Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0146 - Security Advisory
Issued:
2008-02-28
Updated:
2008-02-28

RHSA-2008:0146 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: gd security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated gd packages that fix multiple security issues are now available for
Red Hat Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

The gd package contains a graphics library used for the dynamic creation of
images such as PNG and JPEG.

Multiple issues were discovered in the gd GIF image-handling code. A
carefully-crafted GIF file could cause a crash or possibly execute code
with the privileges of the application using the gd library.
(CVE-2006-4484, CVE-2007-3475, CVE-2007-3476)

An integer overflow was discovered in the gdImageCreateTrueColor()
function, leading to incorrect memory allocations. A carefully crafted
image could cause a crash or possibly execute code with the privileges of
the application using the gd library. (CVE-2007-3472)

A buffer over-read flaw was discovered. This could cause a crash in an
application using the gd library to render certain strings using a
JIS-encoded font. (CVE-2007-0455)

A flaw was discovered in the gd PNG image handling code. A truncated PNG
image could cause an infinite loop in an application using the gd library.
(CVE-2007-2756)

A flaw was discovered in the gd X BitMap (XBM) image-handling code. A
malformed or truncated XBM image could cause a crash in an application
using the gd library. (CVE-2007-3473)

Users of gd should upgrade to these updated packages, which contain
backported patches which resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 224607 - CVE-2007-0455 gd buffer overrun
  • BZ - 242033 - CVE-2007-2756 gd / php-gd ImageCreateFromPng infinite loop caused by truncated PNG
  • BZ - 276751 - CVE-2007-3472 libgd Integer overflow in TrueColor code
  • BZ - 276791 - CVE-2007-3473 libgd NULL pointer dereference when reading a corrupt X bitmap
  • BZ - 277181 - CVE-2007-3475 libgd Denial of service by GIF images without a global color map
  • BZ - 277201 - CVE-2007-3476 libgd Denial of service by corrupted GIF images
  • BZ - 431568 - CVE-2006-4484 gd: GIF handling buffer overflow

CVEs

  • CVE-2006-4484
  • CVE-2007-0455
  • CVE-2007-2756
  • CVE-2007-3472
  • CVE-2007-3473
  • CVE-2007-3475
  • CVE-2007-3476

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
gd-2.0.33-9.4.el5_1.1.src.rpm SHA-256: be0ce3b954d34e8619b4297474c5d6a7bbf31e381ea66265d07bc3cad5c44343
x86_64
gd-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 5390e00f1c7a264832435761de566513e71c3597cbafa3b6230fb2ee094bd5fa
gd-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: 8e976c99d0f733275157e992952458412f528e112316e17822ff5d73452b0132
gd-devel-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 61e1d1a546ffa3906dcb8fbc5c9276a20930aa9540ced4e41f4f5dbda712fd07
gd-devel-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: dbe5b25b725e97416196864d1d17da7a9709b31072473fedf616bf52841e58f0
gd-progs-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: 306c8c3af21d94ee560fb268d70b8ea7007ff401dd9783374217a2b236165929
ia64
gd-2.0.33-9.4.el5_1.1.ia64.rpm SHA-256: 383c322c585694a9fc989b22a9e6074d78e2c2cf317eefe45c557e3e9011f087
gd-devel-2.0.33-9.4.el5_1.1.ia64.rpm SHA-256: d3059fddf9bf0515f3b2889d180eed898b6cc8b49f88e45d159e0c50ec73e39e
gd-progs-2.0.33-9.4.el5_1.1.ia64.rpm SHA-256: 4a04fe6df1e95470c560bd4a48c9f147da587572909f3c95a355ce954dfe46a4
i386
gd-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 5390e00f1c7a264832435761de566513e71c3597cbafa3b6230fb2ee094bd5fa
gd-devel-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 61e1d1a546ffa3906dcb8fbc5c9276a20930aa9540ced4e41f4f5dbda712fd07
gd-progs-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 3afc4f12f8ae9db3a43047b0245a11481b284e2954f8ff23609bad25bc2d8e4d

Red Hat Enterprise Linux Server 4

SRPM
gd-2.0.28-5.4E.el4_6.1.src.rpm SHA-256: 0adb730442757067fdde8af076c0fa6ca0f5d09a42bd6c0a6f38f9d3bdf27775
x86_64
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: a25d2ac75dbc68e06486cad4bfd877df98946fab5a449323a0678f357c83117b
gd-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: a25d2ac75dbc68e06486cad4bfd877df98946fab5a449323a0678f357c83117b
gd-devel-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 01211cc6f7dfb4d31bd237ddea106a73f062308285a4d90d33d9c3cbfd631aa5
gd-devel-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 01211cc6f7dfb4d31bd237ddea106a73f062308285a4d90d33d9c3cbfd631aa5
gd-progs-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 62f052bed5a4fcdc11a26d0e018c61395e1875bc8d737c1fbb0cd3cb06744c18
gd-progs-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 62f052bed5a4fcdc11a26d0e018c61395e1875bc8d737c1fbb0cd3cb06744c18
ia64
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: 0d7aab34e08a6a449ebc0bc1298ae08b914405c451243138f5b0b263ab7898cb
gd-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: 0d7aab34e08a6a449ebc0bc1298ae08b914405c451243138f5b0b263ab7898cb
gd-devel-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: bae542f017fbc6f763c0185a057dd8ef934ca786b5d1d256ad094309292049fd
gd-devel-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: bae542f017fbc6f763c0185a057dd8ef934ca786b5d1d256ad094309292049fd
gd-progs-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: 4b045dd5b429347e0eddeb2e4cf3a924bc2ab3128126fda93f6740ac39d1cf53
gd-progs-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: 4b045dd5b429347e0eddeb2e4cf3a924bc2ab3128126fda93f6740ac39d1cf53
i386
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-devel-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: 72338af4bbf80c30f84c90b0f186b53332fdddcbcdf10ffb7da285b92c307fbf
gd-devel-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: 72338af4bbf80c30f84c90b0f186b53332fdddcbcdf10ffb7da285b92c307fbf
gd-progs-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: d017b4debc847920c59779d73f0a631ca0cb932a08341a2fcff86b8c959c2b0c
gd-progs-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: d017b4debc847920c59779d73f0a631ca0cb932a08341a2fcff86b8c959c2b0c

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6

SRPM
gd-2.0.28-5.4E.el4_6.1.src.rpm SHA-256: 0adb730442757067fdde8af076c0fa6ca0f5d09a42bd6c0a6f38f9d3bdf27775
x86_64
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: a25d2ac75dbc68e06486cad4bfd877df98946fab5a449323a0678f357c83117b
gd-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: a25d2ac75dbc68e06486cad4bfd877df98946fab5a449323a0678f357c83117b
gd-devel-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 01211cc6f7dfb4d31bd237ddea106a73f062308285a4d90d33d9c3cbfd631aa5
gd-devel-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 01211cc6f7dfb4d31bd237ddea106a73f062308285a4d90d33d9c3cbfd631aa5
gd-progs-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 62f052bed5a4fcdc11a26d0e018c61395e1875bc8d737c1fbb0cd3cb06744c18
gd-progs-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 62f052bed5a4fcdc11a26d0e018c61395e1875bc8d737c1fbb0cd3cb06744c18
ia64
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: 0d7aab34e08a6a449ebc0bc1298ae08b914405c451243138f5b0b263ab7898cb
gd-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: 0d7aab34e08a6a449ebc0bc1298ae08b914405c451243138f5b0b263ab7898cb
gd-devel-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: bae542f017fbc6f763c0185a057dd8ef934ca786b5d1d256ad094309292049fd
gd-devel-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: bae542f017fbc6f763c0185a057dd8ef934ca786b5d1d256ad094309292049fd
gd-progs-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: 4b045dd5b429347e0eddeb2e4cf3a924bc2ab3128126fda93f6740ac39d1cf53
gd-progs-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: 4b045dd5b429347e0eddeb2e4cf3a924bc2ab3128126fda93f6740ac39d1cf53
i386
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-devel-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: 72338af4bbf80c30f84c90b0f186b53332fdddcbcdf10ffb7da285b92c307fbf
gd-devel-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: 72338af4bbf80c30f84c90b0f186b53332fdddcbcdf10ffb7da285b92c307fbf
gd-progs-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: d017b4debc847920c59779d73f0a631ca0cb932a08341a2fcff86b8c959c2b0c
gd-progs-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: d017b4debc847920c59779d73f0a631ca0cb932a08341a2fcff86b8c959c2b0c

Red Hat Enterprise Linux Workstation 5

SRPM
gd-2.0.33-9.4.el5_1.1.src.rpm SHA-256: be0ce3b954d34e8619b4297474c5d6a7bbf31e381ea66265d07bc3cad5c44343
x86_64
gd-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 5390e00f1c7a264832435761de566513e71c3597cbafa3b6230fb2ee094bd5fa
gd-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: 8e976c99d0f733275157e992952458412f528e112316e17822ff5d73452b0132
gd-devel-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 61e1d1a546ffa3906dcb8fbc5c9276a20930aa9540ced4e41f4f5dbda712fd07
gd-devel-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: dbe5b25b725e97416196864d1d17da7a9709b31072473fedf616bf52841e58f0
gd-progs-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: 306c8c3af21d94ee560fb268d70b8ea7007ff401dd9783374217a2b236165929
i386
gd-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 5390e00f1c7a264832435761de566513e71c3597cbafa3b6230fb2ee094bd5fa
gd-devel-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 61e1d1a546ffa3906dcb8fbc5c9276a20930aa9540ced4e41f4f5dbda712fd07
gd-progs-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 3afc4f12f8ae9db3a43047b0245a11481b284e2954f8ff23609bad25bc2d8e4d

Red Hat Enterprise Linux Workstation 4

SRPM
gd-2.0.28-5.4E.el4_6.1.src.rpm SHA-256: 0adb730442757067fdde8af076c0fa6ca0f5d09a42bd6c0a6f38f9d3bdf27775
x86_64
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: a25d2ac75dbc68e06486cad4bfd877df98946fab5a449323a0678f357c83117b
gd-devel-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 01211cc6f7dfb4d31bd237ddea106a73f062308285a4d90d33d9c3cbfd631aa5
gd-progs-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 62f052bed5a4fcdc11a26d0e018c61395e1875bc8d737c1fbb0cd3cb06744c18
ia64
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: 0d7aab34e08a6a449ebc0bc1298ae08b914405c451243138f5b0b263ab7898cb
gd-devel-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: bae542f017fbc6f763c0185a057dd8ef934ca786b5d1d256ad094309292049fd
gd-progs-2.0.28-5.4E.el4_6.1.ia64.rpm SHA-256: 4b045dd5b429347e0eddeb2e4cf3a924bc2ab3128126fda93f6740ac39d1cf53
i386
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-devel-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: 72338af4bbf80c30f84c90b0f186b53332fdddcbcdf10ffb7da285b92c307fbf
gd-progs-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: d017b4debc847920c59779d73f0a631ca0cb932a08341a2fcff86b8c959c2b0c

Red Hat Enterprise Linux Desktop 5

SRPM
gd-2.0.33-9.4.el5_1.1.src.rpm SHA-256: be0ce3b954d34e8619b4297474c5d6a7bbf31e381ea66265d07bc3cad5c44343
x86_64
gd-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 5390e00f1c7a264832435761de566513e71c3597cbafa3b6230fb2ee094bd5fa
gd-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: 8e976c99d0f733275157e992952458412f528e112316e17822ff5d73452b0132
gd-progs-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: 306c8c3af21d94ee560fb268d70b8ea7007ff401dd9783374217a2b236165929
i386
gd-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 5390e00f1c7a264832435761de566513e71c3597cbafa3b6230fb2ee094bd5fa
gd-progs-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 3afc4f12f8ae9db3a43047b0245a11481b284e2954f8ff23609bad25bc2d8e4d

Red Hat Enterprise Linux Desktop 4

SRPM
gd-2.0.28-5.4E.el4_6.1.src.rpm SHA-256: 0adb730442757067fdde8af076c0fa6ca0f5d09a42bd6c0a6f38f9d3bdf27775
x86_64
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: a25d2ac75dbc68e06486cad4bfd877df98946fab5a449323a0678f357c83117b
gd-devel-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 01211cc6f7dfb4d31bd237ddea106a73f062308285a4d90d33d9c3cbfd631aa5
gd-progs-2.0.28-5.4E.el4_6.1.x86_64.rpm SHA-256: 62f052bed5a4fcdc11a26d0e018c61395e1875bc8d737c1fbb0cd3cb06744c18
i386
gd-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: e228565fa38b10c040b03a341a946939865c92386811c9be6aa70226c52f4945
gd-devel-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: 72338af4bbf80c30f84c90b0f186b53332fdddcbcdf10ffb7da285b92c307fbf
gd-progs-2.0.28-5.4E.el4_6.1.i386.rpm SHA-256: d017b4debc847920c59779d73f0a631ca0cb932a08341a2fcff86b8c959c2b0c

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
gd-2.0.33-9.4.el5_1.1.src.rpm SHA-256: be0ce3b954d34e8619b4297474c5d6a7bbf31e381ea66265d07bc3cad5c44343
s390x
gd-2.0.33-9.4.el5_1.1.s390.rpm SHA-256: 239e215a80963708cc66ce943c3544d358a0282e5130a8624ebfc19929046c76
gd-2.0.33-9.4.el5_1.1.s390x.rpm SHA-256: b524c1aa95063dc4985456d40cb5e2ec80d381a8f09b1d0a1d9517f6a21ed740
gd-devel-2.0.33-9.4.el5_1.1.s390.rpm SHA-256: f912ebf21f20664110c09927ffe9a2b2283d9805ad8ec572adc87e97ed585cff
gd-devel-2.0.33-9.4.el5_1.1.s390x.rpm SHA-256: 0c778c4e4af560d3cb40ae7c9c4d2bb6201a3cb44c1e6ad4089ad84d56564703
gd-progs-2.0.33-9.4.el5_1.1.s390x.rpm SHA-256: 9fdadfae3780f5a5fb68a81f0550babb5941b661eea76f10f1e716aa3d49bf0e

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
gd-2.0.28-5.4E.el4_6.1.src.rpm SHA-256: 0adb730442757067fdde8af076c0fa6ca0f5d09a42bd6c0a6f38f9d3bdf27775
s390x
gd-2.0.28-5.4E.el4_6.1.s390.rpm SHA-256: 9f7a7b45993843a4756ce03a535079be102010ae13e65625120270f82f64d876
gd-2.0.28-5.4E.el4_6.1.s390x.rpm SHA-256: 31fa4155a8f1048b4ab629ec0bcd4fd6a23cbe224e9d50ea121dc2265028cd7d
gd-devel-2.0.28-5.4E.el4_6.1.s390x.rpm SHA-256: 929d95e8ac8b6b6df0befbf54b4ae87e066ac71e186b9f116752f33d5142671e
gd-progs-2.0.28-5.4E.el4_6.1.s390x.rpm SHA-256: 51ba71bc97c648c9fc63ba88c47e4c524dfc389bf5df7ad5f376c5cf17cea7e5
s390
gd-2.0.28-5.4E.el4_6.1.s390.rpm SHA-256: 9f7a7b45993843a4756ce03a535079be102010ae13e65625120270f82f64d876
gd-devel-2.0.28-5.4E.el4_6.1.s390.rpm SHA-256: a5fbeaefb7234feb1e069f680f18cbd9e2a02df252c7bd573e69bf9b3e98e30c
gd-progs-2.0.28-5.4E.el4_6.1.s390.rpm SHA-256: fa8fe549ad44c85e6c051fcf789212134ca63a374c465df4e6ca58ec762fe889

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1

SRPM
s390x

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6

SRPM
gd-2.0.28-5.4E.el4_6.1.src.rpm SHA-256: 0adb730442757067fdde8af076c0fa6ca0f5d09a42bd6c0a6f38f9d3bdf27775
s390x
gd-2.0.28-5.4E.el4_6.1.s390.rpm SHA-256: 9f7a7b45993843a4756ce03a535079be102010ae13e65625120270f82f64d876
gd-2.0.28-5.4E.el4_6.1.s390x.rpm SHA-256: 31fa4155a8f1048b4ab629ec0bcd4fd6a23cbe224e9d50ea121dc2265028cd7d
gd-devel-2.0.28-5.4E.el4_6.1.s390x.rpm SHA-256: 929d95e8ac8b6b6df0befbf54b4ae87e066ac71e186b9f116752f33d5142671e
gd-progs-2.0.28-5.4E.el4_6.1.s390x.rpm SHA-256: 51ba71bc97c648c9fc63ba88c47e4c524dfc389bf5df7ad5f376c5cf17cea7e5
s390
gd-2.0.28-5.4E.el4_6.1.s390.rpm SHA-256: 9f7a7b45993843a4756ce03a535079be102010ae13e65625120270f82f64d876
gd-devel-2.0.28-5.4E.el4_6.1.s390.rpm SHA-256: a5fbeaefb7234feb1e069f680f18cbd9e2a02df252c7bd573e69bf9b3e98e30c
gd-progs-2.0.28-5.4E.el4_6.1.s390.rpm SHA-256: fa8fe549ad44c85e6c051fcf789212134ca63a374c465df4e6ca58ec762fe889

Red Hat Enterprise Linux for Power, big endian 5

SRPM
gd-2.0.33-9.4.el5_1.1.src.rpm SHA-256: be0ce3b954d34e8619b4297474c5d6a7bbf31e381ea66265d07bc3cad5c44343
ppc
gd-2.0.33-9.4.el5_1.1.ppc.rpm SHA-256: 0bd369441780162ba51b85316dc851409db5ebfafaa4b5283087d3878ef2aa77
gd-2.0.33-9.4.el5_1.1.ppc64.rpm SHA-256: 921c614d5be2d0be411601ad36ff175095eb9ae8a4e3819fe48a52f563bec7bf
gd-devel-2.0.33-9.4.el5_1.1.ppc.rpm SHA-256: d0a13ec66f76c27209c492c63f5e0f20ae3f959c1bfdfadd7f934c6f15292726
gd-devel-2.0.33-9.4.el5_1.1.ppc64.rpm SHA-256: 87a0f83dfb599997195da0b876c525c0c55f7761e8c3207849f10545d967b951
gd-progs-2.0.33-9.4.el5_1.1.ppc.rpm SHA-256: 54f42a7fc453c4ccde720480206125ea24692097e6e084aa7a99978aeb876065

Red Hat Enterprise Linux for Power, big endian 4

SRPM
gd-2.0.28-5.4E.el4_6.1.src.rpm SHA-256: 0adb730442757067fdde8af076c0fa6ca0f5d09a42bd6c0a6f38f9d3bdf27775
ppc
gd-2.0.28-5.4E.el4_6.1.ppc.rpm SHA-256: 7b121432a51de7d5bb0aaf8a4929196eea2234c0d4ccdba177b9a4bb9854ddb4
gd-2.0.28-5.4E.el4_6.1.ppc64.rpm SHA-256: 2da26f4572447ef685fe2398a077ed9afceb0b06994bfea26146aa3739c7212d
gd-devel-2.0.28-5.4E.el4_6.1.ppc.rpm SHA-256: 7428ce7d02876cf156faf0f4cb0fe36403c7a598afc6789940db4c9ac8af507a
gd-progs-2.0.28-5.4E.el4_6.1.ppc.rpm SHA-256: 5923dc00c8ab4c877de1545f1fe3f7e910cc52503c85e6e440def69ecad37e8b

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6

SRPM
gd-2.0.28-5.4E.el4_6.1.src.rpm SHA-256: 0adb730442757067fdde8af076c0fa6ca0f5d09a42bd6c0a6f38f9d3bdf27775
ppc
gd-2.0.28-5.4E.el4_6.1.ppc.rpm SHA-256: 7b121432a51de7d5bb0aaf8a4929196eea2234c0d4ccdba177b9a4bb9854ddb4
gd-2.0.28-5.4E.el4_6.1.ppc64.rpm SHA-256: 2da26f4572447ef685fe2398a077ed9afceb0b06994bfea26146aa3739c7212d
gd-devel-2.0.28-5.4E.el4_6.1.ppc.rpm SHA-256: 7428ce7d02876cf156faf0f4cb0fe36403c7a598afc6789940db4c9ac8af507a
gd-progs-2.0.28-5.4E.el4_6.1.ppc.rpm SHA-256: 5923dc00c8ab4c877de1545f1fe3f7e910cc52503c85e6e440def69ecad37e8b

Red Hat Enterprise Linux Server from RHUI 5

SRPM
gd-2.0.33-9.4.el5_1.1.src.rpm SHA-256: be0ce3b954d34e8619b4297474c5d6a7bbf31e381ea66265d07bc3cad5c44343
x86_64
gd-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 5390e00f1c7a264832435761de566513e71c3597cbafa3b6230fb2ee094bd5fa
gd-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: 8e976c99d0f733275157e992952458412f528e112316e17822ff5d73452b0132
gd-devel-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 61e1d1a546ffa3906dcb8fbc5c9276a20930aa9540ced4e41f4f5dbda712fd07
gd-devel-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: dbe5b25b725e97416196864d1d17da7a9709b31072473fedf616bf52841e58f0
gd-progs-2.0.33-9.4.el5_1.1.x86_64.rpm SHA-256: 306c8c3af21d94ee560fb268d70b8ea7007ff401dd9783374217a2b236165929
i386
gd-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 5390e00f1c7a264832435761de566513e71c3597cbafa3b6230fb2ee094bd5fa
gd-devel-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 61e1d1a546ffa3906dcb8fbc5c9276a20930aa9540ced4e41f4f5dbda712fd07
gd-progs-2.0.33-9.4.el5_1.1.i386.rpm SHA-256: 3afc4f12f8ae9db3a43047b0245a11481b284e2954f8ff23609bad25bc2d8e4d

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility