-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2007.0220 -- [RedHat]
                    Important: xorg-x11 security update
                               17 April 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              xorg-x11
                      xorg-x11-server
                      libXfont
                      xorg-x11-apps
                      libX11
Publisher:            Red Hat
Operating System:     Red Hat Enterprise Linux 4
                      Red Hat Enterprise Linux 5
Impact:               Execute Arbitrary Code/Commands
                      Increased Privileges
Access:               Existing Account
CVE Names:            CVE-2007-1667 CVE-2007-1352 CVE-2007-1351
                      CVE-2007-1003

Ref:                  ESB-2007.0218

Original Bulletin:    https://rhn.redhat.com/errata/RHSA-2007-0126.html
                      https://rhn.redhat.com/errata/RHSA-2007-0127.html
                      https://rhn.redhat.com/errata/RHSA-2007-0132.html
                      https://rhn.redhat.com/errata/RHSA-2007-0157.html

Comment: This bulletin contains four separate Red Hat advisories fixing the
         same X.org vulnerabilities in different Red Hat packages and versions.

Revision History:  April 17 2007: Red Hat release additional RHEL5 updates 
                                  for CVE-2007-1667 (RHSA-2007-0157)
                   April  4 2007: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: xorg-x11 security update
Advisory ID:       RHSA-2007:0126-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0126.html
Issue date:        2007-04-03
Updated on:        2007-04-03
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-1003 CVE-2007-1351 CVE-2007-1352 
                   CVE-2007-1667 
- - ---------------------------------------------------------------------

1. Summary:

Updated X.org packages that fix several security issues are now available
for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

X.org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

iDefense reported an integer overflow flaw in the X.org XC-MISC
extension. A malicious authorized client could exploit this issue to cause
a denial of service (crash) or potentially execute arbitrary code with the
privileges of the X.org server. (CVE-2007-1003)

iDefense reported two integer overflows in the way X.org handled various
font files. A malicious local user could exploit these issues to
potentially execute arbitrary code with the privileges of the X.org server.
(CVE-2007-1351, CVE-2007-1352)

An integer overflow flaw was found in the X.org XGetPixel() function.
Improper use of this function could cause an application calling it to
function improperly, possibly leading to a crash or arbitrary code
execution. (CVE-2007-1667)

Users of X.org should upgrade to these updated packages, which contain a
backported patch and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

231693 - CVE-2007-1667 XGetPixel() integer overflow
233000 - CVE-2007-1003 xserver XC-MISC integer overflow
234056 - CVE-2007-1351 Multiple font integer overflows (CVE-2007-1352)

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.37.7.src.rpm
4bd1c5d7d99944e702442f56875eac43  xorg-x11-6.8.2-1.EL.13.37.7.src.rpm

i386:
36f7fa6b7df4a9b4b21c57c6b50646d9  xorg-x11-6.8.2-1.EL.13.37.7.i386.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
b465ebd7913a21d1ecb7f1f0dd2a4aae  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.i386.rpm
e134ffbe2b4b17131e5506bf9bc68541  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.i386.rpm
3f5630ece9fd6880d0359f45a6b1f0aa  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.i386.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
b1e79528b033ac08171372b965517c1a  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.i386.rpm
94351868b2867d537a35dfb152c22873  xorg-x11-devel-6.8.2-1.EL.13.37.7.i386.rpm
756d723c4c8b7b15eeef1ff9edf0647c  xorg-x11-doc-6.8.2-1.EL.13.37.7.i386.rpm
b682c885c8eeacee94656cc3708f38ff  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.i386.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
e0f077610db2d51f13fb7fdf2c75268b  xorg-x11-sdk-6.8.2-1.EL.13.37.7.i386.rpm
ff2833577de1fc88c33b33ceb7a9e96a  xorg-x11-tools-6.8.2-1.EL.13.37.7.i386.rpm
53b0c2739cd6809acea8b71bdcc6c1b5  xorg-x11-twm-6.8.2-1.EL.13.37.7.i386.rpm
2d35f929c0fc16cde2bc7a1d8cbdfd85  xorg-x11-xauth-6.8.2-1.EL.13.37.7.i386.rpm
91adf0505ce42c0a307f0f86c5f69df6  xorg-x11-xdm-6.8.2-1.EL.13.37.7.i386.rpm
6f2ded747d2398d4475980ab5a5960e5  xorg-x11-xfs-6.8.2-1.EL.13.37.7.i386.rpm

ia64:
e2ffb874685805996c242fd50d8d68ba  xorg-x11-6.8.2-1.EL.13.37.7.ia64.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
60400b3c4d11234875bcc0d79ba78d55  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.ia64.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
73386c89ab94b4f2b4e67ffbbf4f6596  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.ia64.rpm
7cb7b59a9169da82a8d9fb269e912504  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.ia64.rpm
0c833b63efd5ddf614b3a6c58017329d  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.ia64.rpm
c8c0b3ce4f20e673165c00bc191ca7ae  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.ia64.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
a471d9548cf3f3cbb28aab2696b3b30e  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.ia64.rpm
384c089f20f46df2f19cdf3980f1cbc4  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.ia64.rpm
a67024502cf8ed610c514509d131df79  xorg-x11-devel-6.8.2-1.EL.13.37.7.ia64.rpm
d01fb8530cb93381592760941f16201f  xorg-x11-doc-6.8.2-1.EL.13.37.7.ia64.rpm
713e1ee557db229c680d4dfe0207922c  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.ia64.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
4edf77ba008d7bfc489f0bf6a43da835  xorg-x11-libs-6.8.2-1.EL.13.37.7.ia64.rpm
d28fbef28429a3b5ce5a1a58d98b68be  xorg-x11-sdk-6.8.2-1.EL.13.37.7.ia64.rpm
cc443733407193fbcd4780ed2fa89d81  xorg-x11-tools-6.8.2-1.EL.13.37.7.ia64.rpm
63069b1c7174f80f0f4f747ef1d5a5d5  xorg-x11-twm-6.8.2-1.EL.13.37.7.ia64.rpm
001553310d0e95c6f7a27b1aac6a4f3e  xorg-x11-xauth-6.8.2-1.EL.13.37.7.ia64.rpm
4e14fcef499c9dc4604a2bf9be15a2f1  xorg-x11-xdm-6.8.2-1.EL.13.37.7.ia64.rpm
e7d7ce6aeafe030a0861c3b26799c308  xorg-x11-xfs-6.8.2-1.EL.13.37.7.ia64.rpm

ppc:
2d4f77fa1fd64b4818e1242a74b3de3e  xorg-x11-6.8.2-1.EL.13.37.7.ppc.rpm
fdafa0dc3883632e65505967e0aa2944  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.ppc.rpm
f94fddfd4321bbd6bfa4aedd844b7cdb  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.ppc64.rpm
88117dd0a4ce3900dff91210a1fe419e  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.ppc.rpm
4332c8684b7a16d8167ec2c2de00c841  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.ppc64.rpm
1d8c58d7577262d6ab70c14f744b1ab2  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.ppc.rpm
d90ef59b34c3cdcd9152f9dd142108c8  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.ppc.rpm
00bb2a615c32ba10100895a75ca1528c  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.ppc.rpm
bb4b30aa6759a18226af6e1da34b41a7  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.ppc.rpm
ebe1f27feaa633fdca65ab09d4af247d  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.ppc64.rpm
6d346318a03f580f1ff4f80f3a640830  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.ppc.rpm
8d7c94ede43fb2739f62b8e7d5ce586d  xorg-x11-devel-6.8.2-1.EL.13.37.7.ppc.rpm
2edfc79416d6cac44978f1a7cc6e2e07  xorg-x11-devel-6.8.2-1.EL.13.37.7.ppc64.rpm
490b55054a9325d498ec29fc3848c932  xorg-x11-doc-6.8.2-1.EL.13.37.7.ppc.rpm
cd84d24e244a968dc0b0e91fe2c6c8d7  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.ppc.rpm
a597d7bac88d7ec400e6e7bf449dd597  xorg-x11-libs-6.8.2-1.EL.13.37.7.ppc.rpm
2fa65c1d78db9ddfd6b08afff72daa63  xorg-x11-libs-6.8.2-1.EL.13.37.7.ppc64.rpm
f5db4d167826a338e1ebf0d1a0c9af1d  xorg-x11-sdk-6.8.2-1.EL.13.37.7.ppc.rpm
e0e87c5462805bac5f689ba404c52e11  xorg-x11-tools-6.8.2-1.EL.13.37.7.ppc.rpm
d8e8636e62059322b0b2d5a8b80e4470  xorg-x11-twm-6.8.2-1.EL.13.37.7.ppc.rpm
cf9eb3ad84221a293b430cd0bcb33cd7  xorg-x11-xauth-6.8.2-1.EL.13.37.7.ppc.rpm
7991b6905e6683114e16580457005078  xorg-x11-xdm-6.8.2-1.EL.13.37.7.ppc.rpm
a6fe29b0da08cac64e0b96e208360663  xorg-x11-xfs-6.8.2-1.EL.13.37.7.ppc.rpm

s390:
de9b99864011c6ec13d45db176c85de4  xorg-x11-6.8.2-1.EL.13.37.7.s390.rpm
910ccb9d4d46f1236f88d1663f200464  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.s390.rpm
13442acf3f1eed24fec7efacd7132b70  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.s390.rpm
ec38f0af42759602123dcb8391e33047  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.s390.rpm
e6e081808d7e1584b0f0f50e80b2f390  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.s390.rpm
f91cc8ec00b831c1d7707673b70b1953  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.s390.rpm
89689a40e41d2a7e7a562e9ca982d1f6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.s390.rpm
00409886d7512568b3972a416c8ab654  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.s390.rpm
296e7f63ae5ed0408abb59bfe0456de9  xorg-x11-devel-6.8.2-1.EL.13.37.7.s390.rpm
abee942f789bc8c83a01f1a7463768b4  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.s390.rpm
184181ce54d653bafbea605e4caf6b0f  xorg-x11-libs-6.8.2-1.EL.13.37.7.s390.rpm
cb5b86c15d8bda598951626ceed90af6  xorg-x11-tools-6.8.2-1.EL.13.37.7.s390.rpm
44cbe5662b8814c55d2d6714795f14c4  xorg-x11-twm-6.8.2-1.EL.13.37.7.s390.rpm
f8f1d8c5488c5829deda0bb5d4615706  xorg-x11-xauth-6.8.2-1.EL.13.37.7.s390.rpm
59647c62583c715099a42f9f40527000  xorg-x11-xdm-6.8.2-1.EL.13.37.7.s390.rpm
cad0b195a63da985b65d8204626f1fa7  xorg-x11-xfs-6.8.2-1.EL.13.37.7.s390.rpm

s390x:
bb57188abeb138866bc2df6b590c4380  xorg-x11-6.8.2-1.EL.13.37.7.s390x.rpm
910ccb9d4d46f1236f88d1663f200464  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.s390.rpm
53d58480896f846905cd084066c152d7  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.s390x.rpm
13442acf3f1eed24fec7efacd7132b70  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.s390.rpm
c393ce2b562abb071cb9eceaaec906cf  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.s390x.rpm
02d4a41eb32733a04117070c7e3bef5f  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.s390x.rpm
5a84854f9275885d774d009079b9478e  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.s390x.rpm
7e83a4dac432aa4234cfb806498c8b2c  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.s390x.rpm
89689a40e41d2a7e7a562e9ca982d1f6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.s390.rpm
3040d10398f1a6e75507261edf1e2fac  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.s390x.rpm
ee4989514ff421072acd800af73af498  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.s390x.rpm
296e7f63ae5ed0408abb59bfe0456de9  xorg-x11-devel-6.8.2-1.EL.13.37.7.s390.rpm
95b799987adc9b8458897db5e3ce6d07  xorg-x11-devel-6.8.2-1.EL.13.37.7.s390x.rpm
1d34651fab068720632acddd0fd35000  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.s390x.rpm
184181ce54d653bafbea605e4caf6b0f  xorg-x11-libs-6.8.2-1.EL.13.37.7.s390.rpm
c81bb567cf9d68a6b5720deb4c82fc67  xorg-x11-libs-6.8.2-1.EL.13.37.7.s390x.rpm
1c9047843fa5e309432248ec550d9b65  xorg-x11-tools-6.8.2-1.EL.13.37.7.s390x.rpm
7a24db13a098e491dd0389e5ee4e7afa  xorg-x11-twm-6.8.2-1.EL.13.37.7.s390x.rpm
4cbbce5999f68fa30092ef3c6dbe8b52  xorg-x11-xauth-6.8.2-1.EL.13.37.7.s390x.rpm
0e33da1457a4e3f2e607d70685d453b7  xorg-x11-xdm-6.8.2-1.EL.13.37.7.s390x.rpm
9405c3c67dc3382cad44f09ef7fb59f2  xorg-x11-xfs-6.8.2-1.EL.13.37.7.s390x.rpm

x86_64:
7cbd2d563eddfb1cbb3f3f3b5c5591ec  xorg-x11-6.8.2-1.EL.13.37.7.x86_64.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
0998a0bb70948cd33ff47d1d9eef2f65  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.x86_64.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
4f324218747fdd13ab40c04d30036aab  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.x86_64.rpm
1d957e903ee9a013dd013256f4fe1185  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.x86_64.rpm
be3ac8a5aa6b51ad32ecca9b046fe5ff  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.x86_64.rpm
5ca86cd13d2920e476e75f54f05c055b  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.x86_64.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
8e3db2cabcfa1c42149b0b0d32a0f87a  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.x86_64.rpm
4ea7364fbae5523cb52bd0df580a7b53  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.x86_64.rpm
94351868b2867d537a35dfb152c22873  xorg-x11-devel-6.8.2-1.EL.13.37.7.i386.rpm
a2b7ce1bf02a6f9472b430a6ad77801b  xorg-x11-devel-6.8.2-1.EL.13.37.7.x86_64.rpm
662407b65dac405dda71d815b6a4dfbf  xorg-x11-doc-6.8.2-1.EL.13.37.7.x86_64.rpm
026a2f9e33e6206daf98bc7c40be6456  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.x86_64.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
e3a1ff963c5f737ad8abd1b4671dae00  xorg-x11-libs-6.8.2-1.EL.13.37.7.x86_64.rpm
f3266f1514ab4d65e4ad070623313d39  xorg-x11-sdk-6.8.2-1.EL.13.37.7.x86_64.rpm
b797868449c0b1d6ee40e2ee2b81a7ec  xorg-x11-tools-6.8.2-1.EL.13.37.7.x86_64.rpm
77a3520a3524097dd96b873ad20645a6  xorg-x11-twm-6.8.2-1.EL.13.37.7.x86_64.rpm
4ddbd3782e80cfc11e25f4d69750850b  xorg-x11-xauth-6.8.2-1.EL.13.37.7.x86_64.rpm
7974e2c2687bf3437bd2237c2f4df808  xorg-x11-xdm-6.8.2-1.EL.13.37.7.x86_64.rpm
24a285f05f8719c4dfa07fa8fbb94b35  xorg-x11-xfs-6.8.2-1.EL.13.37.7.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.37.7.src.rpm
4bd1c5d7d99944e702442f56875eac43  xorg-x11-6.8.2-1.EL.13.37.7.src.rpm

i386:
36f7fa6b7df4a9b4b21c57c6b50646d9  xorg-x11-6.8.2-1.EL.13.37.7.i386.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
b465ebd7913a21d1ecb7f1f0dd2a4aae  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.i386.rpm
e134ffbe2b4b17131e5506bf9bc68541  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.i386.rpm
3f5630ece9fd6880d0359f45a6b1f0aa  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.i386.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
b1e79528b033ac08171372b965517c1a  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.i386.rpm
94351868b2867d537a35dfb152c22873  xorg-x11-devel-6.8.2-1.EL.13.37.7.i386.rpm
756d723c4c8b7b15eeef1ff9edf0647c  xorg-x11-doc-6.8.2-1.EL.13.37.7.i386.rpm
b682c885c8eeacee94656cc3708f38ff  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.i386.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
e0f077610db2d51f13fb7fdf2c75268b  xorg-x11-sdk-6.8.2-1.EL.13.37.7.i386.rpm
ff2833577de1fc88c33b33ceb7a9e96a  xorg-x11-tools-6.8.2-1.EL.13.37.7.i386.rpm
53b0c2739cd6809acea8b71bdcc6c1b5  xorg-x11-twm-6.8.2-1.EL.13.37.7.i386.rpm
2d35f929c0fc16cde2bc7a1d8cbdfd85  xorg-x11-xauth-6.8.2-1.EL.13.37.7.i386.rpm
91adf0505ce42c0a307f0f86c5f69df6  xorg-x11-xdm-6.8.2-1.EL.13.37.7.i386.rpm
6f2ded747d2398d4475980ab5a5960e5  xorg-x11-xfs-6.8.2-1.EL.13.37.7.i386.rpm

x86_64:
7cbd2d563eddfb1cbb3f3f3b5c5591ec  xorg-x11-6.8.2-1.EL.13.37.7.x86_64.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
0998a0bb70948cd33ff47d1d9eef2f65  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.x86_64.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
4f324218747fdd13ab40c04d30036aab  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.x86_64.rpm
1d957e903ee9a013dd013256f4fe1185  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.x86_64.rpm
be3ac8a5aa6b51ad32ecca9b046fe5ff  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.x86_64.rpm
5ca86cd13d2920e476e75f54f05c055b  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.x86_64.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
8e3db2cabcfa1c42149b0b0d32a0f87a  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.x86_64.rpm
4ea7364fbae5523cb52bd0df580a7b53  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.x86_64.rpm
94351868b2867d537a35dfb152c22873  xorg-x11-devel-6.8.2-1.EL.13.37.7.i386.rpm
a2b7ce1bf02a6f9472b430a6ad77801b  xorg-x11-devel-6.8.2-1.EL.13.37.7.x86_64.rpm
662407b65dac405dda71d815b6a4dfbf  xorg-x11-doc-6.8.2-1.EL.13.37.7.x86_64.rpm
026a2f9e33e6206daf98bc7c40be6456  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.x86_64.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
e3a1ff963c5f737ad8abd1b4671dae00  xorg-x11-libs-6.8.2-1.EL.13.37.7.x86_64.rpm
f3266f1514ab4d65e4ad070623313d39  xorg-x11-sdk-6.8.2-1.EL.13.37.7.x86_64.rpm
b797868449c0b1d6ee40e2ee2b81a7ec  xorg-x11-tools-6.8.2-1.EL.13.37.7.x86_64.rpm
77a3520a3524097dd96b873ad20645a6  xorg-x11-twm-6.8.2-1.EL.13.37.7.x86_64.rpm
4ddbd3782e80cfc11e25f4d69750850b  xorg-x11-xauth-6.8.2-1.EL.13.37.7.x86_64.rpm
7974e2c2687bf3437bd2237c2f4df808  xorg-x11-xdm-6.8.2-1.EL.13.37.7.x86_64.rpm
24a285f05f8719c4dfa07fa8fbb94b35  xorg-x11-xfs-6.8.2-1.EL.13.37.7.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.37.7.src.rpm
4bd1c5d7d99944e702442f56875eac43  xorg-x11-6.8.2-1.EL.13.37.7.src.rpm

i386:
36f7fa6b7df4a9b4b21c57c6b50646d9  xorg-x11-6.8.2-1.EL.13.37.7.i386.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
b465ebd7913a21d1ecb7f1f0dd2a4aae  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.i386.rpm
e134ffbe2b4b17131e5506bf9bc68541  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.i386.rpm
3f5630ece9fd6880d0359f45a6b1f0aa  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.i386.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
b1e79528b033ac08171372b965517c1a  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.i386.rpm
94351868b2867d537a35dfb152c22873  xorg-x11-devel-6.8.2-1.EL.13.37.7.i386.rpm
756d723c4c8b7b15eeef1ff9edf0647c  xorg-x11-doc-6.8.2-1.EL.13.37.7.i386.rpm
b682c885c8eeacee94656cc3708f38ff  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.i386.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
e0f077610db2d51f13fb7fdf2c75268b  xorg-x11-sdk-6.8.2-1.EL.13.37.7.i386.rpm
ff2833577de1fc88c33b33ceb7a9e96a  xorg-x11-tools-6.8.2-1.EL.13.37.7.i386.rpm
53b0c2739cd6809acea8b71bdcc6c1b5  xorg-x11-twm-6.8.2-1.EL.13.37.7.i386.rpm
2d35f929c0fc16cde2bc7a1d8cbdfd85  xorg-x11-xauth-6.8.2-1.EL.13.37.7.i386.rpm
91adf0505ce42c0a307f0f86c5f69df6  xorg-x11-xdm-6.8.2-1.EL.13.37.7.i386.rpm
6f2ded747d2398d4475980ab5a5960e5  xorg-x11-xfs-6.8.2-1.EL.13.37.7.i386.rpm

ia64:
e2ffb874685805996c242fd50d8d68ba  xorg-x11-6.8.2-1.EL.13.37.7.ia64.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
60400b3c4d11234875bcc0d79ba78d55  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.ia64.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
73386c89ab94b4f2b4e67ffbbf4f6596  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.ia64.rpm
7cb7b59a9169da82a8d9fb269e912504  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.ia64.rpm
0c833b63efd5ddf614b3a6c58017329d  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.ia64.rpm
c8c0b3ce4f20e673165c00bc191ca7ae  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.ia64.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
a471d9548cf3f3cbb28aab2696b3b30e  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.ia64.rpm
384c089f20f46df2f19cdf3980f1cbc4  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.ia64.rpm
a67024502cf8ed610c514509d131df79  xorg-x11-devel-6.8.2-1.EL.13.37.7.ia64.rpm
d01fb8530cb93381592760941f16201f  xorg-x11-doc-6.8.2-1.EL.13.37.7.ia64.rpm
713e1ee557db229c680d4dfe0207922c  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.ia64.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
4edf77ba008d7bfc489f0bf6a43da835  xorg-x11-libs-6.8.2-1.EL.13.37.7.ia64.rpm
d28fbef28429a3b5ce5a1a58d98b68be  xorg-x11-sdk-6.8.2-1.EL.13.37.7.ia64.rpm
cc443733407193fbcd4780ed2fa89d81  xorg-x11-tools-6.8.2-1.EL.13.37.7.ia64.rpm
63069b1c7174f80f0f4f747ef1d5a5d5  xorg-x11-twm-6.8.2-1.EL.13.37.7.ia64.rpm
001553310d0e95c6f7a27b1aac6a4f3e  xorg-x11-xauth-6.8.2-1.EL.13.37.7.ia64.rpm
4e14fcef499c9dc4604a2bf9be15a2f1  xorg-x11-xdm-6.8.2-1.EL.13.37.7.ia64.rpm
e7d7ce6aeafe030a0861c3b26799c308  xorg-x11-xfs-6.8.2-1.EL.13.37.7.ia64.rpm

x86_64:
7cbd2d563eddfb1cbb3f3f3b5c5591ec  xorg-x11-6.8.2-1.EL.13.37.7.x86_64.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
0998a0bb70948cd33ff47d1d9eef2f65  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.x86_64.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
4f324218747fdd13ab40c04d30036aab  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.x86_64.rpm
1d957e903ee9a013dd013256f4fe1185  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.x86_64.rpm
be3ac8a5aa6b51ad32ecca9b046fe5ff  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.x86_64.rpm
5ca86cd13d2920e476e75f54f05c055b  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.x86_64.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
8e3db2cabcfa1c42149b0b0d32a0f87a  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.x86_64.rpm
4ea7364fbae5523cb52bd0df580a7b53  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.x86_64.rpm
94351868b2867d537a35dfb152c22873  xorg-x11-devel-6.8.2-1.EL.13.37.7.i386.rpm
a2b7ce1bf02a6f9472b430a6ad77801b  xorg-x11-devel-6.8.2-1.EL.13.37.7.x86_64.rpm
662407b65dac405dda71d815b6a4dfbf  xorg-x11-doc-6.8.2-1.EL.13.37.7.x86_64.rpm
026a2f9e33e6206daf98bc7c40be6456  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.x86_64.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
e3a1ff963c5f737ad8abd1b4671dae00  xorg-x11-libs-6.8.2-1.EL.13.37.7.x86_64.rpm
f3266f1514ab4d65e4ad070623313d39  xorg-x11-sdk-6.8.2-1.EL.13.37.7.x86_64.rpm
b797868449c0b1d6ee40e2ee2b81a7ec  xorg-x11-tools-6.8.2-1.EL.13.37.7.x86_64.rpm
77a3520a3524097dd96b873ad20645a6  xorg-x11-twm-6.8.2-1.EL.13.37.7.x86_64.rpm
4ddbd3782e80cfc11e25f4d69750850b  xorg-x11-xauth-6.8.2-1.EL.13.37.7.x86_64.rpm
7974e2c2687bf3437bd2237c2f4df808  xorg-x11-xdm-6.8.2-1.EL.13.37.7.x86_64.rpm
24a285f05f8719c4dfa07fa8fbb94b35  xorg-x11-xfs-6.8.2-1.EL.13.37.7.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.37.7.src.rpm
4bd1c5d7d99944e702442f56875eac43  xorg-x11-6.8.2-1.EL.13.37.7.src.rpm

i386:
36f7fa6b7df4a9b4b21c57c6b50646d9  xorg-x11-6.8.2-1.EL.13.37.7.i386.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
b465ebd7913a21d1ecb7f1f0dd2a4aae  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.i386.rpm
e134ffbe2b4b17131e5506bf9bc68541  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.i386.rpm
3f5630ece9fd6880d0359f45a6b1f0aa  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.i386.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
b1e79528b033ac08171372b965517c1a  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.i386.rpm
94351868b2867d537a35dfb152c22873  xorg-x11-devel-6.8.2-1.EL.13.37.7.i386.rpm
756d723c4c8b7b15eeef1ff9edf0647c  xorg-x11-doc-6.8.2-1.EL.13.37.7.i386.rpm
b682c885c8eeacee94656cc3708f38ff  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.i386.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
e0f077610db2d51f13fb7fdf2c75268b  xorg-x11-sdk-6.8.2-1.EL.13.37.7.i386.rpm
ff2833577de1fc88c33b33ceb7a9e96a  xorg-x11-tools-6.8.2-1.EL.13.37.7.i386.rpm
53b0c2739cd6809acea8b71bdcc6c1b5  xorg-x11-twm-6.8.2-1.EL.13.37.7.i386.rpm
2d35f929c0fc16cde2bc7a1d8cbdfd85  xorg-x11-xauth-6.8.2-1.EL.13.37.7.i386.rpm
91adf0505ce42c0a307f0f86c5f69df6  xorg-x11-xdm-6.8.2-1.EL.13.37.7.i386.rpm
6f2ded747d2398d4475980ab5a5960e5  xorg-x11-xfs-6.8.2-1.EL.13.37.7.i386.rpm

ia64:
e2ffb874685805996c242fd50d8d68ba  xorg-x11-6.8.2-1.EL.13.37.7.ia64.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
60400b3c4d11234875bcc0d79ba78d55  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.ia64.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
73386c89ab94b4f2b4e67ffbbf4f6596  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.ia64.rpm
7cb7b59a9169da82a8d9fb269e912504  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.ia64.rpm
0c833b63efd5ddf614b3a6c58017329d  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.ia64.rpm
c8c0b3ce4f20e673165c00bc191ca7ae  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.ia64.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
a471d9548cf3f3cbb28aab2696b3b30e  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.ia64.rpm
384c089f20f46df2f19cdf3980f1cbc4  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.ia64.rpm
a67024502cf8ed610c514509d131df79  xorg-x11-devel-6.8.2-1.EL.13.37.7.ia64.rpm
d01fb8530cb93381592760941f16201f  xorg-x11-doc-6.8.2-1.EL.13.37.7.ia64.rpm
713e1ee557db229c680d4dfe0207922c  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.ia64.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
4edf77ba008d7bfc489f0bf6a43da835  xorg-x11-libs-6.8.2-1.EL.13.37.7.ia64.rpm
d28fbef28429a3b5ce5a1a58d98b68be  xorg-x11-sdk-6.8.2-1.EL.13.37.7.ia64.rpm
cc443733407193fbcd4780ed2fa89d81  xorg-x11-tools-6.8.2-1.EL.13.37.7.ia64.rpm
63069b1c7174f80f0f4f747ef1d5a5d5  xorg-x11-twm-6.8.2-1.EL.13.37.7.ia64.rpm
001553310d0e95c6f7a27b1aac6a4f3e  xorg-x11-xauth-6.8.2-1.EL.13.37.7.ia64.rpm
4e14fcef499c9dc4604a2bf9be15a2f1  xorg-x11-xdm-6.8.2-1.EL.13.37.7.ia64.rpm
e7d7ce6aeafe030a0861c3b26799c308  xorg-x11-xfs-6.8.2-1.EL.13.37.7.ia64.rpm

x86_64:
7cbd2d563eddfb1cbb3f3f3b5c5591ec  xorg-x11-6.8.2-1.EL.13.37.7.x86_64.rpm
87c9d637e7fee8e67925c306a0af12e9  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.i386.rpm
0998a0bb70948cd33ff47d1d9eef2f65  xorg-x11-Mesa-libGL-6.8.2-1.EL.13.37.7.x86_64.rpm
06579b3cbebd7bead926ead19b4d6408  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.i386.rpm
4f324218747fdd13ab40c04d30036aab  xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.37.7.x86_64.rpm
1d957e903ee9a013dd013256f4fe1185  xorg-x11-Xdmx-6.8.2-1.EL.13.37.7.x86_64.rpm
be3ac8a5aa6b51ad32ecca9b046fe5ff  xorg-x11-Xnest-6.8.2-1.EL.13.37.7.x86_64.rpm
5ca86cd13d2920e476e75f54f05c055b  xorg-x11-Xvfb-6.8.2-1.EL.13.37.7.x86_64.rpm
366d3e48726916018131d2aea7874ce6  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.i386.rpm
8e3db2cabcfa1c42149b0b0d32a0f87a  xorg-x11-deprecated-libs-6.8.2-1.EL.13.37.7.x86_64.rpm
4ea7364fbae5523cb52bd0df580a7b53  xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.37.7.x86_64.rpm
94351868b2867d537a35dfb152c22873  xorg-x11-devel-6.8.2-1.EL.13.37.7.i386.rpm
a2b7ce1bf02a6f9472b430a6ad77801b  xorg-x11-devel-6.8.2-1.EL.13.37.7.x86_64.rpm
662407b65dac405dda71d815b6a4dfbf  xorg-x11-doc-6.8.2-1.EL.13.37.7.x86_64.rpm
026a2f9e33e6206daf98bc7c40be6456  xorg-x11-font-utils-6.8.2-1.EL.13.37.7.x86_64.rpm
ecdfa748ff28c91a336eec3f6199f072  xorg-x11-libs-6.8.2-1.EL.13.37.7.i386.rpm
e3a1ff963c5f737ad8abd1b4671dae00  xorg-x11-libs-6.8.2-1.EL.13.37.7.x86_64.rpm
f3266f1514ab4d65e4ad070623313d39  xorg-x11-sdk-6.8.2-1.EL.13.37.7.x86_64.rpm
b797868449c0b1d6ee40e2ee2b81a7ec  xorg-x11-tools-6.8.2-1.EL.13.37.7.x86_64.rpm
77a3520a3524097dd96b873ad20645a6  xorg-x11-twm-6.8.2-1.EL.13.37.7.x86_64.rpm
4ddbd3782e80cfc11e25f4d69750850b  xorg-x11-xauth-6.8.2-1.EL.13.37.7.x86_64.rpm
7974e2c2687bf3437bd2237c2f4df808  xorg-x11-xdm-6.8.2-1.EL.13.37.7.x86_64.rpm
24a285f05f8719c4dfa07fa8fbb94b35  xorg-x11-xfs-6.8.2-1.EL.13.37.7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGEqhDXlSAg2UNWIIRAiZdAKDDFQWr5ZmARKmSvNfNvuTKnvu+7ACeKk7U
iJxRZkcW2pfmNj0VEQb5g2U=
=Cb+p
- -----END PGP SIGNATURE-----

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: xorg-x11-server security update
Advisory ID:       RHSA-2007:0127-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0127.html
Issue date:        2007-04-03
Updated on:        2007-04-03
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-1003 
- - ---------------------------------------------------------------------

1. Summary:

Updated X.org X11 server packages that fix a security issue are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

X.org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

iDefense reported an integer overflow flaw in the X.org X11 server XC-MISC
extension. A malicious authorized client could exploit this issue to cause
a denial of service (crash) or potentially execute arbitrary code with root
privileges on the X.org server. (CVE-2007-1003)

Users of the X.org X11 server should upgrade to these updated packages,
which contain a backported patch and is not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

233001 - CVE-2007-1003 xserver XC-MISC integer overflow

6. RPMs required:

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xorg-x11-server-1.1.1-48.13.0.1.el5.src.rpm
f165c646ef24bdf7aea35dcd02f3994e  xorg-x11-server-1.1.1-48.13.0.1.el5.src.rpm

i386:
4ac82a4321e40c6e2315d91f273f03f6  xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.i386.rpm
15552fa4e7a6a1a1de0fc3f0e292ff9d  xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.i386.rpm
6904668064a54569c0069ef84525244c  xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.i386.rpm
35be18e2b2e480afcc7ef6ed783ccc51  xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.i386.rpm
a03d6baf97916deb19a038f44bbdc617  xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.i386.rpm
2fe5571817c5799ab1434c3f640dc4f0  xorg-x11-server-debuginfo-1.1.1-48.13.0.1.el5.i386.rpm

x86_64:
3c3cabed8f92625968704ff192793fc4  xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.x86_64.rpm
3d515fe01f61e31b6cd86bc20d4f1c05  xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.x86_64.rpm
7160f1f23ea3690f716e29e0e8c61e6e  xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.x86_64.rpm
278835bdc3120b247360205c30a1d6b5  xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.x86_64.rpm
cab10df3473d826cd1aa6ad4af7dcdc1  xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.x86_64.rpm
300eca05c6e3ea81fa654695add71700  xorg-x11-server-debuginfo-1.1.1-48.13.0.1.el5.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xorg-x11-server-1.1.1-48.13.0.1.el5.src.rpm
f165c646ef24bdf7aea35dcd02f3994e  xorg-x11-server-1.1.1-48.13.0.1.el5.src.rpm

i386:
2fe5571817c5799ab1434c3f640dc4f0  xorg-x11-server-debuginfo-1.1.1-48.13.0.1.el5.i386.rpm
4b0fcea97774ed878cf8ec3d8229918e  xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.i386.rpm

x86_64:
300eca05c6e3ea81fa654695add71700  xorg-x11-server-debuginfo-1.1.1-48.13.0.1.el5.x86_64.rpm
45552f0cfc32826ec7f15ef2fe85ebce  xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xorg-x11-server-1.1.1-48.13.0.1.el5.src.rpm
f165c646ef24bdf7aea35dcd02f3994e  xorg-x11-server-1.1.1-48.13.0.1.el5.src.rpm

i386:
4ac82a4321e40c6e2315d91f273f03f6  xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.i386.rpm
15552fa4e7a6a1a1de0fc3f0e292ff9d  xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.i386.rpm
6904668064a54569c0069ef84525244c  xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.i386.rpm
35be18e2b2e480afcc7ef6ed783ccc51  xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.i386.rpm
a03d6baf97916deb19a038f44bbdc617  xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.i386.rpm
2fe5571817c5799ab1434c3f640dc4f0  xorg-x11-server-debuginfo-1.1.1-48.13.0.1.el5.i386.rpm
4b0fcea97774ed878cf8ec3d8229918e  xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.i386.rpm

ia64:
1382c0813050cf03d7e08823c152d09b  xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.ia64.rpm
a4ced5410990effdde9931dda62693ad  xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.ia64.rpm
1cb88ddefe5120343b601637159a582f  xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.ia64.rpm
f3b6ab243b698987ae3f52c3df9694e0  xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.ia64.rpm
693e49f05f08f625414fbb4f0e2a43ef  xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.ia64.rpm
d9cb5b8937cda60d6a4e52801ffc7600  xorg-x11-server-debuginfo-1.1.1-48.13.0.1.el5.ia64.rpm
de9422348f37dddbed72d0ba099784f9  xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.ia64.rpm

ppc:
e9a5bd06364e558805adef522547da38  xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.ppc.rpm
c9c28a3edbdb88e17e9f315c5ebe6a0b  xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.ppc.rpm
8ba30d162413630541a3e86f2e955acc  xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.ppc.rpm
12407cf8ef84e30858e881d4ee956493  xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.ppc.rpm
0ab6c48bb411139f4941b9976e5928c3  xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.ppc.rpm
9c069ebb2910b2ee6528e3a9fb7d7778  xorg-x11-server-debuginfo-1.1.1-48.13.0.1.el5.ppc.rpm
f24e4514ce2d6837954b99f6f5ce78a9  xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.ppc.rpm

s390x:
2d0ebaf16c3d4e111c24bdcefd3dd775  xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.s390x.rpm
3aa5a53b66c679b6e65962cef215d479  xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.s390x.rpm
49b504e4c01dad2303babbe272dc99b7  xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.s390x.rpm
11e1f0d8afd7b7e502a75251395ebd07  xorg-x11-server-debuginfo-1.1.1-48.13.0.1.el5.s390x.rpm

x86_64:
3c3cabed8f92625968704ff192793fc4  xorg-x11-server-Xdmx-1.1.1-48.13.0.1.el5.x86_64.rpm
3d515fe01f61e31b6cd86bc20d4f1c05  xorg-x11-server-Xephyr-1.1.1-48.13.0.1.el5.x86_64.rpm
7160f1f23ea3690f716e29e0e8c61e6e  xorg-x11-server-Xnest-1.1.1-48.13.0.1.el5.x86_64.rpm
278835bdc3120b247360205c30a1d6b5  xorg-x11-server-Xorg-1.1.1-48.13.0.1.el5.x86_64.rpm
cab10df3473d826cd1aa6ad4af7dcdc1  xorg-x11-server-Xvfb-1.1.1-48.13.0.1.el5.x86_64.rpm
300eca05c6e3ea81fa654695add71700  xorg-x11-server-debuginfo-1.1.1-48.13.0.1.el5.x86_64.rpm
45552f0cfc32826ec7f15ef2fe85ebce  xorg-x11-server-sdk-1.1.1-48.13.0.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGEqhLXlSAg2UNWIIRAu6QAJ9BrqC37UChlWXzT8ex4VQec8kxlQCZAamo
q+umL6gq8Kl5skzZe/4VqnY=
=4AD9
- -----END PGP SIGNATURE-----

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: libXfont security update
Advisory ID:       RHSA-2007:0132-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0132.html
Issue date:        2007-04-03
Updated on:        2007-04-03
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-1351 CVE-2007-1352 
- - ---------------------------------------------------------------------

1. Summary:

Updated X.org libXfont packages that fix a security issue are now available
for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

X.org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

iDefense reported two integer overflows in the way X.org handled various
font files. A malicious local user could exploit these issues to
potentially execute arbitrary code with the privileges of the X.org server.
(CVE-2007-1351, CVE-2007-1352)

Users of X.org libXfont should upgrade to these updated packages, which
contain a backported patch and are not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

234058 - CVE-2007-1351 Multiple font integer overflows (CVE-2007-1352)

6. RPMs required:

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libXfont-1.2.2-1.0.2.el5.src.rpm
cebbaf955689613a4da4a13e70048bc9  libXfont-1.2.2-1.0.2.el5.src.rpm

i386:
4353d56aeba21ccafa8f1bbf0c657a44  libXfont-1.2.2-1.0.2.el5.i386.rpm
baec95cb7d9e1949b4ab1dfe4827720a  libXfont-debuginfo-1.2.2-1.0.2.el5.i386.rpm

x86_64:
4353d56aeba21ccafa8f1bbf0c657a44  libXfont-1.2.2-1.0.2.el5.i386.rpm
8921098af8f63c467e03faf813de0501  libXfont-1.2.2-1.0.2.el5.x86_64.rpm
baec95cb7d9e1949b4ab1dfe4827720a  libXfont-debuginfo-1.2.2-1.0.2.el5.i386.rpm
fe9f087eb1935ceb0ea544523d64abaa  libXfont-debuginfo-1.2.2-1.0.2.el5.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libXfont-1.2.2-1.0.2.el5.src.rpm
cebbaf955689613a4da4a13e70048bc9  libXfont-1.2.2-1.0.2.el5.src.rpm

i386:
baec95cb7d9e1949b4ab1dfe4827720a  libXfont-debuginfo-1.2.2-1.0.2.el5.i386.rpm
a79829992fad2158b5b3f1f37e917d05  libXfont-devel-1.2.2-1.0.2.el5.i386.rpm

x86_64:
baec95cb7d9e1949b4ab1dfe4827720a  libXfont-debuginfo-1.2.2-1.0.2.el5.i386.rpm
fe9f087eb1935ceb0ea544523d64abaa  libXfont-debuginfo-1.2.2-1.0.2.el5.x86_64.rpm
a79829992fad2158b5b3f1f37e917d05  libXfont-devel-1.2.2-1.0.2.el5.i386.rpm
a4f8fc9719241360073507e5ee4f71eb  libXfont-devel-1.2.2-1.0.2.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/libXfont-1.2.2-1.0.2.el5.src.rpm
cebbaf955689613a4da4a13e70048bc9  libXfont-1.2.2-1.0.2.el5.src.rpm

i386:
4353d56aeba21ccafa8f1bbf0c657a44  libXfont-1.2.2-1.0.2.el5.i386.rpm
baec95cb7d9e1949b4ab1dfe4827720a  libXfont-debuginfo-1.2.2-1.0.2.el5.i386.rpm
a79829992fad2158b5b3f1f37e917d05  libXfont-devel-1.2.2-1.0.2.el5.i386.rpm

ia64:
816dec2b8f2a72d5ab47afad494ce128  libXfont-1.2.2-1.0.2.el5.ia64.rpm
58710dd335d8c9a88d23446ce73f48b9  libXfont-debuginfo-1.2.2-1.0.2.el5.ia64.rpm
b467c7ec1bd61bdfa55118c658d64c66  libXfont-devel-1.2.2-1.0.2.el5.ia64.rpm

ppc:
1d6311c46bd83b598083d415937adb2e  libXfont-1.2.2-1.0.2.el5.ppc.rpm
0331576de1d63b54159c16564d69c098  libXfont-1.2.2-1.0.2.el5.ppc64.rpm
4dd1bfc60a0a739cb9d786762b51ca69  libXfont-debuginfo-1.2.2-1.0.2.el5.ppc.rpm
1582d43ed5db3cb3682dc003ed392d84  libXfont-debuginfo-1.2.2-1.0.2.el5.ppc64.rpm
4eb2668a3160e080ba4cd5ea5b66f553  libXfont-devel-1.2.2-1.0.2.el5.ppc.rpm
537c0b1ce6e6fa60efa9e341fa056776  libXfont-devel-1.2.2-1.0.2.el5.ppc64.rpm

s390x:
2ec26a64f65361dc4586fe48a02aedd6  libXfont-1.2.2-1.0.2.el5.s390.rpm
ff4bab53c981c8da60911edebbf7b9c6  libXfont-1.2.2-1.0.2.el5.s390x.rpm
91716ea76da2c3e189ae5fd0dd498f06  libXfont-debuginfo-1.2.2-1.0.2.el5.s390.rpm
af4cedc903ffcee19430e73e026987ca  libXfont-debuginfo-1.2.2-1.0.2.el5.s390x.rpm
10e487c8f8a608d5e73a5148789a44ce  libXfont-devel-1.2.2-1.0.2.el5.s390.rpm
3a87733755c9e8cd117aadee9eea56d1  libXfont-devel-1.2.2-1.0.2.el5.s390x.rpm

x86_64:
4353d56aeba21ccafa8f1bbf0c657a44  libXfont-1.2.2-1.0.2.el5.i386.rpm
8921098af8f63c467e03faf813de0501  libXfont-1.2.2-1.0.2.el5.x86_64.rpm
baec95cb7d9e1949b4ab1dfe4827720a  libXfont-debuginfo-1.2.2-1.0.2.el5.i386.rpm
fe9f087eb1935ceb0ea544523d64abaa  libXfont-debuginfo-1.2.2-1.0.2.el5.x86_64.rpm
a79829992fad2158b5b3f1f37e917d05  libXfont-devel-1.2.2-1.0.2.el5.i386.rpm
a4f8fc9719241360073507e5ee4f71eb  libXfont-devel-1.2.2-1.0.2.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGEqhmXlSAg2UNWIIRAiSkAKChsQorzCcaRJyH5cp2EkbSHjqyMwCdEiUw
pf1bYLNj4hEuStnTMcc+J8k=
=n6d0
- -----END PGP SIGNATURE-----

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Moderate: xorg-x11-apps and libX11 security update
Advisory ID:       RHSA-2007:0157-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0157.html
Issue date:        2007-04-16
Updated on:        2007-04-16
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-1667 
- - ---------------------------------------------------------------------

1. Summary:

Updated xorg-x11-apps and libX11 packages that fix a security issue are now
available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

X.org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

An integer overflow flaw was found in the X.org XGetPixel() function.
Improper use of this function could cause an application calling it to
function improperly, possibly leading to a crash or arbitrary code
execution. (CVE-2007-1667)

Users of the X.org X11 server should upgrade to these updated packages,
which contain a backported patch and are not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

231694 - CVE-2007-1667 XGetPixel() integer overflow

6. RPMs required:

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libX11-1.0.3-8.0.1.el5.src.rpm
4c6cf452385e085b57f53f32cb9d1521  libX11-1.0.3-8.0.1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xorg-x11-apps-7.1-4.0.1.el5.src.rpm
ff54c8414720357c1777beba9c7b9e25  xorg-x11-apps-7.1-4.0.1.el5.src.rpm

i386:
eafebca30be46a1f126a9085729dae91  libX11-1.0.3-8.0.1.el5.i386.rpm
35eb6170e8e0c26993f520cf839c120c  libX11-debuginfo-1.0.3-8.0.1.el5.i386.rpm
6515c78f537b870dfe18fdd3d53ddfb9  xorg-x11-apps-7.1-4.0.1.el5.i386.rpm
b8ef8ca891a67f6e62c63bb1bf9d22d1  xorg-x11-apps-debuginfo-7.1-4.0.1.el5.i386.rpm

x86_64:
eafebca30be46a1f126a9085729dae91  libX11-1.0.3-8.0.1.el5.i386.rpm
ea143cb7bbe170730729d1dff11a54fa  libX11-1.0.3-8.0.1.el5.x86_64.rpm
35eb6170e8e0c26993f520cf839c120c  libX11-debuginfo-1.0.3-8.0.1.el5.i386.rpm
8da6f620d1dfbe194863d25ffd9a8dad  libX11-debuginfo-1.0.3-8.0.1.el5.x86_64.rpm
43a723f54a8905609c19501e67a9f040  xorg-x11-apps-7.1-4.0.1.el5.x86_64.rpm
8f316a250f656a6418c320145ac02b62  xorg-x11-apps-debuginfo-7.1-4.0.1.el5.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/libX11-1.0.3-8.0.1.el5.src.rpm
4c6cf452385e085b57f53f32cb9d1521  libX11-1.0.3-8.0.1.el5.src.rpm

i386:
35eb6170e8e0c26993f520cf839c120c  libX11-debuginfo-1.0.3-8.0.1.el5.i386.rpm
7b2d2ba7bb68a47bd7662322e781ae7a  libX11-devel-1.0.3-8.0.1.el5.i386.rpm

x86_64:
35eb6170e8e0c26993f520cf839c120c  libX11-debuginfo-1.0.3-8.0.1.el5.i386.rpm
8da6f620d1dfbe194863d25ffd9a8dad  libX11-debuginfo-1.0.3-8.0.1.el5.x86_64.rpm
7b2d2ba7bb68a47bd7662322e781ae7a  libX11-devel-1.0.3-8.0.1.el5.i386.rpm
acadc303e67b0c14da568f0425fde65d  libX11-devel-1.0.3-8.0.1.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/libX11-1.0.3-8.0.1.el5.src.rpm
4c6cf452385e085b57f53f32cb9d1521  libX11-1.0.3-8.0.1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xorg-x11-apps-7.1-4.0.1.el5.src.rpm
ff54c8414720357c1777beba9c7b9e25  xorg-x11-apps-7.1-4.0.1.el5.src.rpm

i386:
eafebca30be46a1f126a9085729dae91  libX11-1.0.3-8.0.1.el5.i386.rpm
35eb6170e8e0c26993f520cf839c120c  libX11-debuginfo-1.0.3-8.0.1.el5.i386.rpm
7b2d2ba7bb68a47bd7662322e781ae7a  libX11-devel-1.0.3-8.0.1.el5.i386.rpm
6515c78f537b870dfe18fdd3d53ddfb9  xorg-x11-apps-7.1-4.0.1.el5.i386.rpm
b8ef8ca891a67f6e62c63bb1bf9d22d1  xorg-x11-apps-debuginfo-7.1-4.0.1.el5.i386.rpm

ia64:
eafebca30be46a1f126a9085729dae91  libX11-1.0.3-8.0.1.el5.i386.rpm
d9bf472eb7f382f576fd14002f5d1887  libX11-1.0.3-8.0.1.el5.ia64.rpm
35eb6170e8e0c26993f520cf839c120c  libX11-debuginfo-1.0.3-8.0.1.el5.i386.rpm
1670f3877954d1392bf9ba70046fb30a  libX11-debuginfo-1.0.3-8.0.1.el5.ia64.rpm
cf8a8ffe44483347cdaa5c43e604b615  libX11-devel-1.0.3-8.0.1.el5.ia64.rpm
e47e676aa542e3b64c8277ad792f0298  xorg-x11-apps-7.1-4.0.1.el5.ia64.rpm
8086b6c9997074397107692e43cf333f  xorg-x11-apps-debuginfo-7.1-4.0.1.el5.ia64.rpm

ppc:
23f1c00ed705fbd1e88d40a82fea50bd  libX11-1.0.3-8.0.1.el5.ppc.rpm
60c91ded38d03943378b21eb6ec57b24  libX11-1.0.3-8.0.1.el5.ppc64.rpm
24b4bcb0be6efb55d99eb11b900512f0  libX11-debuginfo-1.0.3-8.0.1.el5.ppc.rpm
310616345f70bf6b26de90897cd5dea4  libX11-debuginfo-1.0.3-8.0.1.el5.ppc64.rpm
ecd2ee6fa8290b653b0e885eb432970f  libX11-devel-1.0.3-8.0.1.el5.ppc.rpm
ee670ec6168e6f2add6397e97da551b0  libX11-devel-1.0.3-8.0.1.el5.ppc64.rpm
3216a943acb93f3c8a8f4e764729143d  xorg-x11-apps-7.1-4.0.1.el5.ppc.rpm
b6aef042a1a10c4b0fbd4f19124eba4e  xorg-x11-apps-debuginfo-7.1-4.0.1.el5.ppc.rpm

s390x:
f44eab75f0bca9aab6aeec4ca273dcbf  libX11-1.0.3-8.0.1.el5.s390.rpm
baa7037daf2981a93f81ffa49d6b020a  libX11-1.0.3-8.0.1.el5.s390x.rpm
51ba8a612370193a3c4f80cfbad54db6  libX11-debuginfo-1.0.3-8.0.1.el5.s390.rpm
f62a72bbdacb66f26a0fcf0a50ea09f5  libX11-debuginfo-1.0.3-8.0.1.el5.s390x.rpm
2a169779c94277d62860dc5193a4f100  libX11-devel-1.0.3-8.0.1.el5.s390.rpm
b464e0943f917152bc558a03d6e5885e  libX11-devel-1.0.3-8.0.1.el5.s390x.rpm
d5be859eeb98b2672e5dbbe5f1e98fc8  xorg-x11-apps-7.1-4.0.1.el5.s390x.rpm
cb8efaae70fe6ea020661a49bc665ff8  xorg-x11-apps-debuginfo-7.1-4.0.1.el5.s390x.rpm

x86_64:
eafebca30be46a1f126a9085729dae91  libX11-1.0.3-8.0.1.el5.i386.rpm
ea143cb7bbe170730729d1dff11a54fa  libX11-1.0.3-8.0.1.el5.x86_64.rpm
35eb6170e8e0c26993f520cf839c120c  libX11-debuginfo-1.0.3-8.0.1.el5.i386.rpm
8da6f620d1dfbe194863d25ffd9a8dad  libX11-debuginfo-1.0.3-8.0.1.el5.x86_64.rpm
7b2d2ba7bb68a47bd7662322e781ae7a  libX11-devel-1.0.3-8.0.1.el5.i386.rpm
acadc303e67b0c14da568f0425fde65d  libX11-devel-1.0.3-8.0.1.el5.x86_64.rpm
43a723f54a8905609c19501e67a9f040  xorg-x11-apps-7.1-4.0.1.el5.x86_64.rpm
8f316a250f656a6418c320145ac02b62  xorg-x11-apps-debuginfo-7.1-4.0.1.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFGI5l3XlSAg2UNWIIRAnowAJ0Vqh4K1Je+8h7GZ8Sz+5ZVsnadggCgnRhg
kzX03SJAV6/n9FO7AhbSLww=
=lcwQ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRiRqiSh9+71yA2DNAQKb+QP/S+pIzrFRS++IvGEepVA8z5yHqgSgqgtW
mF5w7B1jVfMwQM4V9MrLrWA0aF4KQqgd30brUpsAOKO4m10tGgk3YiX+7erIKt8c
UQKp/LN08b9eghXFQf2E+t47d4l6lNbbFuQ/1eyGm8KVrPxMQrioNGxZUIHJQWt0
q7g2grnf4Vw=
=bz0T
-----END PGP SIGNATURE-----