Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0155 - Security Advisory
Issued:
2008-02-27
Updated:
2008-02-27

RHSA-2008:0155 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: ghostscript security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated ghostscript packages that fix a security issue are now available
for Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

Ghostscript is a program for displaying PostScript files, or printing them
to non-PostScript printers.

Chris Evans from the Google Security Team reported a stack-based buffer
overflow flaw in Ghostscript's zseticcspace() function. An attacker could
create a malicious PostScript file that would cause Ghostscript to execute
arbitrary code when opened. (CVE-2008-0411)

These updated packages also fix a bug, which prevented the pxlmono printer
driver from producing valid output on Red Hat Enterprise Linux 4.

All users of ghostscript are advised to upgrade to these updated packages,
which contain a backported patch to resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server 3 x86_64
  • Red Hat Enterprise Linux Server 3 ia64
  • Red Hat Enterprise Linux Server 3 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Workstation 3 x86_64
  • Red Hat Enterprise Linux Workstation 3 ia64
  • Red Hat Enterprise Linux Workstation 3 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux Desktop 3 x86_64
  • Red Hat Enterprise Linux Desktop 3 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems 3 s390x
  • Red Hat Enterprise Linux for IBM z Systems 3 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6 s390
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian 3 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 431536 - CVE-2008-0411 ghostscript: stack-based buffer overflow in .seticcspace operator

CVEs

  • CVE-2008-0411

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
ghostscript-8.15.2-9.1.el5_1.1.src.rpm SHA-256: fe0da299c8ce9927d4aeb11efdadb123e66420cfdb6fa13ae9c2984b91a7bba9
x86_64
ghostscript-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 1532d73cda10a65108f12ed44c2b7f8a84deda64d823781505738a04a1cfbec8
ghostscript-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: e5532ba7b9dcf444703cab13f1fad18ec9c46551b571d077931b2cf48665a9d2
ghostscript-devel-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: a84817b45b41373a0fb1842be1144c80967915fc2fdaca5d17a7948037609bad
ghostscript-devel-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: 6c305182862136fed3b651e76b0587656ad828d93fc9fc79b086b4bca856e6fb
ghostscript-gtk-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: 823c31d603802ab3c1866c053590d8ebc5908d51be70681f9d03add1d481f4ef
ia64
ghostscript-8.15.2-9.1.el5_1.1.ia64.rpm SHA-256: 1616db8745263c14f81a026c76770f73f657dc63dbdbd9327b102e64b53c7eba
ghostscript-devel-8.15.2-9.1.el5_1.1.ia64.rpm SHA-256: 2aa371296b6edef9b140211346b3e05aa93b9fb76ffe11d09c98e7e905cfa9ec
ghostscript-gtk-8.15.2-9.1.el5_1.1.ia64.rpm SHA-256: 1e2dc4687f54815b6afaa5f809015815e166c252b1d4bf2bdf821ffd25533f2e
i386
ghostscript-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 1532d73cda10a65108f12ed44c2b7f8a84deda64d823781505738a04a1cfbec8
ghostscript-devel-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: a84817b45b41373a0fb1842be1144c80967915fc2fdaca5d17a7948037609bad
ghostscript-gtk-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 5569ca15c48e923a74c5c25c827a9bf567570993a6a4ee44283cc31da166f3e9

Red Hat Enterprise Linux Server 4

SRPM
ghostscript-7.07-33.2.el4_6.1.src.rpm SHA-256: 589b1452e2e20ac2fb07ee5ccb21e3b10dbdec196f96b927546f99c145efe1f2
x86_64
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 0c194931eef0e699a42593b6fc5ac887f8a5a03d6d62d56e31ee07a06e4e22a2
ghostscript-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 0c194931eef0e699a42593b6fc5ac887f8a5a03d6d62d56e31ee07a06e4e22a2
ghostscript-devel-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 6fa54db3d71b62fb3e1738dd77caab04476f95aa80ba101be877bbd79dee08c5
ghostscript-devel-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 6fa54db3d71b62fb3e1738dd77caab04476f95aa80ba101be877bbd79dee08c5
ghostscript-gtk-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: c74e306229a3902df4462c357621d109d8df562493f5e023d043177bb5236beb
ghostscript-gtk-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: c74e306229a3902df4462c357621d109d8df562493f5e023d043177bb5236beb
ia64
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.ia64.rpm SHA-256: 434e01a39463cbb7637b64780608d9408b4c5a2a352614405ac873e543ca2300
ghostscript-7.07-33.2.el4_6.1.ia64.rpm SHA-256: 434e01a39463cbb7637b64780608d9408b4c5a2a352614405ac873e543ca2300
ghostscript-devel-7.07-33.2.el4_6.1.ia64.rpm SHA-256: d7b966b1b87456fa71525facca7c3440967df794ff2a770d050386beec75033b
ghostscript-devel-7.07-33.2.el4_6.1.ia64.rpm SHA-256: d7b966b1b87456fa71525facca7c3440967df794ff2a770d050386beec75033b
ghostscript-gtk-7.07-33.2.el4_6.1.ia64.rpm SHA-256: e55b5207e8fa5824a00ab777636f80b434db600b32c5b7ea6bbc32494e026b33
ghostscript-gtk-7.07-33.2.el4_6.1.ia64.rpm SHA-256: e55b5207e8fa5824a00ab777636f80b434db600b32c5b7ea6bbc32494e026b33
i386
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-devel-7.07-33.2.el4_6.1.i386.rpm SHA-256: 90fde041520e8f6e40d183a080b1d37cba1a37cfa48b83554e21a2b8537bed4b
ghostscript-devel-7.07-33.2.el4_6.1.i386.rpm SHA-256: 90fde041520e8f6e40d183a080b1d37cba1a37cfa48b83554e21a2b8537bed4b
ghostscript-gtk-7.07-33.2.el4_6.1.i386.rpm SHA-256: a832f5c05c1506e7513d2a78ad4e239fd6480f90d613f6f7639f285586630d85
ghostscript-gtk-7.07-33.2.el4_6.1.i386.rpm SHA-256: a832f5c05c1506e7513d2a78ad4e239fd6480f90d613f6f7639f285586630d85

Red Hat Enterprise Linux Server 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.6

SRPM
ghostscript-7.07-33.2.el4_6.1.src.rpm SHA-256: 589b1452e2e20ac2fb07ee5ccb21e3b10dbdec196f96b927546f99c145efe1f2
x86_64
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 0c194931eef0e699a42593b6fc5ac887f8a5a03d6d62d56e31ee07a06e4e22a2
ghostscript-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 0c194931eef0e699a42593b6fc5ac887f8a5a03d6d62d56e31ee07a06e4e22a2
ghostscript-devel-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 6fa54db3d71b62fb3e1738dd77caab04476f95aa80ba101be877bbd79dee08c5
ghostscript-devel-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 6fa54db3d71b62fb3e1738dd77caab04476f95aa80ba101be877bbd79dee08c5
ghostscript-gtk-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: c74e306229a3902df4462c357621d109d8df562493f5e023d043177bb5236beb
ghostscript-gtk-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: c74e306229a3902df4462c357621d109d8df562493f5e023d043177bb5236beb
ia64
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.ia64.rpm SHA-256: 434e01a39463cbb7637b64780608d9408b4c5a2a352614405ac873e543ca2300
ghostscript-7.07-33.2.el4_6.1.ia64.rpm SHA-256: 434e01a39463cbb7637b64780608d9408b4c5a2a352614405ac873e543ca2300
ghostscript-devel-7.07-33.2.el4_6.1.ia64.rpm SHA-256: d7b966b1b87456fa71525facca7c3440967df794ff2a770d050386beec75033b
ghostscript-devel-7.07-33.2.el4_6.1.ia64.rpm SHA-256: d7b966b1b87456fa71525facca7c3440967df794ff2a770d050386beec75033b
ghostscript-gtk-7.07-33.2.el4_6.1.ia64.rpm SHA-256: e55b5207e8fa5824a00ab777636f80b434db600b32c5b7ea6bbc32494e026b33
ghostscript-gtk-7.07-33.2.el4_6.1.ia64.rpm SHA-256: e55b5207e8fa5824a00ab777636f80b434db600b32c5b7ea6bbc32494e026b33
i386
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-devel-7.07-33.2.el4_6.1.i386.rpm SHA-256: 90fde041520e8f6e40d183a080b1d37cba1a37cfa48b83554e21a2b8537bed4b
ghostscript-devel-7.07-33.2.el4_6.1.i386.rpm SHA-256: 90fde041520e8f6e40d183a080b1d37cba1a37cfa48b83554e21a2b8537bed4b
ghostscript-gtk-7.07-33.2.el4_6.1.i386.rpm SHA-256: a832f5c05c1506e7513d2a78ad4e239fd6480f90d613f6f7639f285586630d85
ghostscript-gtk-7.07-33.2.el4_6.1.i386.rpm SHA-256: a832f5c05c1506e7513d2a78ad4e239fd6480f90d613f6f7639f285586630d85

Red Hat Enterprise Linux Workstation 5

SRPM
ghostscript-8.15.2-9.1.el5_1.1.src.rpm SHA-256: fe0da299c8ce9927d4aeb11efdadb123e66420cfdb6fa13ae9c2984b91a7bba9
x86_64
ghostscript-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 1532d73cda10a65108f12ed44c2b7f8a84deda64d823781505738a04a1cfbec8
ghostscript-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: e5532ba7b9dcf444703cab13f1fad18ec9c46551b571d077931b2cf48665a9d2
ghostscript-devel-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: a84817b45b41373a0fb1842be1144c80967915fc2fdaca5d17a7948037609bad
ghostscript-devel-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: 6c305182862136fed3b651e76b0587656ad828d93fc9fc79b086b4bca856e6fb
ghostscript-gtk-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: 823c31d603802ab3c1866c053590d8ebc5908d51be70681f9d03add1d481f4ef
i386
ghostscript-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 1532d73cda10a65108f12ed44c2b7f8a84deda64d823781505738a04a1cfbec8
ghostscript-devel-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: a84817b45b41373a0fb1842be1144c80967915fc2fdaca5d17a7948037609bad
ghostscript-gtk-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 5569ca15c48e923a74c5c25c827a9bf567570993a6a4ee44283cc31da166f3e9

Red Hat Enterprise Linux Workstation 4

SRPM
ghostscript-7.07-33.2.el4_6.1.src.rpm SHA-256: 589b1452e2e20ac2fb07ee5ccb21e3b10dbdec196f96b927546f99c145efe1f2
x86_64
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 0c194931eef0e699a42593b6fc5ac887f8a5a03d6d62d56e31ee07a06e4e22a2
ghostscript-devel-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 6fa54db3d71b62fb3e1738dd77caab04476f95aa80ba101be877bbd79dee08c5
ghostscript-gtk-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: c74e306229a3902df4462c357621d109d8df562493f5e023d043177bb5236beb
ia64
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.ia64.rpm SHA-256: 434e01a39463cbb7637b64780608d9408b4c5a2a352614405ac873e543ca2300
ghostscript-devel-7.07-33.2.el4_6.1.ia64.rpm SHA-256: d7b966b1b87456fa71525facca7c3440967df794ff2a770d050386beec75033b
ghostscript-gtk-7.07-33.2.el4_6.1.ia64.rpm SHA-256: e55b5207e8fa5824a00ab777636f80b434db600b32c5b7ea6bbc32494e026b33
i386
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-devel-7.07-33.2.el4_6.1.i386.rpm SHA-256: 90fde041520e8f6e40d183a080b1d37cba1a37cfa48b83554e21a2b8537bed4b
ghostscript-gtk-7.07-33.2.el4_6.1.i386.rpm SHA-256: a832f5c05c1506e7513d2a78ad4e239fd6480f90d613f6f7639f285586630d85

Red Hat Enterprise Linux Workstation 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Desktop 5

SRPM
ghostscript-8.15.2-9.1.el5_1.1.src.rpm SHA-256: fe0da299c8ce9927d4aeb11efdadb123e66420cfdb6fa13ae9c2984b91a7bba9
x86_64
ghostscript-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 1532d73cda10a65108f12ed44c2b7f8a84deda64d823781505738a04a1cfbec8
ghostscript-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: e5532ba7b9dcf444703cab13f1fad18ec9c46551b571d077931b2cf48665a9d2
ghostscript-gtk-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: 823c31d603802ab3c1866c053590d8ebc5908d51be70681f9d03add1d481f4ef
i386
ghostscript-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 1532d73cda10a65108f12ed44c2b7f8a84deda64d823781505738a04a1cfbec8
ghostscript-gtk-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 5569ca15c48e923a74c5c25c827a9bf567570993a6a4ee44283cc31da166f3e9

Red Hat Enterprise Linux Desktop 4

SRPM
ghostscript-7.07-33.2.el4_6.1.src.rpm SHA-256: 589b1452e2e20ac2fb07ee5ccb21e3b10dbdec196f96b927546f99c145efe1f2
x86_64
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 0c194931eef0e699a42593b6fc5ac887f8a5a03d6d62d56e31ee07a06e4e22a2
ghostscript-devel-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: 6fa54db3d71b62fb3e1738dd77caab04476f95aa80ba101be877bbd79dee08c5
ghostscript-gtk-7.07-33.2.el4_6.1.x86_64.rpm SHA-256: c74e306229a3902df4462c357621d109d8df562493f5e023d043177bb5236beb
i386
ghostscript-7.07-33.2.el4_6.1.i386.rpm SHA-256: 1d4b9dc3d63f64d1355df0b83975e55b23a7a01b84ffab19465349dc47fa5788
ghostscript-devel-7.07-33.2.el4_6.1.i386.rpm SHA-256: 90fde041520e8f6e40d183a080b1d37cba1a37cfa48b83554e21a2b8537bed4b
ghostscript-gtk-7.07-33.2.el4_6.1.i386.rpm SHA-256: a832f5c05c1506e7513d2a78ad4e239fd6480f90d613f6f7639f285586630d85

Red Hat Enterprise Linux Desktop 3

SRPM
x86_64
i386

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
ghostscript-8.15.2-9.1.el5_1.1.src.rpm SHA-256: fe0da299c8ce9927d4aeb11efdadb123e66420cfdb6fa13ae9c2984b91a7bba9
s390x
ghostscript-8.15.2-9.1.el5_1.1.s390.rpm SHA-256: ce37fd51209b81cadfafbd6ba42aa8e6fcf83a7b315e9aa67ddcb71fdbdd1070
ghostscript-8.15.2-9.1.el5_1.1.s390x.rpm SHA-256: a4f9b146f70e05fc689f865d95985dc20fef6023fe478d4c9018e973623291ca
ghostscript-devel-8.15.2-9.1.el5_1.1.s390.rpm SHA-256: 1f29ae28d6684297b5863ede0ac2fad2be86af04932d97a951e7dcd708083b23
ghostscript-devel-8.15.2-9.1.el5_1.1.s390x.rpm SHA-256: 932018287febf2133d180b4ed88703da0a116da692c72af3c6bbae3d5a976f98
ghostscript-gtk-8.15.2-9.1.el5_1.1.s390x.rpm SHA-256: c2b7db2a984a1199d9198f097b2be5fc4e32cae2621f659c117b545dea4f596d

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
ghostscript-7.07-33.2.el4_6.1.src.rpm SHA-256: 589b1452e2e20ac2fb07ee5ccb21e3b10dbdec196f96b927546f99c145efe1f2
s390x
ghostscript-7.07-33.2.el4_6.1.s390.rpm SHA-256: fb53c2d9e4c4dd8e51970999370f7b1bca7303afe3c279958aa86e9b47d10457
ghostscript-7.07-33.2.el4_6.1.s390x.rpm SHA-256: 37b1ddf76c5dfed0fb616d8d242e8da0035ca328b6c6ebcf90d0915bc3894923
ghostscript-devel-7.07-33.2.el4_6.1.s390x.rpm SHA-256: 9239092cfb37a0181e5ae1f78b291ca785833a4999dfba8653c2046fad3b1e49
ghostscript-gtk-7.07-33.2.el4_6.1.s390x.rpm SHA-256: 16ef94ecd50ea4430ad84fa41ce1c6a5af800e74c1979989f890ce45618764e3
s390
ghostscript-7.07-33.2.el4_6.1.s390.rpm SHA-256: fb53c2d9e4c4dd8e51970999370f7b1bca7303afe3c279958aa86e9b47d10457
ghostscript-devel-7.07-33.2.el4_6.1.s390.rpm SHA-256: 779dd1dad5121c81654441d81ed713f510fbbade5cdcc6751d6a353d91a38cf9
ghostscript-gtk-7.07-33.2.el4_6.1.s390.rpm SHA-256: 52debf129c101f1d3ac7d303e3144273a7335fc2db6a2c786a33a3e7c5b5bb76

Red Hat Enterprise Linux for IBM z Systems 3

SRPM
s390x
s390

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1

SRPM
s390x

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.6

SRPM
ghostscript-7.07-33.2.el4_6.1.src.rpm SHA-256: 589b1452e2e20ac2fb07ee5ccb21e3b10dbdec196f96b927546f99c145efe1f2
s390x
ghostscript-7.07-33.2.el4_6.1.s390.rpm SHA-256: fb53c2d9e4c4dd8e51970999370f7b1bca7303afe3c279958aa86e9b47d10457
ghostscript-7.07-33.2.el4_6.1.s390x.rpm SHA-256: 37b1ddf76c5dfed0fb616d8d242e8da0035ca328b6c6ebcf90d0915bc3894923
ghostscript-devel-7.07-33.2.el4_6.1.s390x.rpm SHA-256: 9239092cfb37a0181e5ae1f78b291ca785833a4999dfba8653c2046fad3b1e49
ghostscript-gtk-7.07-33.2.el4_6.1.s390x.rpm SHA-256: 16ef94ecd50ea4430ad84fa41ce1c6a5af800e74c1979989f890ce45618764e3
s390
ghostscript-7.07-33.2.el4_6.1.s390.rpm SHA-256: fb53c2d9e4c4dd8e51970999370f7b1bca7303afe3c279958aa86e9b47d10457
ghostscript-devel-7.07-33.2.el4_6.1.s390.rpm SHA-256: 779dd1dad5121c81654441d81ed713f510fbbade5cdcc6751d6a353d91a38cf9
ghostscript-gtk-7.07-33.2.el4_6.1.s390.rpm SHA-256: 52debf129c101f1d3ac7d303e3144273a7335fc2db6a2c786a33a3e7c5b5bb76

Red Hat Enterprise Linux for Power, big endian 5

SRPM
ghostscript-8.15.2-9.1.el5_1.1.src.rpm SHA-256: fe0da299c8ce9927d4aeb11efdadb123e66420cfdb6fa13ae9c2984b91a7bba9
ppc
ghostscript-8.15.2-9.1.el5_1.1.ppc.rpm SHA-256: 6b313a5ac33f4c1b8f48c12612199e8c129dcf7e1df8a523a716f8c240f3124f
ghostscript-8.15.2-9.1.el5_1.1.ppc64.rpm SHA-256: 5ca1d70367cff40e8e3064f92bcee49a361b0c0e0409e6c77812620951110373
ghostscript-devel-8.15.2-9.1.el5_1.1.ppc.rpm SHA-256: 1f08f22b9c593321885ad4e1209d7d9539dcec9031875bfbd54ad337cb2f5da6
ghostscript-devel-8.15.2-9.1.el5_1.1.ppc64.rpm SHA-256: 060c09b5c684c239393929a2aa1a9759d196d1e060c30b01d281fc63a3de6a68
ghostscript-gtk-8.15.2-9.1.el5_1.1.ppc.rpm SHA-256: 1eb08bc59ea68d6d0bb89cf57755d20396beefb06c4571d8cc5700c5a270febc

Red Hat Enterprise Linux for Power, big endian 4

SRPM
ghostscript-7.07-33.2.el4_6.1.src.rpm SHA-256: 589b1452e2e20ac2fb07ee5ccb21e3b10dbdec196f96b927546f99c145efe1f2
ppc
ghostscript-7.07-33.2.el4_6.1.ppc.rpm SHA-256: f0b8a13d6f8bbd16d69bcd6f04c3b5fba7fe689b5d97324ab1c743ed1be5423d
ghostscript-7.07-33.2.el4_6.1.ppc64.rpm SHA-256: efd841e45f98eedd266381783e95ff868a599a950d320a0d1658394898160ac7
ghostscript-devel-7.07-33.2.el4_6.1.ppc.rpm SHA-256: 5248e83c69a169b331fe7e9ca7b14186ec824b893912f36ee6525061a7ea86a7
ghostscript-gtk-7.07-33.2.el4_6.1.ppc.rpm SHA-256: 001dd26b8429bd289dae5f293dd541eb505b553f626b2b15dfdc39b833bcc9c1

Red Hat Enterprise Linux for Power, big endian 3

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.6

SRPM
ghostscript-7.07-33.2.el4_6.1.src.rpm SHA-256: 589b1452e2e20ac2fb07ee5ccb21e3b10dbdec196f96b927546f99c145efe1f2
ppc
ghostscript-7.07-33.2.el4_6.1.ppc.rpm SHA-256: f0b8a13d6f8bbd16d69bcd6f04c3b5fba7fe689b5d97324ab1c743ed1be5423d
ghostscript-7.07-33.2.el4_6.1.ppc64.rpm SHA-256: efd841e45f98eedd266381783e95ff868a599a950d320a0d1658394898160ac7
ghostscript-devel-7.07-33.2.el4_6.1.ppc.rpm SHA-256: 5248e83c69a169b331fe7e9ca7b14186ec824b893912f36ee6525061a7ea86a7
ghostscript-gtk-7.07-33.2.el4_6.1.ppc.rpm SHA-256: 001dd26b8429bd289dae5f293dd541eb505b553f626b2b15dfdc39b833bcc9c1

Red Hat Enterprise Linux Server from RHUI 5

SRPM
ghostscript-8.15.2-9.1.el5_1.1.src.rpm SHA-256: fe0da299c8ce9927d4aeb11efdadb123e66420cfdb6fa13ae9c2984b91a7bba9
x86_64
ghostscript-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 1532d73cda10a65108f12ed44c2b7f8a84deda64d823781505738a04a1cfbec8
ghostscript-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: e5532ba7b9dcf444703cab13f1fad18ec9c46551b571d077931b2cf48665a9d2
ghostscript-devel-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: a84817b45b41373a0fb1842be1144c80967915fc2fdaca5d17a7948037609bad
ghostscript-devel-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: 6c305182862136fed3b651e76b0587656ad828d93fc9fc79b086b4bca856e6fb
ghostscript-gtk-8.15.2-9.1.el5_1.1.x86_64.rpm SHA-256: 823c31d603802ab3c1866c053590d8ebc5908d51be70681f9d03add1d481f4ef
i386
ghostscript-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 1532d73cda10a65108f12ed44c2b7f8a84deda64d823781505738a04a1cfbec8
ghostscript-devel-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: a84817b45b41373a0fb1842be1144c80967915fc2fdaca5d17a7948037609bad
ghostscript-gtk-8.15.2-9.1.el5_1.1.i386.rpm SHA-256: 5569ca15c48e923a74c5c25c827a9bf567570993a6a4ee44283cc31da166f3e9

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility