Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0003 - Security Advisory
Issued:
2010-01-04
Updated:
2010-01-04

RHSA-2010:0003 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: gd security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated gd packages that fix a security issue are now available for Red Hat
Enterprise Linux 4 and 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

The gd packages provide a graphics library used for the dynamic creation of
images, such as PNG and JPEG.

A missing input sanitization flaw, leading to a buffer overflow, was
discovered in the gd library. A specially-crafted GD image file could cause
an application using the gd library to crash or, possibly, execute
arbitrary code when opened. (CVE-2009-3546)

Users of gd should upgrade to these updated packages, which contain a
backported patch to resolve this issue.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8 s390
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 529213 - CVE-2009-3546 gd: insufficient input validation in _gdGetColors()

CVEs

  • CVE-2009-3546

References

  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
gd-2.0.33-9.4.el5_4.2.src.rpm SHA-256: 6ac1636679bc6c79ac105e77e6bb9751f1e50ae6bc905d4e510d1fddf95c1535
x86_64
gd-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: 09c9b246899b26638e5c54534af1403463e304d68ccfb917a6d08988717c466e
gd-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 6f5b90797d214177d45467ad531f2576fe6bfe980f34557879c04db894840b8f
gd-devel-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: d93edbab1a8182a8b7ea8630ff37e0d0cba8b3d975fc28dfc76638b251e67ee3
gd-devel-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 2cf49c0d7bff23dbd8c8890cb085cc2fca105c96d051f64422ed7fd8fb98c1d4
gd-progs-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 0c36fea5d19c181fbe301eaf9575dbea43dd6623c1369c17d6614d869b8a80aa
ia64
gd-2.0.33-9.4.el5_4.2.ia64.rpm SHA-256: 8695f45249eafedd0a803ba01bd95a182009b94153da64540b23e3c13b602898
gd-devel-2.0.33-9.4.el5_4.2.ia64.rpm SHA-256: 6c3c19e49e205e7e885b414e4575469107de31cc53de493d538c733dc4670bb1
gd-progs-2.0.33-9.4.el5_4.2.ia64.rpm SHA-256: 4837dddf6954028c42a4aa9438cb7d9728fd57ad10ed167f2da2c07f72e0843b
i386
gd-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: 09c9b246899b26638e5c54534af1403463e304d68ccfb917a6d08988717c466e
gd-devel-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: d93edbab1a8182a8b7ea8630ff37e0d0cba8b3d975fc28dfc76638b251e67ee3
gd-progs-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: ef82dc6ff0b4a7df641356f678b5a126a737247c5ddd32c212b5005d9e63ba9f

Red Hat Enterprise Linux Server 4

SRPM
gd-2.0.28-5.4E.el4_8.1.src.rpm SHA-256: 0543748f796599a6ca827a55e0f03820e043827ece9c4d0de042343d661d097f
x86_64
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2e01a94f25089ddd7d9694b2d928e526da558e5713f6cf1892507bea167abb28
gd-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2e01a94f25089ddd7d9694b2d928e526da558e5713f6cf1892507bea167abb28
gd-devel-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 3924d4047480ef103c1e008f052fc78adfcc342a5f36e5af8526abb76b8c93ab
gd-devel-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 3924d4047480ef103c1e008f052fc78adfcc342a5f36e5af8526abb76b8c93ab
gd-progs-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2b5eada8d5f17cbccf70f8eb98e15ec83b5b7c072884305b79e7aab8e2df89ab
gd-progs-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2b5eada8d5f17cbccf70f8eb98e15ec83b5b7c072884305b79e7aab8e2df89ab
ia64
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: 03ed8df740897454946ffb1808d9605dae37e238f80e1ce1717221c9666bebcc
gd-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: 03ed8df740897454946ffb1808d9605dae37e238f80e1ce1717221c9666bebcc
gd-devel-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: 8123a0987fbf005d841e5281e5424073030d962915a59da368388dbb7002792b
gd-devel-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: 8123a0987fbf005d841e5281e5424073030d962915a59da368388dbb7002792b
gd-progs-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: d284f757f19adff2defd2969aa385042eb113574a9550f77de2c98d2d2657aae
gd-progs-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: d284f757f19adff2defd2969aa385042eb113574a9550f77de2c98d2d2657aae
i386
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-devel-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 150d47c68bfdaa204cbe994fa387765d0e74a1d1b393c1b57c9c7399008b277e
gd-devel-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 150d47c68bfdaa204cbe994fa387765d0e74a1d1b393c1b57c9c7399008b277e
gd-progs-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 479dfcc8d2b717b3c4b716ab026369bcac41b47650219a5bdfc21d09d3e787eb
gd-progs-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 479dfcc8d2b717b3c4b716ab026369bcac41b47650219a5bdfc21d09d3e787eb

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.8

SRPM
gd-2.0.28-5.4E.el4_8.1.src.rpm SHA-256: 0543748f796599a6ca827a55e0f03820e043827ece9c4d0de042343d661d097f
x86_64
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2e01a94f25089ddd7d9694b2d928e526da558e5713f6cf1892507bea167abb28
gd-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2e01a94f25089ddd7d9694b2d928e526da558e5713f6cf1892507bea167abb28
gd-devel-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 3924d4047480ef103c1e008f052fc78adfcc342a5f36e5af8526abb76b8c93ab
gd-devel-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 3924d4047480ef103c1e008f052fc78adfcc342a5f36e5af8526abb76b8c93ab
gd-progs-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2b5eada8d5f17cbccf70f8eb98e15ec83b5b7c072884305b79e7aab8e2df89ab
gd-progs-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2b5eada8d5f17cbccf70f8eb98e15ec83b5b7c072884305b79e7aab8e2df89ab
ia64
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: 03ed8df740897454946ffb1808d9605dae37e238f80e1ce1717221c9666bebcc
gd-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: 03ed8df740897454946ffb1808d9605dae37e238f80e1ce1717221c9666bebcc
gd-devel-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: 8123a0987fbf005d841e5281e5424073030d962915a59da368388dbb7002792b
gd-devel-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: 8123a0987fbf005d841e5281e5424073030d962915a59da368388dbb7002792b
gd-progs-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: d284f757f19adff2defd2969aa385042eb113574a9550f77de2c98d2d2657aae
gd-progs-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: d284f757f19adff2defd2969aa385042eb113574a9550f77de2c98d2d2657aae
i386
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-devel-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 150d47c68bfdaa204cbe994fa387765d0e74a1d1b393c1b57c9c7399008b277e
gd-devel-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 150d47c68bfdaa204cbe994fa387765d0e74a1d1b393c1b57c9c7399008b277e
gd-progs-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 479dfcc8d2b717b3c4b716ab026369bcac41b47650219a5bdfc21d09d3e787eb
gd-progs-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 479dfcc8d2b717b3c4b716ab026369bcac41b47650219a5bdfc21d09d3e787eb

Red Hat Enterprise Linux Workstation 5

SRPM
gd-2.0.33-9.4.el5_4.2.src.rpm SHA-256: 6ac1636679bc6c79ac105e77e6bb9751f1e50ae6bc905d4e510d1fddf95c1535
x86_64
gd-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: 09c9b246899b26638e5c54534af1403463e304d68ccfb917a6d08988717c466e
gd-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 6f5b90797d214177d45467ad531f2576fe6bfe980f34557879c04db894840b8f
gd-devel-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: d93edbab1a8182a8b7ea8630ff37e0d0cba8b3d975fc28dfc76638b251e67ee3
gd-devel-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 2cf49c0d7bff23dbd8c8890cb085cc2fca105c96d051f64422ed7fd8fb98c1d4
gd-progs-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 0c36fea5d19c181fbe301eaf9575dbea43dd6623c1369c17d6614d869b8a80aa
i386
gd-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: 09c9b246899b26638e5c54534af1403463e304d68ccfb917a6d08988717c466e
gd-devel-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: d93edbab1a8182a8b7ea8630ff37e0d0cba8b3d975fc28dfc76638b251e67ee3
gd-progs-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: ef82dc6ff0b4a7df641356f678b5a126a737247c5ddd32c212b5005d9e63ba9f

Red Hat Enterprise Linux Workstation 4

SRPM
gd-2.0.28-5.4E.el4_8.1.src.rpm SHA-256: 0543748f796599a6ca827a55e0f03820e043827ece9c4d0de042343d661d097f
x86_64
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2e01a94f25089ddd7d9694b2d928e526da558e5713f6cf1892507bea167abb28
gd-devel-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 3924d4047480ef103c1e008f052fc78adfcc342a5f36e5af8526abb76b8c93ab
gd-progs-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2b5eada8d5f17cbccf70f8eb98e15ec83b5b7c072884305b79e7aab8e2df89ab
ia64
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: 03ed8df740897454946ffb1808d9605dae37e238f80e1ce1717221c9666bebcc
gd-devel-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: 8123a0987fbf005d841e5281e5424073030d962915a59da368388dbb7002792b
gd-progs-2.0.28-5.4E.el4_8.1.ia64.rpm SHA-256: d284f757f19adff2defd2969aa385042eb113574a9550f77de2c98d2d2657aae
i386
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-devel-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 150d47c68bfdaa204cbe994fa387765d0e74a1d1b393c1b57c9c7399008b277e
gd-progs-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 479dfcc8d2b717b3c4b716ab026369bcac41b47650219a5bdfc21d09d3e787eb

Red Hat Enterprise Linux Desktop 5

SRPM
gd-2.0.33-9.4.el5_4.2.src.rpm SHA-256: 6ac1636679bc6c79ac105e77e6bb9751f1e50ae6bc905d4e510d1fddf95c1535
x86_64
gd-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: 09c9b246899b26638e5c54534af1403463e304d68ccfb917a6d08988717c466e
gd-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 6f5b90797d214177d45467ad531f2576fe6bfe980f34557879c04db894840b8f
gd-progs-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 0c36fea5d19c181fbe301eaf9575dbea43dd6623c1369c17d6614d869b8a80aa
i386
gd-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: 09c9b246899b26638e5c54534af1403463e304d68ccfb917a6d08988717c466e
gd-progs-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: ef82dc6ff0b4a7df641356f678b5a126a737247c5ddd32c212b5005d9e63ba9f

Red Hat Enterprise Linux Desktop 4

SRPM
gd-2.0.28-5.4E.el4_8.1.src.rpm SHA-256: 0543748f796599a6ca827a55e0f03820e043827ece9c4d0de042343d661d097f
x86_64
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2e01a94f25089ddd7d9694b2d928e526da558e5713f6cf1892507bea167abb28
gd-devel-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 3924d4047480ef103c1e008f052fc78adfcc342a5f36e5af8526abb76b8c93ab
gd-progs-2.0.28-5.4E.el4_8.1.x86_64.rpm SHA-256: 2b5eada8d5f17cbccf70f8eb98e15ec83b5b7c072884305b79e7aab8e2df89ab
i386
gd-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 0085a3c5c31fb8f1cbe64044c9dfb63974a02370350d1247696a07386f167760
gd-devel-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 150d47c68bfdaa204cbe994fa387765d0e74a1d1b393c1b57c9c7399008b277e
gd-progs-2.0.28-5.4E.el4_8.1.i386.rpm SHA-256: 479dfcc8d2b717b3c4b716ab026369bcac41b47650219a5bdfc21d09d3e787eb

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
gd-2.0.33-9.4.el5_4.2.src.rpm SHA-256: 6ac1636679bc6c79ac105e77e6bb9751f1e50ae6bc905d4e510d1fddf95c1535
s390x
gd-2.0.33-9.4.el5_4.2.s390.rpm SHA-256: d32f7ceae3e9a9e1591f4d2ce8978346136d53cda1f22a207820b53af2a3e6d2
gd-2.0.33-9.4.el5_4.2.s390x.rpm SHA-256: cf539910689590b3e9e0f2ef764877835e32f03f194cc8a3306a251284e11b5c
gd-devel-2.0.33-9.4.el5_4.2.s390.rpm SHA-256: fd6434f3c7375af0f2063ea1b0c538f3942120c659f520a9e0de2ee83e2f6bcc
gd-devel-2.0.33-9.4.el5_4.2.s390x.rpm SHA-256: bda0924596d4d54299a16ea06cada509dad602ac7edca42b04de185d6322da39
gd-progs-2.0.33-9.4.el5_4.2.s390x.rpm SHA-256: 0b29e1e696d6ee5edecfa7212dff12408f7a60f470bdc0830d153d868daad22a

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
gd-2.0.28-5.4E.el4_8.1.src.rpm SHA-256: 0543748f796599a6ca827a55e0f03820e043827ece9c4d0de042343d661d097f
s390x
gd-2.0.28-5.4E.el4_8.1.s390.rpm SHA-256: 8c41c66547dbd744c91204a8844eb0719821cbd9b6c9f86aab3f8bea20d3b9c1
gd-2.0.28-5.4E.el4_8.1.s390x.rpm SHA-256: db3a07926e5d0d455ff0777dea48652cbfc9c27a3196c8d2bf3ea6fd6d060d77
gd-devel-2.0.28-5.4E.el4_8.1.s390x.rpm SHA-256: 62ebc711daf696d5a5d623d7e0439211564a89388bdbb6592c2809e82241c687
gd-progs-2.0.28-5.4E.el4_8.1.s390x.rpm SHA-256: db54361ba3f60371b43cce2356be06215cadafe4a2d119bdd2d556b1ade4e127
s390
gd-2.0.28-5.4E.el4_8.1.s390.rpm SHA-256: 8c41c66547dbd744c91204a8844eb0719821cbd9b6c9f86aab3f8bea20d3b9c1
gd-devel-2.0.28-5.4E.el4_8.1.s390.rpm SHA-256: 7a84ce8821007f449c5bde7ec9e236a2c1a1430e09291f6871635dd6d8970ec3
gd-progs-2.0.28-5.4E.el4_8.1.s390.rpm SHA-256: 3c8661f0760ffce57234e8402273cdf028f727d8c5bfd898a64d46f968e545de

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4

SRPM
s390x

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.8

SRPM
gd-2.0.28-5.4E.el4_8.1.src.rpm SHA-256: 0543748f796599a6ca827a55e0f03820e043827ece9c4d0de042343d661d097f
s390x
gd-2.0.28-5.4E.el4_8.1.s390.rpm SHA-256: 8c41c66547dbd744c91204a8844eb0719821cbd9b6c9f86aab3f8bea20d3b9c1
gd-2.0.28-5.4E.el4_8.1.s390x.rpm SHA-256: db3a07926e5d0d455ff0777dea48652cbfc9c27a3196c8d2bf3ea6fd6d060d77
gd-devel-2.0.28-5.4E.el4_8.1.s390x.rpm SHA-256: 62ebc711daf696d5a5d623d7e0439211564a89388bdbb6592c2809e82241c687
gd-progs-2.0.28-5.4E.el4_8.1.s390x.rpm SHA-256: db54361ba3f60371b43cce2356be06215cadafe4a2d119bdd2d556b1ade4e127
s390
gd-2.0.28-5.4E.el4_8.1.s390.rpm SHA-256: 8c41c66547dbd744c91204a8844eb0719821cbd9b6c9f86aab3f8bea20d3b9c1
gd-devel-2.0.28-5.4E.el4_8.1.s390.rpm SHA-256: 7a84ce8821007f449c5bde7ec9e236a2c1a1430e09291f6871635dd6d8970ec3
gd-progs-2.0.28-5.4E.el4_8.1.s390.rpm SHA-256: 3c8661f0760ffce57234e8402273cdf028f727d8c5bfd898a64d46f968e545de

Red Hat Enterprise Linux for Power, big endian 5

SRPM
gd-2.0.33-9.4.el5_4.2.src.rpm SHA-256: 6ac1636679bc6c79ac105e77e6bb9751f1e50ae6bc905d4e510d1fddf95c1535
ppc
gd-2.0.33-9.4.el5_4.2.ppc.rpm SHA-256: a935f60e8137c56657dcdb8cbd5210f77f3b24c42c953f1660820d1c67819e75
gd-2.0.33-9.4.el5_4.2.ppc64.rpm SHA-256: 32f56152fa1474664bffd7dd8bc3f09dcd5736235a58a8fbde46df44cc593fde
gd-devel-2.0.33-9.4.el5_4.2.ppc.rpm SHA-256: 1a5a745aa05a638c1851b59ed08a661cc2088dd0bac560343626b96ce7e06153
gd-devel-2.0.33-9.4.el5_4.2.ppc64.rpm SHA-256: fbeca6d2e6c3758932a8615b2e597c295c3c44715df637b7d2c483f67d31bd69
gd-progs-2.0.33-9.4.el5_4.2.ppc.rpm SHA-256: 3b43e6d92383eae1214041523e2541c9fdc65624b6d28f8e33ed995343f196ca

Red Hat Enterprise Linux for Power, big endian 4

SRPM
gd-2.0.28-5.4E.el4_8.1.src.rpm SHA-256: 0543748f796599a6ca827a55e0f03820e043827ece9c4d0de042343d661d097f
ppc
gd-2.0.28-5.4E.el4_8.1.ppc.rpm SHA-256: 46cca8cb8ef5cba42241edd0da3b136063b8137316234748b40a38e2f915bdd1
gd-2.0.28-5.4E.el4_8.1.ppc64.rpm SHA-256: 05f48693a72ada42da58deda21fbe67bddb076cec7049977907fd41d40ea6faa
gd-devel-2.0.28-5.4E.el4_8.1.ppc.rpm SHA-256: aa3de3db7f5ace98992aa70c88fcad5c34cd6b50b758ad194b7a2d86b6103bd0
gd-progs-2.0.28-5.4E.el4_8.1.ppc.rpm SHA-256: d024a0881f4fa8288aa9d5094ecc370d7b2028193aa8f7730487f87e162ad21b

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.8

SRPM
gd-2.0.28-5.4E.el4_8.1.src.rpm SHA-256: 0543748f796599a6ca827a55e0f03820e043827ece9c4d0de042343d661d097f
ppc
gd-2.0.28-5.4E.el4_8.1.ppc.rpm SHA-256: 46cca8cb8ef5cba42241edd0da3b136063b8137316234748b40a38e2f915bdd1
gd-2.0.28-5.4E.el4_8.1.ppc64.rpm SHA-256: 05f48693a72ada42da58deda21fbe67bddb076cec7049977907fd41d40ea6faa
gd-devel-2.0.28-5.4E.el4_8.1.ppc.rpm SHA-256: aa3de3db7f5ace98992aa70c88fcad5c34cd6b50b758ad194b7a2d86b6103bd0
gd-progs-2.0.28-5.4E.el4_8.1.ppc.rpm SHA-256: d024a0881f4fa8288aa9d5094ecc370d7b2028193aa8f7730487f87e162ad21b

Red Hat Enterprise Linux Server from RHUI 5

SRPM
gd-2.0.33-9.4.el5_4.2.src.rpm SHA-256: 6ac1636679bc6c79ac105e77e6bb9751f1e50ae6bc905d4e510d1fddf95c1535
x86_64
gd-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: 09c9b246899b26638e5c54534af1403463e304d68ccfb917a6d08988717c466e
gd-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 6f5b90797d214177d45467ad531f2576fe6bfe980f34557879c04db894840b8f
gd-devel-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: d93edbab1a8182a8b7ea8630ff37e0d0cba8b3d975fc28dfc76638b251e67ee3
gd-devel-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 2cf49c0d7bff23dbd8c8890cb085cc2fca105c96d051f64422ed7fd8fb98c1d4
gd-progs-2.0.33-9.4.el5_4.2.x86_64.rpm SHA-256: 0c36fea5d19c181fbe301eaf9575dbea43dd6623c1369c17d6614d869b8a80aa
i386
gd-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: 09c9b246899b26638e5c54534af1403463e304d68ccfb917a6d08988717c466e
gd-devel-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: d93edbab1a8182a8b7ea8630ff37e0d0cba8b3d975fc28dfc76638b251e67ee3
gd-progs-2.0.33-9.4.el5_4.2.i386.rpm SHA-256: ef82dc6ff0b4a7df641356f678b5a126a737247c5ddd32c212b5005d9e63ba9f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility