c10ea8f057fe00f92e498d6be4fb2c1516a4588cc0d4e6d3042
ghostscript-cups-9.07-20.el7_3.1.x86_64.rpm
    MD5: bbdb4682f6fe820f99b1204e3fc12007SHA-256: 164928a4174df13cab9c084fd1b031d01dddd75b6279ae6b74a267cd62995f28
ghostscript-debuginfo-9.07-20.el7_3.1.i686.rpm
    MD5: b772841d53ce7e9045f0b01326d3dc01SHA-256: ad66574f5aa9935279820153ccf987e3128f85ed4a1743a1cceec238e9e1fe49
ghostscript-debuginfo-9.07-20.el7_3.1.x86_64.rpm
    MD5: 3efa812e601f295d9aeb1302305559c5SHA-256: 0e122fc4bc4f8b95cc82540746800cf5fe9995504e70c0636486f7ae09e688d9
ghostscript-devel-9.07-20.el7_3.1.i686.rpm
    MD5: 0b7af4db9dada5985de4e9a5f399bee4SHA-256: c93240704eaca8a7e8ad8de7294d6f26a94f3e17b4101920cda337bf4ae8a914
ghostscript-devel-9.07-20.el7_3.1.x86_64.rpm
    MD5: e8d830e3800c89afd8e174a49aa5395aSHA-256: fa275a34edfc90504a8e1242d116252469f98534a29fb71624e44c61cab5b2bd
ghostscript-doc-9.07-20.el7_3.1.noarch.rpm
    MD5: 3ecb96beef5200c1db0041a4a7c10699SHA-256: fe4a9211a648d5613df1a1aeff56982b6fb15012cba38bf6e9145f2a7933141f
ghostscript-gtk-9.07-20.el7_3.1.x86_64.rpm
    MD5: 02f48f4773345d49b5f6f72d1a80f509SHA-256: f951d6c98a603b6f735c8161504757344466a283c7ba77a54999827f0f77f8e7
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
ghostscript-9.07-20.el7_3.1.src.rpm
    MD5: dea26b55613c6f15352eaf6773880b1eSHA-256: 5d6ec482ec5824f23e91674bcee06ea7876510e5ce398c29c01002c3f5409c57
 
x86_64:
ghostscript-9.07-20.el7_3.1.i686.rpm
    MD5: 88e4d0367683c9dd122f70098b53df68SHA-256: 7184576e1a52069d60e6c47db88305603dcd14a2d8a65bc4185fae99e97defdc
ghostscript-9.07-20.el7_3.1.x86_64.rpm
    MD5: 077d4e144e9ae0650437f0b503a594dcSHA-256: 4277836b8c275c10ea8f057fe00f92e498d6be4fb2c1516a4588cc0d4e6d3042
ghostscript-cups-9.07-20.el7_3.1.x86_64.rpm
    MD5: bbdb4682f6fe820f99b1204e3fc12007SHA-256: 164928a4174df13cab9c084fd1b031d01dddd75b6279ae6b74a267cd62995f28
ghostscript-debuginfo-9.07-20.el7_3.1.i686.rpm
    MD5: b772841d53ce7e9045f0b01326d3dc01SHA-256: ad66574f5aa9935279820153ccf987e3128f85ed4a1743a1cceec238e9e1fe49
ghostscript-debuginfo-9.07-20.el7_3.1.x86_64.rpm
    MD5: 3efa812e601f295d9aeb1302305559c5SHA-256: 0e122fc4bc4f8b95cc82540746800cf5fe9995504e70c0636486f7ae09e688d9
ghostscript-devel-9.07-20.el7_3.1.i686.rpm
    MD5: 0b7af4db9dada5985de4e9a5f399bee4SHA-256: c93240704eaca8a7e8ad8de7294d6f26a94f3e17b4101920cda337bf4ae8a914
ghostscript-devel-9.07-20.el7_3.1.x86_64.rpm
    MD5: e8d830e3800c89afd8e174a49aa5395aSHA-256: fa275a34edfc90504a8e1242d116252469f98534a29fb71624e44c61cab5b2bd
ghostscript-doc-9.07-20.el7_3.1.noarch.rpm
    MD5: 3ecb96beef5200c1db0041a4a7c10699SHA-256: fe4a9211a648d5613df1a1aeff56982b6fb15012cba38bf6e9145f2a7933141f
ghostscript-gtk-9.07-20.el7_3.1.x86_64.rpm
    MD5: 02f48f4773345d49b5f6f72d1a80f509SHA-256: f951d6c98a603b6f735c8161504757344466a283c7ba77a54999827f0f77f8e7
 
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply