Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2009:0345 - Security Advisory
Issued:
2009-03-19
Updated:
2009-03-19

RHSA-2009:0345 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: ghostscript security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated ghostscript packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

Ghostscript is a set of software that provides a PostScript(TM)
interpreter, a set of C procedures (the Ghostscript library, which
implements the graphics capabilities in the PostScript language) and
an interpreter for Portable Document Format (PDF) files.

Multiple integer overflow flaws which could lead to heap-based buffer
overflows, as well as multiple insufficient input validation flaws, were
found in Ghostscript's International Color Consortium Format library
(icclib). Using specially-crafted ICC profiles, an attacker could create a
malicious PostScript or PDF file with embedded images which could cause
Ghostscript to crash, or, potentially, execute arbitrary code when opened
by the victim. (CVE-2009-0583, CVE-2009-0584)

All users of ghostscript are advised to upgrade to these updated packages,
which contain a backported patch to correct these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server 3 x86_64
  • Red Hat Enterprise Linux Server 3 ia64
  • Red Hat Enterprise Linux Server 3 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7 i386
  • Red Hat Enterprise Linux Server - AUS 5.3 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.3 ia64
  • Red Hat Enterprise Linux Server - AUS 5.3 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Workstation 3 x86_64
  • Red Hat Enterprise Linux Workstation 3 ia64
  • Red Hat Enterprise Linux Workstation 3 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux Desktop 3 x86_64
  • Red Hat Enterprise Linux Desktop 3 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems 3 s390x
  • Red Hat Enterprise Linux for IBM z Systems 3 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7 s390
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian 3 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 487742 - CVE-2009-0583 ghostscript: Multiple integer overflows in the International Color Consortium Format Library
  • BZ - 487744 - CVE-2009-0584 ghostscript: Multiple insufficient upper-bounds checks on certain sizes in the International Color Consortium Format Library

CVEs

  • CVE-2009-0584
  • CVE-2009-0583

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
ghostscript-8.15.2-9.4.el5_3.4.src.rpm SHA-256: 1db1a022e8df55ecc0dfd73d7d71e7f82c8d0972a96c46732f02399127d8ad70
x86_64
ghostscript-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 909764b361081f9143563efa2a35f4fa23d9409b81efc282e91bcd3c3cebed84
ghostscript-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: f428babc9381c7bb182375567318687b395e431d8abf5bba9fbabf45cb65cbc8
ghostscript-devel-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 70076259f986c098bea69f889d7eca8f4a63e4776833cba33886538663da66f9
ghostscript-devel-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: 0a44cc404e381521c4d674395e483c8e5d6250fbd141ff4cf8fc37847ec6cde4
ghostscript-gtk-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: 2f2628d6f85f938236f87753ccb6236642f305ce080fe5cb46740b72dfa2755f
ia64
ghostscript-8.15.2-9.4.el5_3.4.ia64.rpm SHA-256: 96dbb69b287d15467d90bd825b81d610e40297054a7ce1372a6d87472b262830
ghostscript-devel-8.15.2-9.4.el5_3.4.ia64.rpm SHA-256: 27ca46ce28796d5b0848543bddbe4744fd097ae9379d68dc1968eaebe21fbf39
ghostscript-gtk-8.15.2-9.4.el5_3.4.ia64.rpm SHA-256: c0fc0b0b7f72800bb47a149f926a542e9d9efe8bb2e9ef756daf5c7cf3111a14
i386
ghostscript-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 909764b361081f9143563efa2a35f4fa23d9409b81efc282e91bcd3c3cebed84
ghostscript-devel-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 70076259f986c098bea69f889d7eca8f4a63e4776833cba33886538663da66f9
ghostscript-gtk-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 15526939944e37866a7ae3406cc62f5fd73ce22bcf98994aee822157a9e2fd76

Red Hat Enterprise Linux Server 4

SRPM
ghostscript-7.07-33.2.el4_7.5.src.rpm SHA-256: 23bad9324f893c4a766fa3a78462640706aa75264ac46a0ca865405a84212f70
x86_64
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: f56bf0542666c6171c91511445c6313a4ddbf118cf45bc4644fe525607967d29
ghostscript-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: f56bf0542666c6171c91511445c6313a4ddbf118cf45bc4644fe525607967d29
ghostscript-devel-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: e425e9928c2e529e42b207abd736103583b4e5ad8b79e7e16f956bea450104f4
ghostscript-devel-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: e425e9928c2e529e42b207abd736103583b4e5ad8b79e7e16f956bea450104f4
ghostscript-gtk-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: 7f6c328b763734cb37a6f3cd37e1d0e6722559f7c864265ea10220e55ba72057
ghostscript-gtk-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: 7f6c328b763734cb37a6f3cd37e1d0e6722559f7c864265ea10220e55ba72057
ia64
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.ia64.rpm SHA-256: 10711a34bfe017d128c3fb1d378b91d43cc1574bcebbd95a211fd704a6037c43
ghostscript-7.07-33.2.el4_7.5.ia64.rpm SHA-256: 10711a34bfe017d128c3fb1d378b91d43cc1574bcebbd95a211fd704a6037c43
ghostscript-devel-7.07-33.2.el4_7.5.ia64.rpm SHA-256: e48b52d27b452eaf5a1d5181f910d6368ed76b3b916e82a742b990188d3b2b7a
ghostscript-devel-7.07-33.2.el4_7.5.ia64.rpm SHA-256: e48b52d27b452eaf5a1d5181f910d6368ed76b3b916e82a742b990188d3b2b7a
ghostscript-gtk-7.07-33.2.el4_7.5.ia64.rpm SHA-256: 27645709191a6c85914311a86117ea76fac5b9b4ca381c6cb6d72014524de1dc
ghostscript-gtk-7.07-33.2.el4_7.5.ia64.rpm SHA-256: 27645709191a6c85914311a86117ea76fac5b9b4ca381c6cb6d72014524de1dc
i386
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-devel-7.07-33.2.el4_7.5.i386.rpm SHA-256: 9ade7c1379fd6322a572c9e7a5d496e9cddb59e5b0c67e1a4791496f0314f432
ghostscript-devel-7.07-33.2.el4_7.5.i386.rpm SHA-256: 9ade7c1379fd6322a572c9e7a5d496e9cddb59e5b0c67e1a4791496f0314f432
ghostscript-gtk-7.07-33.2.el4_7.5.i386.rpm SHA-256: ce8fc8fc6b7d7dfaf36a558eead7cfd38eb04763dcbf8a3538339770d7d49f06
ghostscript-gtk-7.07-33.2.el4_7.5.i386.rpm SHA-256: ce8fc8fc6b7d7dfaf36a558eead7cfd38eb04763dcbf8a3538339770d7d49f06

Red Hat Enterprise Linux Server 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.7

SRPM
ghostscript-7.07-33.2.el4_7.5.src.rpm SHA-256: 23bad9324f893c4a766fa3a78462640706aa75264ac46a0ca865405a84212f70
x86_64
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: f56bf0542666c6171c91511445c6313a4ddbf118cf45bc4644fe525607967d29
ghostscript-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: f56bf0542666c6171c91511445c6313a4ddbf118cf45bc4644fe525607967d29
ghostscript-devel-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: e425e9928c2e529e42b207abd736103583b4e5ad8b79e7e16f956bea450104f4
ghostscript-devel-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: e425e9928c2e529e42b207abd736103583b4e5ad8b79e7e16f956bea450104f4
ghostscript-gtk-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: 7f6c328b763734cb37a6f3cd37e1d0e6722559f7c864265ea10220e55ba72057
ghostscript-gtk-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: 7f6c328b763734cb37a6f3cd37e1d0e6722559f7c864265ea10220e55ba72057
ia64
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.ia64.rpm SHA-256: 10711a34bfe017d128c3fb1d378b91d43cc1574bcebbd95a211fd704a6037c43
ghostscript-7.07-33.2.el4_7.5.ia64.rpm SHA-256: 10711a34bfe017d128c3fb1d378b91d43cc1574bcebbd95a211fd704a6037c43
ghostscript-devel-7.07-33.2.el4_7.5.ia64.rpm SHA-256: e48b52d27b452eaf5a1d5181f910d6368ed76b3b916e82a742b990188d3b2b7a
ghostscript-devel-7.07-33.2.el4_7.5.ia64.rpm SHA-256: e48b52d27b452eaf5a1d5181f910d6368ed76b3b916e82a742b990188d3b2b7a
ghostscript-gtk-7.07-33.2.el4_7.5.ia64.rpm SHA-256: 27645709191a6c85914311a86117ea76fac5b9b4ca381c6cb6d72014524de1dc
ghostscript-gtk-7.07-33.2.el4_7.5.ia64.rpm SHA-256: 27645709191a6c85914311a86117ea76fac5b9b4ca381c6cb6d72014524de1dc
i386
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-devel-7.07-33.2.el4_7.5.i386.rpm SHA-256: 9ade7c1379fd6322a572c9e7a5d496e9cddb59e5b0c67e1a4791496f0314f432
ghostscript-devel-7.07-33.2.el4_7.5.i386.rpm SHA-256: 9ade7c1379fd6322a572c9e7a5d496e9cddb59e5b0c67e1a4791496f0314f432
ghostscript-gtk-7.07-33.2.el4_7.5.i386.rpm SHA-256: ce8fc8fc6b7d7dfaf36a558eead7cfd38eb04763dcbf8a3538339770d7d49f06
ghostscript-gtk-7.07-33.2.el4_7.5.i386.rpm SHA-256: ce8fc8fc6b7d7dfaf36a558eead7cfd38eb04763dcbf8a3538339770d7d49f06

Red Hat Enterprise Linux Server - AUS 5.3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
ghostscript-8.15.2-9.4.el5_3.4.src.rpm SHA-256: 1db1a022e8df55ecc0dfd73d7d71e7f82c8d0972a96c46732f02399127d8ad70
x86_64
ghostscript-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 909764b361081f9143563efa2a35f4fa23d9409b81efc282e91bcd3c3cebed84
ghostscript-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: f428babc9381c7bb182375567318687b395e431d8abf5bba9fbabf45cb65cbc8
ghostscript-devel-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 70076259f986c098bea69f889d7eca8f4a63e4776833cba33886538663da66f9
ghostscript-devel-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: 0a44cc404e381521c4d674395e483c8e5d6250fbd141ff4cf8fc37847ec6cde4
ghostscript-gtk-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: 2f2628d6f85f938236f87753ccb6236642f305ce080fe5cb46740b72dfa2755f
i386
ghostscript-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 909764b361081f9143563efa2a35f4fa23d9409b81efc282e91bcd3c3cebed84
ghostscript-devel-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 70076259f986c098bea69f889d7eca8f4a63e4776833cba33886538663da66f9
ghostscript-gtk-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 15526939944e37866a7ae3406cc62f5fd73ce22bcf98994aee822157a9e2fd76

Red Hat Enterprise Linux Workstation 4

SRPM
ghostscript-7.07-33.2.el4_7.5.src.rpm SHA-256: 23bad9324f893c4a766fa3a78462640706aa75264ac46a0ca865405a84212f70
x86_64
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: f56bf0542666c6171c91511445c6313a4ddbf118cf45bc4644fe525607967d29
ghostscript-devel-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: e425e9928c2e529e42b207abd736103583b4e5ad8b79e7e16f956bea450104f4
ghostscript-gtk-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: 7f6c328b763734cb37a6f3cd37e1d0e6722559f7c864265ea10220e55ba72057
ia64
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.ia64.rpm SHA-256: 10711a34bfe017d128c3fb1d378b91d43cc1574bcebbd95a211fd704a6037c43
ghostscript-devel-7.07-33.2.el4_7.5.ia64.rpm SHA-256: e48b52d27b452eaf5a1d5181f910d6368ed76b3b916e82a742b990188d3b2b7a
ghostscript-gtk-7.07-33.2.el4_7.5.ia64.rpm SHA-256: 27645709191a6c85914311a86117ea76fac5b9b4ca381c6cb6d72014524de1dc
i386
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-devel-7.07-33.2.el4_7.5.i386.rpm SHA-256: 9ade7c1379fd6322a572c9e7a5d496e9cddb59e5b0c67e1a4791496f0314f432
ghostscript-gtk-7.07-33.2.el4_7.5.i386.rpm SHA-256: ce8fc8fc6b7d7dfaf36a558eead7cfd38eb04763dcbf8a3538339770d7d49f06

Red Hat Enterprise Linux Workstation 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Desktop 5

SRPM
ghostscript-8.15.2-9.4.el5_3.4.src.rpm SHA-256: 1db1a022e8df55ecc0dfd73d7d71e7f82c8d0972a96c46732f02399127d8ad70
x86_64
ghostscript-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 909764b361081f9143563efa2a35f4fa23d9409b81efc282e91bcd3c3cebed84
ghostscript-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: f428babc9381c7bb182375567318687b395e431d8abf5bba9fbabf45cb65cbc8
ghostscript-gtk-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: 2f2628d6f85f938236f87753ccb6236642f305ce080fe5cb46740b72dfa2755f
i386
ghostscript-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 909764b361081f9143563efa2a35f4fa23d9409b81efc282e91bcd3c3cebed84
ghostscript-gtk-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 15526939944e37866a7ae3406cc62f5fd73ce22bcf98994aee822157a9e2fd76

Red Hat Enterprise Linux Desktop 4

SRPM
ghostscript-7.07-33.2.el4_7.5.src.rpm SHA-256: 23bad9324f893c4a766fa3a78462640706aa75264ac46a0ca865405a84212f70
x86_64
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: f56bf0542666c6171c91511445c6313a4ddbf118cf45bc4644fe525607967d29
ghostscript-devel-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: e425e9928c2e529e42b207abd736103583b4e5ad8b79e7e16f956bea450104f4
ghostscript-gtk-7.07-33.2.el4_7.5.x86_64.rpm SHA-256: 7f6c328b763734cb37a6f3cd37e1d0e6722559f7c864265ea10220e55ba72057
i386
ghostscript-7.07-33.2.el4_7.5.i386.rpm SHA-256: 7aeb3174a400912496fe1a84138188e34dd7a960da55aa6b6128e181bc9bcb42
ghostscript-devel-7.07-33.2.el4_7.5.i386.rpm SHA-256: 9ade7c1379fd6322a572c9e7a5d496e9cddb59e5b0c67e1a4791496f0314f432
ghostscript-gtk-7.07-33.2.el4_7.5.i386.rpm SHA-256: ce8fc8fc6b7d7dfaf36a558eead7cfd38eb04763dcbf8a3538339770d7d49f06

Red Hat Enterprise Linux Desktop 3

SRPM
x86_64
i386

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
ghostscript-8.15.2-9.4.el5_3.4.src.rpm SHA-256: 1db1a022e8df55ecc0dfd73d7d71e7f82c8d0972a96c46732f02399127d8ad70
s390x
ghostscript-8.15.2-9.4.el5_3.4.s390.rpm SHA-256: 3f22fae63fb4eb3671176cdcaad9023a75604df2ebc7d27c3d051d8bdb67a47c
ghostscript-8.15.2-9.4.el5_3.4.s390x.rpm SHA-256: 49368425c768b9ff5107f355bfe765f18ec2439664889c8d251630821f2b5579
ghostscript-devel-8.15.2-9.4.el5_3.4.s390.rpm SHA-256: 453237605803960553f6b41f133b95559407aebfbf3035afea2d723553c07584
ghostscript-devel-8.15.2-9.4.el5_3.4.s390x.rpm SHA-256: def5f1ec4e4dac392a6915eb7212c45431654d21586ce255912df91afe710f48
ghostscript-gtk-8.15.2-9.4.el5_3.4.s390x.rpm SHA-256: 22614745999323c77d98020ecdb1625c49870a8ca39eaedad2a283340fefe89d

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
ghostscript-7.07-33.2.el4_7.5.src.rpm SHA-256: 23bad9324f893c4a766fa3a78462640706aa75264ac46a0ca865405a84212f70
s390x
ghostscript-7.07-33.2.el4_7.5.s390.rpm SHA-256: ea633625017259e70cd48bae014aafe41dee97b11260459cf111ed5073aa4a97
ghostscript-7.07-33.2.el4_7.5.s390x.rpm SHA-256: e7101900d85402563868a1e4dfbfeed0a8fcbdea3ee27002e830f7c080576ec6
ghostscript-devel-7.07-33.2.el4_7.5.s390x.rpm SHA-256: 2eac70050769e9ab65816216e87da1f3996c5a31080c356c07fe31d112c899de
ghostscript-gtk-7.07-33.2.el4_7.5.s390x.rpm SHA-256: 486ad5b0da017ef6b219f62364143541bd14183c207a64571c07f0dc43a8d7a2
s390
ghostscript-7.07-33.2.el4_7.5.s390.rpm SHA-256: ea633625017259e70cd48bae014aafe41dee97b11260459cf111ed5073aa4a97
ghostscript-devel-7.07-33.2.el4_7.5.s390.rpm SHA-256: ab105b84ae4e0883fd3b5f25fe0be457ea81e2cbf6bd40bb5ae85cab9346862d
ghostscript-gtk-7.07-33.2.el4_7.5.s390.rpm SHA-256: f1f9e12dad4236733f32d8a5fd402978d7aab1da3127884ad03e4a51c6979f9e

Red Hat Enterprise Linux for IBM z Systems 3

SRPM
s390x
s390

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3

SRPM
s390x

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.7

SRPM
ghostscript-7.07-33.2.el4_7.5.src.rpm SHA-256: 23bad9324f893c4a766fa3a78462640706aa75264ac46a0ca865405a84212f70
s390x
ghostscript-7.07-33.2.el4_7.5.s390.rpm SHA-256: ea633625017259e70cd48bae014aafe41dee97b11260459cf111ed5073aa4a97
ghostscript-7.07-33.2.el4_7.5.s390x.rpm SHA-256: e7101900d85402563868a1e4dfbfeed0a8fcbdea3ee27002e830f7c080576ec6
ghostscript-devel-7.07-33.2.el4_7.5.s390x.rpm SHA-256: 2eac70050769e9ab65816216e87da1f3996c5a31080c356c07fe31d112c899de
ghostscript-gtk-7.07-33.2.el4_7.5.s390x.rpm SHA-256: 486ad5b0da017ef6b219f62364143541bd14183c207a64571c07f0dc43a8d7a2
s390
ghostscript-7.07-33.2.el4_7.5.s390.rpm SHA-256: ea633625017259e70cd48bae014aafe41dee97b11260459cf111ed5073aa4a97
ghostscript-devel-7.07-33.2.el4_7.5.s390.rpm SHA-256: ab105b84ae4e0883fd3b5f25fe0be457ea81e2cbf6bd40bb5ae85cab9346862d
ghostscript-gtk-7.07-33.2.el4_7.5.s390.rpm SHA-256: f1f9e12dad4236733f32d8a5fd402978d7aab1da3127884ad03e4a51c6979f9e

Red Hat Enterprise Linux for Power, big endian 5

SRPM
ghostscript-8.15.2-9.4.el5_3.4.src.rpm SHA-256: 1db1a022e8df55ecc0dfd73d7d71e7f82c8d0972a96c46732f02399127d8ad70
ppc
ghostscript-8.15.2-9.4.el5_3.4.ppc.rpm SHA-256: 4494ec7899ce7fee0125dfb0b58a68e8ca9e6c66f87c976e7137fa6e1ae8fef1
ghostscript-8.15.2-9.4.el5_3.4.ppc64.rpm SHA-256: c066c6252478ede63f4478fcf8beccb3b7a8f6281f0ec6e790faf546d930e6e2
ghostscript-devel-8.15.2-9.4.el5_3.4.ppc.rpm SHA-256: 4ab5c343faea4788993184f7fd7da647e1c8f477a296abc918b40b505842c1a0
ghostscript-devel-8.15.2-9.4.el5_3.4.ppc64.rpm SHA-256: b1303ccc0412edf674a26623dd6101777ea8dc80102004f968bbdc025406e49c
ghostscript-gtk-8.15.2-9.4.el5_3.4.ppc.rpm SHA-256: 4dddd1086c4f5b3f6a34c77d6df1cda9e43fc65f739d37192a995463d80d27a2

Red Hat Enterprise Linux for Power, big endian 4

SRPM
ghostscript-7.07-33.2.el4_7.5.src.rpm SHA-256: 23bad9324f893c4a766fa3a78462640706aa75264ac46a0ca865405a84212f70
ppc
ghostscript-7.07-33.2.el4_7.5.ppc.rpm SHA-256: 6bab037fb4ec87387e244125d1aecec95b3290456c8bbc7d5ce9d772a951f266
ghostscript-7.07-33.2.el4_7.5.ppc64.rpm SHA-256: c4dd17e1c9c6eb8c2132bddeb03dcb6cba47f3f3662bf864652f8dbc667a0854
ghostscript-devel-7.07-33.2.el4_7.5.ppc.rpm SHA-256: e72df78dbcddf84d124978c2bf240cbc47775b99a7a5c8fc3be00b2b414ac5c1
ghostscript-gtk-7.07-33.2.el4_7.5.ppc.rpm SHA-256: 42e7310e3a6666bd222091762b03a62eb40e6fcfc7589904dd33bf3f6639ee28

Red Hat Enterprise Linux for Power, big endian 3

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.7

SRPM
ghostscript-7.07-33.2.el4_7.5.src.rpm SHA-256: 23bad9324f893c4a766fa3a78462640706aa75264ac46a0ca865405a84212f70
ppc
ghostscript-7.07-33.2.el4_7.5.ppc.rpm SHA-256: 6bab037fb4ec87387e244125d1aecec95b3290456c8bbc7d5ce9d772a951f266
ghostscript-7.07-33.2.el4_7.5.ppc64.rpm SHA-256: c4dd17e1c9c6eb8c2132bddeb03dcb6cba47f3f3662bf864652f8dbc667a0854
ghostscript-devel-7.07-33.2.el4_7.5.ppc.rpm SHA-256: e72df78dbcddf84d124978c2bf240cbc47775b99a7a5c8fc3be00b2b414ac5c1
ghostscript-gtk-7.07-33.2.el4_7.5.ppc.rpm SHA-256: 42e7310e3a6666bd222091762b03a62eb40e6fcfc7589904dd33bf3f6639ee28

Red Hat Enterprise Linux Server from RHUI 5

SRPM
ghostscript-8.15.2-9.4.el5_3.4.src.rpm SHA-256: 1db1a022e8df55ecc0dfd73d7d71e7f82c8d0972a96c46732f02399127d8ad70
x86_64
ghostscript-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 909764b361081f9143563efa2a35f4fa23d9409b81efc282e91bcd3c3cebed84
ghostscript-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: f428babc9381c7bb182375567318687b395e431d8abf5bba9fbabf45cb65cbc8
ghostscript-devel-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 70076259f986c098bea69f889d7eca8f4a63e4776833cba33886538663da66f9
ghostscript-devel-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: 0a44cc404e381521c4d674395e483c8e5d6250fbd141ff4cf8fc37847ec6cde4
ghostscript-gtk-8.15.2-9.4.el5_3.4.x86_64.rpm SHA-256: 2f2628d6f85f938236f87753ccb6236642f305ce080fe5cb46740b72dfa2755f
i386
ghostscript-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 909764b361081f9143563efa2a35f4fa23d9409b81efc282e91bcd3c3cebed84
ghostscript-devel-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 70076259f986c098bea69f889d7eca8f4a63e4776833cba33886538663da66f9
ghostscript-gtk-8.15.2-9.4.el5_3.4.i386.rpm SHA-256: 15526939944e37866a7ae3406cc62f5fd73ce22bcf98994aee822157a9e2fd76

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility