---

Advisories, May 4, 2006

Debian GNU/Linux


Debian Security Advisory DSA 1051-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
May 4th, 2006 http://www.debian.org/security/faq


Package : mozilla-thunderbird
Vulnerability : several
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2005-2353 CVE-2005-4134 CVE-2006-0292 CVE-2006-0293
CVE-2006-0296 CVE-2006-0748 CVE-2006-0749 CVE-2006-0884
CVE-2006-1045 CVE-2006-1529 CVE-2006-1530 CVE-2006-1531
CVE-2006-1723 CVE-2006-1724 CVE-2006-1727 CVE-2006-1728
CVE-2006-1729 CVE-2006-1730 CVE-2006-1731 CVE-2006-1733
CVE-2006-1734 CVE-2006-1735 CVE-2006-1736 CVE-2006-1737
CVE-2006-1738 CVE-2006-1739 CVE-2006-1740 CVE-2006-1741
CVE-2006-1742 CVE-2006-1790
CERT advisories: VU#179014 VU#252324 VU#329500 VU#350262 VU#488774
VU#492382 VU#592425 VU#736934 VU#813230 VU#842094 VU#932734
VU#935556
BugTraq IDs : 15773 16476 16476 16770 16881 17516

Several security related problems have been discovered in
Mozilla Thunderbird. The Common Vulnerabilities and Exposures
project identifies the following vulnerabilities:

CVE-2005-2353

The “run-mozilla.sh” script allows local users to create or
overwrite arbitrary files when debugging is enabled via a symlink
attack on temporary files.

CVE-2005-4134

Web pages with extremely long titles cause subsequent launches
of the browser to appear to “hang” for up to a few minutes, or even
crash if the computer has insufficient memory. [MFSA-2006-03]

CVE-2006-0292

The Javascript interpreter does not properly dereference
objects, which allows remote attackers to cause a denial of service
or execute arbitrary code. [MFSA-2006-01]

CVE-2006-0293

The function allocation code allows attackers to cause a denial
of service and possibly execute arbitrary code. [MFSA-2006-01]

CVE-2006-0296

XULDocument.persist() did not validate the attribute name,
allowing an attacker to inject arbitrary XML and JavaScript code
into localstore.rdf that would be read and acted upon during
startup. [MFSA-2006-05]

CVE-2006-0748

An anonymous researcher for TippingPoint and the Zero Day
Initiative reported that an invalid and nonsensical ordering of
table-related tags can be exploited to execute arbitrary code.
[MFSA-2006-27]

CVE-2006-0749

A particular sequence of HTML tags can cause memory corruption
that can be exploited to exectute arbitary code. [MFSA-2006-18]

CVE-2006-0884

Georgi Guninski reports that forwarding mail in-line while using
the default HTML “rich mail” editor will execute JavaScript
embedded in the e-mail message with full privileges of the client.
[MFSA-2006-21]

CVE-2006-1045

The HTML rendering engine does not properly block external
images from inline HTML attachments when “Block loading of remote
images in mail messages” is enabled, which could allow remote
attackers to obtain sensitive information. [MFSA-2006-26]

CVE-2006-1529

A vulnerability potentially allows remote attackers to cause a
denial of service and possibly execute arbitrary.
[MFSA-2006-20]

CVE-2006-1530

A vulnerability potentially allows remote attackers to cause a
denial of service and possibly execute arbitrary.
[MFSA-2006-20]

CVE-2006-1531

A vulnerability potentially allows remote attackers to cause a
denial of service and possibly execute arbitrary.
[MFSA-2006-20]

CVE-2006-1723

A vulnerability potentially allows remote attackers to cause a
denial of service and possibly execute arbitrary.
[MFSA-2006-20]

CVE-2006-1724

A vulnerability potentially allows remote attackers to cause a
denial of service and possibly execute arbitrary.
[MFSA-2006-20]

CVE-2006-1727

Georgi Guninski reported two variants of using scripts in an XBL
control to gain chrome privileges when the page is viewed under
“Print Preview”.under “Print Preview”. [MFSA-2006-25]

CVE-2006-1728

“shutdown” discovered that the crypto.generateCRMFRequest method
can be used to run arbitrary code with the privilege of the user
running the browser, which could enable an attacker to install
malware. [MFSA-2006-24]

CVE-2006-1729

Claus Jørgensen reported that a text input box can be
pre-filled with a filename and then turned into a file-upload
control, allowing a malicious website to steal any local file whose
name they can guess. [MFSA-2006-23]

CVE-2006-1730

An anonymous researcher for TippingPoint and the Zero Day
Initiative discovered an integer overflow triggered by the CSS
letter-spacing property, which could be exploited to execute
arbitrary code. [MFSA-2006-22]

CVE-2006-1731

“moz_bug_r_a4” discovered that some internal functions return
prototypes instead of objects, which allows remote attackers to
conduct cross-site scripting attacks. [MFSA-2006-19]

CVE-2006-1732

“shutdown” discovered that it is possible to bypass same-origin
protections, allowing a malicious site to inject script into
content from another site, which could allow the malicious page to
steal information such as cookies or passwords from the other site,
or perform transactions on the user’s behalf if the user were
already logged in. [MFSA-2006-17]

CVE-2006-1733

“moz_bug_r_a4” discovered that the compilation scope of
privileged built-in XBL bindings is not fully protected from web
content and can still be executed which could be used to execute
arbitrary JavaScript, which could allow an attacker to install
malware such as viruses and password sniffers. [MFSA-2006-16]

CVE-2006-1734

“shutdown” discovered that it is possible to access an internal
function object which could then be used to run arbitrary
JavaScriptcode with full permissions of the user running the
browser, which could be used to install spyware or viruses.
[MFSA-2006-15]

CVE-2006-1735

It is possible to create JavaScript functions that would get
compiled with the wrong privileges, allowing an attacker to run
code of their choice with full permissions of the user running the
browser, which could be used to install spyware or viruses.
[MFSA-2006-14]

CVE-2006-1736

It is possible to trick users into downloading and saving an
executable file via an image that is overlaid by a transparent
image link that points to the executable. [MFSA-2006-13]

CVE-2006-1737

An integer overflow allows remote attackers to cause a denial of
service and possibly execute arbitrary bytecode via JavaScript with
a large regular expression. [MFSA-2006-11]

CVE-2006-1738

An unspecified vulnerability allows remote attackers to cause a
denial of service. [MFSA-2006-11]

CVE-2006-1739

Certain Cascading Style Sheets (CSS) can cause an out-of-bounds
array write and buffer overflow that could lead to a denial of
service and the possible execution of arbitrary code.
[MFSA-2006-11]

CVE-2006-1740

It is possible for remote attackers to spoof secure site
indicators such as the locked icon by opening the trusted site in a
popup window, then changing the location to a malicious site.
[MFSA-2006-12]

CVE-2006-1741

“shutdown” discovered that it is possible to inject arbitrary
JavaScript code into a page on another site using a modal alert to
suspend an event handler while a new page is being loaded. This
could be used to steal confidential information. [MFSA-2006-09]

CVE-2006-1742

Igor Bukanov discovered that the JavaScript engine does not
properly handle temporary variables, which might allow remote
attackers to trigger operations on freed memory and cause memory
corruption, causing memory corruption. [MFSA-2006-10]

CVE-2006-1790

A regression fix that could lead to memory corruption allows
remote attackers to cause a denial of service and possibly execute
arbitrary code. [MFSA-2006-11]

For the stable distribution (sarge) these problems have been
fixed in version 1.0.2-2.sarge1.0.8.

For the unstable distribution (sid) these problems have been
fixed in version 1.5.0.2-1 of thunderbird.

We recommend that you upgrade your Mozilla Thunderbird
packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8.dsc

      Size/MD5 checksum: 997
0327b5d56178e6045be49e9b78c60b76
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8.diff.gz

      Size/MD5 checksum: 329931
4dab3c7b21e40d055b95d74c35bedb58
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2.orig.tar.gz

      Size/MD5 checksum: 33288906
806175393a226670aa66060452d31df4

Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_alpha.deb

      Size/MD5 checksum: 12838168
bda025fdf3b077045cc21bab3a89e257
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_alpha.deb

      Size/MD5 checksum: 3276290
6a1a40cacc0bf38e951acc448ef29db0
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_alpha.deb

      Size/MD5 checksum: 150442
fca6c3f049cdf068da21a4edec3974e2
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_alpha.deb

      Size/MD5 checksum: 31886
f9f96e466c0bef3a0255c9eedded7bb3
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_alpha.deb

      Size/MD5 checksum: 87722
1280bc887809f52e77ea9f1b53739189

AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_amd64.deb

      Size/MD5 checksum: 12246434
286f415370cea50e1db9e3cd42d2e4c2
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_amd64.deb

      Size/MD5 checksum: 3277348
757202c4103104bbf82ce17ff93de6ad
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_amd64.deb

      Size/MD5 checksum: 149416
9f727c74782a27cbc31ba9c3cc05e365
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_amd64.deb

      Size/MD5 checksum: 31884
451a6095a65939e5c5fa01cbcce3f399
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_amd64.deb

      Size/MD5 checksum: 87560
1b4e74ca5a206c0028c7385a37c9d72c

ARM architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_arm.deb

      Size/MD5 checksum: 10336960
226d96bb928a8a5f1169e8e8f22cb94c
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_arm.deb

      Size/MD5 checksum: 3268838
d6df5cef8606a925ab2e0f6d4759e2bf
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_arm.deb

      Size/MD5 checksum: 141526
fb78403f901f5a3551864aae8677855b
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_arm.deb

      Size/MD5 checksum: 31904
5e442a325862851a1ddcdf098f602488
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_arm.deb

      Size/MD5 checksum: 79556
d93846c81f778cdc8089f594edcdee29

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_i386.deb

      Size/MD5 checksum: 11560136
b0e311d92acdc0c7e8b14b67bbf87a63
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_i386.deb

      Size/MD5 checksum: 3503954
c76b1c2003373abb489d55fbc1cf8e9b
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_i386.deb

      Size/MD5 checksum: 145070
42bfc6d7e45c85a328c974e0dbf33a2d
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_i386.deb

      Size/MD5 checksum: 31882
6699d265d72be8d47e29607c19233ea5
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_i386.deb

      Size/MD5 checksum: 86338
f71fa003bb6cbd5e073791c02215f55f

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_ia64.deb

      Size/MD5 checksum: 14613050
4ebeb5db1064173aa1c0f4f63debe1a4
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_ia64.deb

      Size/MD5 checksum: 3289384
28b78ccc68aa644a6e7ccfe1da7ed6c2
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_ia64.deb

      Size/MD5 checksum: 153794
3d08e3ca8da7aab4d18325018f089cf1
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_ia64.deb

      Size/MD5 checksum: 31886
5a51526eac30e965016709c84e5789cc
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_ia64.deb

      Size/MD5 checksum: 105440
bbf8174130d63df6a84a181e6f8f77d4

HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_hppa.deb

      Size/MD5 checksum: 13558548
62fa53905105857b25039b360f5ed165
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_hppa.deb

      Size/MD5 checksum: 3282030
5c8f3bc938f0d9ee87588cbfb2cf79fb
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_hppa.deb

      Size/MD5 checksum: 151644
0a2894a49adc27f41dbc34ae850998cb
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_hppa.deb

      Size/MD5 checksum: 31886
06078286e5baa9703eecac8678c6259a
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_hppa.deb

      Size/MD5 checksum: 95646
82233c3c9d614801a19d6e07031a7e0a

Motorola 680×0 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_m68k.deb

      Size/MD5 checksum: 10782388
f59c564e46e44dcbe7e045635a500253
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_m68k.deb

      Size/MD5 checksum: 3267578
646924bd2241dd7c4c61be86ed52f66e
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_m68k.deb

      Size/MD5 checksum: 143414
2ceb5e38365ba6488c0e0bbda2c16de2
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_m68k.deb

      Size/MD5 checksum: 31924
c79717feb3366b475a181fb94666a308
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_m68k.deb

      Size/MD5 checksum: 80832
52d33e4efd5d53f0d88a45b560348fc5

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_mips.deb

      Size/MD5 checksum: 11940252
693556d436d10d0dfc0df428967bc054
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_mips.deb

      Size/MD5 checksum: 3275664
eeaff88720b28b8624e4e2683deb8156
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_mips.deb

      Size/MD5 checksum: 146354
84e79291c3a085c9315140b01d00620c
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_mips.deb

      Size/MD5 checksum: 31894
ca7b49008df0913a853614cc1e1f58d0
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_mips.deb

      Size/MD5 checksum: 83106
297bef79199e69cd7eed64aba0472de1

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_mipsel.deb

      Size/MD5 checksum: 11801596
bbf40fdabbe94838a63d689263b13dfc
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_mipsel.deb

      Size/MD5 checksum: 3276522
56b8c3fbf4dfe10c11219f722dee243f
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_mipsel.deb

      Size/MD5 checksum: 145920
55354ff3950db25f7a43d7dd643bdc0c
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_mipsel.deb

      Size/MD5 checksum: 31902
7792444ecceba497bbea95aa79bfd541
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_mipsel.deb

      Size/MD5 checksum: 82932
a618ae0dc3fa628c9b942bc19a9e041b

PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_powerpc.deb

      Size/MD5 checksum: 10900888
5a4bfd9854a2402b57a0f7fbeebc69e4
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_powerpc.deb

      Size/MD5 checksum: 3266966
2f9dfc8d97dfbc136d3d4a409d86080c
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_powerpc.deb

      Size/MD5 checksum: 143398
f1ed2509f11198cc79350ec34a8d169f
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_powerpc.deb

      Size/MD5 checksum: 31892
555cd49ac0135b6cca34e346b1730916
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_powerpc.deb

      Size/MD5 checksum: 79634
55a53bdc25f21625e6a5bf7409a79a60

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_s390.deb

      Size/MD5 checksum: 12694418
cb417029c1f1403fd85ad62696ba9a6a
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_s390.deb

      Size/MD5 checksum: 3277050
c9e56aa35a7ee4b3efb70aac8d1fb2b4
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_s390.deb

      Size/MD5 checksum: 149736
ddb248089886f5377167866e098276ee
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_s390.deb

      Size/MD5 checksum: 31894
757eabc20b4c623116efbfa6514f8674
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_s390.deb

      Size/MD5 checksum: 87580
a78dce29c87b7e57f30eb4ab566474b2

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird_1.0.2-2.sarge1.0.8_sparc.deb

      Size/MD5 checksum: 11164666
54d3682c2946c7a1a1a2f4d5632c5a9e
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-dev_1.0.2-2.sarge1.0.8_sparc.deb

      Size/MD5 checksum: 3271818
eec83ea3565d2a6137a077a0ac7bd0bf
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-inspector_1.0.2-2.sarge1.0.8_sparc.deb

      Size/MD5 checksum: 143070
513f4ab787b0d0b680b562cb6e63fa18
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-offline_1.0.2-2.sarge1.0.8_sparc.deb

      Size/MD5 checksum: 31898
92244cdf10019877a52c4be13ec1fcdf
    http://security.debian.org/pool/updates/main/m/mozilla-thunderbird/mozilla-thunderbird-typeaheadfind_1.0.2-2.sarge1.0.8_sparc.deb

      Size/MD5 checksum: 81430
041e86b0c9ea28c4f28973b9e1be627d

These files will probably be moved into the stable distribution
on its next update.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>

Red Hat Linux


Red Hat Security Advisory

Synopsis: Important: xorg-x11 security update
Advisory ID: RHSA-2006:0451-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2006-0451.html

Issue date: 2006-05-04
Updated on: 2006-05-04
Product: Red Hat Enterprise Linux
Keywords: buffer overflow security render
CVE Names: CVE-2006-1526


1. Summary:

Updated X.org packages that fix a security issue are now
available for Red Hat Enterprise Linux 4.

This update has been rated as having important security impact
by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 4 – i386, ia64, ppc, s390,
s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 – i386, x86_64
Red Hat Enterprise Linux ES version 4 – i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 – i386, ia64, x86_64

3. Problem description:

X.org is an open source implementation of the X Window System.
It provides the basic low-level functionality that full-fledged
graphical user interfaces such as GNOME and KDE are designed
upon.

A buffer overflow flaw in the X.org server RENDER extension was
discovered. A malicious authorized client could exploit this issue
to cause a denial of service (crash) or potentially execute
arbitrary code with root privileges on the X.org server.
(CVE-2006-1526)

Users of X.org should upgrade to these updated packages, which
contain a backported patch and is not vulnerable to this issue.

This issue does not affect Red Hat Enterprise Linux 2.1 or
3.

4. Solution:

Before applying this update, make sure all previously released
errata relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat
Network, launch the Red Hat Update Agent with the following
command:

up2date

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

189801 – CVE-2006-1526 X.Org buffer overflow

6. RPMs required:

Red Hat Enterprise Linux AS version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.25.1.src.rpm

43188f872326428395dac017156b7c18
xorg-x11-6.8.2-1.EL.13.25.1.src.rpm

i386:
107c7a10c50299c8ee7b6f7473e03da3
xorg-x11-6.8.2-1.EL.13.25.1.i386.rpm
11a6d965dd3ddff2b0e7ed60d1463813
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.i386.rpm
4b700cb6a44214eea4b438c2885ea583
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.i386.rpm
65d3132804445d5cc3964a51c568de86
xorg-x11-Xdmx-6.8.2-1.EL.13.25.1.i386.rpm
5b13a461dcf06dd03ac70e4d5c3a289c
xorg-x11-Xnest-6.8.2-1.EL.13.25.1.i386.rpm
68375ef276ef673e8b0e58af6fcc335b
xorg-x11-Xvfb-6.8.2-1.EL.13.25.1.i386.rpm
a0b378ffce6465c186deb7ecac9e990a
xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.i386.rpm
b8b6af15ba4ba4c0edf78767424b200d
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.25.1.i386.rpm
187e340161f04f697fee9d2fcaf1edc6
xorg-x11-devel-6.8.2-1.EL.13.25.1.i386.rpm
214fd2887c85579ef29cd682d6d43438
xorg-x11-doc-6.8.2-1.EL.13.25.1.i386.rpm
82f2cfec4097fe929b167dfb9882c3ea
xorg-x11-font-utils-6.8.2-1.EL.13.25.1.i386.rpm
a49fb9b609e0365069cfa8cff4f84b7f
xorg-x11-libs-6.8.2-1.EL.13.25.1.i386.rpm
cc7f0d7ea16573f6dd12a0a5da9fc63b
xorg-x11-sdk-6.8.2-1.EL.13.25.1.i386.rpm
833eebb9074481c65cb650e3a38fe6e9
xorg-x11-tools-6.8.2-1.EL.13.25.1.i386.rpm
d16732bbe90e1de3e45cc69584ff8470
xorg-x11-twm-6.8.2-1.EL.13.25.1.i386.rpm
166cd3631adea990bcc73047ef3a7da1
xorg-x11-xauth-6.8.2-1.EL.13.25.1.i386.rpm
a44a116a1d6c1f3e01479b754f340f10
xorg-x11-xdm-6.8.2-1.EL.13.25.1.i386.rpm
12d69550c102d0703d2533f7bd4ddb8e
xorg-x11-xfs-6.8.2-1.EL.13.25.1.i386.rpm

ia64:
4cb4a5203afc94b71089be499df69409
xorg-x11-6.8.2-1.EL.13.25.1.ia64.rpm
11a6d965dd3ddff2b0e7ed60d1463813
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.i386.rpm
0e555bb5ca5a85523901d279e534b119
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.ia64.rpm
4b700cb6a44214eea4b438c2885ea583
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.i386.rpm
93e4ae5cee9eaa0e15f1d92adaf5fa38
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.ia64.rpm
6fc6cd50d002ae7f85392d5ba2c6e533

xorg-x11-Xdmx-6.8.2-1.EL.13.25.1.ia64.rpm
b403988a1c633e0fdaed9df82da5bad3
xorg-x11-Xnest-6.8.2-1.EL.13.25.1.ia64.rpm
6b80fc0e5ab7ab656e867c25b5210632

xorg-x11-Xvfb-6.8.2-1.EL.13.25.1.ia64.rpm
a0b378ffce6465c186deb7ecac9e990a
xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.i386.rpm
e6208959a65c1c17d7c6e77d922ce804

xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.ia64.rpm
b5f4f09c7b9f574ececf183111dd01ed
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.25.1.ia64.rpm
65ea83d3e59cba957ff96f4f631049aa

xorg-x11-devel-6.8.2-1.EL.13.25.1.ia64.rpm
393a000c71d9d4f5ad1eb9ce42de7d49
xorg-x11-doc-6.8.2-1.EL.13.25.1.ia64.rpm
a4cc541482216bf5e5dc7ff4f0a03b77

xorg-x11-font-utils-6.8.2-1.EL.13.25.1.ia64.rpm
a49fb9b609e0365069cfa8cff4f84b7f
xorg-x11-libs-6.8.2-1.EL.13.25.1.i386.rpm
387f749add3c80c27b36d00747d72fe3

xorg-x11-libs-6.8.2-1.EL.13.25.1.ia64.rpm
552fe08f24717168436a2c2eb06c8ac9
xorg-x11-sdk-6.8.2-1.EL.13.25.1.ia64.rpm
abb494f5d8107737659c6e9b0c8d969b

xorg-x11-tools-6.8.2-1.EL.13.25.1.ia64.rpm
e2a667feb88bfc9be746ab7a3a215b61
xorg-x11-twm-6.8.2-1.EL.13.25.1.ia64.rpm
37087214a1875c67f52751695fdd944d

xorg-x11-xauth-6.8.2-1.EL.13.25.1.ia64.rpm
50a04ae9a5a7e6f9829cc13d14542015
xorg-x11-xdm-6.8.2-1.EL.13.25.1.ia64.rpm
cbb809309e730e004abcada3fc2604f9

xorg-x11-xfs-6.8.2-1.EL.13.25.1.ia64.rpm

ppc:
2c617533907d045672618a913661c7ba
xorg-x11-6.8.2-1.EL.13.25.1.ppc.rpm
80d310ec8db7812100f04a83c3abbdd5

xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.ppc.rpm
0487f2bd161a33f04eb8669d6b35631d
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.ppc64.rpm
2cb1fa64b763cabf895bb85bcac9f05e

xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.ppc.rpm
958cbaedf6edaa18e7a6f295d68c271d
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.ppc64.rpm
1565be5f6a3ff4832059475409eeac1c

xorg-x11-Xdmx-6.8.2-1.EL.13.25.1.ppc.rpm
aa67270d8e3c7d3c852239f64052f862
xorg-x11-Xnest-6.8.2-1.EL.13.25.1.ppc.rpm
b6ef0b22240dc3a92e78b8a999e08daf

xorg-x11-Xvfb-6.8.2-1.EL.13.25.1.ppc.rpm
4f8cfc7fa76f1430771b68e60ab17882
xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.ppc.rpm
e7441aaa85631ea28640a8b77e181fa4

xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.ppc64.rpm
e8d360c6b1d9366fd294853343c76186
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.25.1.ppc.rpm
230546a41cc52e6e398349db27b285ef

xorg-x11-devel-6.8.2-1.EL.13.25.1.ppc.rpm
88803abea0ff99865ad14b639831902e
xorg-x11-devel-6.8.2-1.EL.13.25.1.ppc64.rpm
605358bfc8fc3f8d26388ccb7d53d707

xorg-x11-doc-6.8.2-1.EL.13.25.1.ppc.rpm
93a7744d45cc016edd70e2c58f128faf
xorg-x11-font-utils-6.8.2-1.EL.13.25.1.ppc.rpm
3c725e3bfb1ec50237ee5845316247eb

xorg-x11-libs-6.8.2-1.EL.13.25.1.ppc.rpm
fa4babce51545f8d63ea9a654bc6e5ca
xorg-x11-libs-6.8.2-1.EL.13.25.1.ppc64.rpm
18bcba51a515528b21a3473b6c36b139

xorg-x11-sdk-6.8.2-1.EL.13.25.1.ppc.rpm
457917777553cdd742c5a7b24828912e
xorg-x11-tools-6.8.2-1.EL.13.25.1.ppc.rpm
5755c6f7a9b934a6dff7303767d69d67

xorg-x11-twm-6.8.2-1.EL.13.25.1.ppc.rpm
463c0f9ede7c22210dfed99581b49282
xorg-x11-xauth-6.8.2-1.EL.13.25.1.ppc.rpm
f917a7d791c7056c827e6e048e7cffbb

xorg-x11-xdm-6.8.2-1.EL.13.25.1.ppc.rpm
023ca3e1ba749969f088f27e1a7e9133
xorg-x11-xfs-6.8.2-1.EL.13.25.1.ppc.rpm

s390:
41e956272535ca72482cc5e4e250eabd
xorg-x11-6.8.2-1.EL.13.25.1.s390.rpm
ba8647fe94059eca714fc383e1e26896

xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.s390.rpm
a4024fa17acc09e2f6768839948f156d
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.s390.rpm
9c0fa6d97c1ccb75bbaa92e684da4c9e

xorg-x11-Xdmx-6.8.2-1.EL.13.25.1.s390.rpm
f40056ba6d5829c6ef3a4353718c8cf9
xorg-x11-Xnest-6.8.2-1.EL.13.25.1.s390.rpm
583d096a86212ee179d838fd1ebab849

xorg-x11-Xvfb-6.8.2-1.EL.13.25.1.s390.rpm
5c0abec3b6b062e06e8a1d8ccf7f94a2
xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.s390.rpm
eb12aa741f6b5431136e583a1b6b9411

xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.25.1.s390.rpm
068532dd18cc31e709d08b5586e0be3f
xorg-x11-devel-6.8.2-1.EL.13.25.1.s390.rpm
9e9fec3a78f72c9f49748b2744c8d153

xorg-x11-font-utils-6.8.2-1.EL.13.25.1.s390.rpm
26105b5d8fc404c748fd34f7022612b0
xorg-x11-libs-6.8.2-1.EL.13.25.1.s390.rpm
ebb09711b22567c3a1bceab77c3e9703

xorg-x11-tools-6.8.2-1.EL.13.25.1.s390.rpm
09cd70f758af714434e59670f441c71c
xorg-x11-twm-6.8.2-1.EL.13.25.1.s390.rpm
86919f7aff30a5bee20450f1e1d9e979

xorg-x11-xauth-6.8.2-1.EL.13.25.1.s390.rpm
59a00c23c2d711b9377508ebf25a09ea
xorg-x11-xdm-6.8.2-1.EL.13.25.1.s390.rpm
390c7776bc09cb18393548de06ab086d

xorg-x11-xfs-6.8.2-1.EL.13.25.1.s390.rpm

s390x:
59e3ffad692ecea34ff66ea9b3fdf1fa
xorg-x11-6.8.2-1.EL.13.25.1.s390x.rpm
ba8647fe94059eca714fc383e1e26896

xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.s390.rpm
29fd4cbdf6956cd6da8733a670b0e2df
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.s390x.rpm
a4024fa17acc09e2f6768839948f156d

xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.s390.rpm
2b369f0a7432dbbc135b7416b8a1c6e6
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.s390x.rpm
ebb6fd51d365b1e62f2d97728862cde8

xorg-x11-Xdmx-6.8.2-1.EL.13.25.1.s390x.rpm
57b99b0cc0a39d257612255363ef960e
xorg-x11-Xnest-6.8.2-1.EL.13.25.1.s390x.rpm
0925619659358407b82266431d781bac

xorg-x11-Xvfb-6.8.2-1.EL.13.25.1.s390x.rpm
5c0abec3b6b062e06e8a1d8ccf7f94a2
xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.s390.rpm
8d4a6f5a04f7e8c7e9e6e30126edc82d

xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.s390x.rpm
1b9feee0e42b4bd833ad898c81061360
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.25.1.s390x.rpm
068532dd18cc31e709d08b5586e0be3f

xorg-x11-devel-6.8.2-1.EL.13.25.1.s390.rpm
1d9ccd808fa4f2a38f23a71b16f79ae5
xorg-x11-devel-6.8.2-1.EL.13.25.1.s390x.rpm
a74b21a34ed64f5773eada35b42975c3

xorg-x11-font-utils-6.8.2-1.EL.13.25.1.s390x.rpm
26105b5d8fc404c748fd34f7022612b0
xorg-x11-libs-6.8.2-1.EL.13.25.1.s390.rpm
704d8009c5a144f1980d495ed0509a70

xorg-x11-libs-6.8.2-1.EL.13.25.1.s390x.rpm
9cca7f0c6f6eed024f499f7a1f95ad79
xorg-x11-tools-6.8.2-1.EL.13.25.1.s390x.rpm
59c46bf05183379c62b9e481b54dca2b

xorg-x11-twm-6.8.2-1.EL.13.25.1.s390x.rpm
c6cad167f339e8385e50381321131459
xorg-x11-xauth-6.8.2-1.EL.13.25.1.s390x.rpm
fa0941066da56ca13499e24e1184ac5a

xorg-x11-xdm-6.8.2-1.EL.13.25.1.s390x.rpm
51dd0c8a8c6d8989959da19276e735b7
xorg-x11-xfs-6.8.2-1.EL.13.25.1.s390x.rpm

x86_64:
4df4c8d68191b293cae8f35db73c5f51
xorg-x11-6.8.2-1.EL.13.25.1.x86_64.rpm
11a6d965dd3ddff2b0e7ed60d1463813
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.i386.rpm
77ecac98c6b07eead25b17fd9db8df5b

xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.x86_64.rpm
4b700cb6a44214eea4b438c2885ea583
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.i386.rpm
cee5d5558cc61ae7fa9475efa0957290
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.x86_64.rpm
1795f2046a9bdfeb7740696e345e120a

xorg-x11-Xdmx-6.8.2-1.EL.13.25.1.x86_64.rpm
adeb22a0414a5fd281ac369cda7f3627
xorg-x11-Xnest-6.8.2-1.EL.13.25.1.x86_64.rpm
bca16ef172a4423e7008caf1e8b83753

xorg-x11-Xvfb-6.8.2-1.EL.13.25.1.x86_64.rpm
a0b378ffce6465c186deb7ecac9e990a
xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.i386.rpm
5f71a48f939c12bd2690d99f69ca053f

xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.x86_64.rpm
c9ff0b906f48129f1d1c411385e46736
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.25.1.x86_64.rpm
187e340161f04f697fee9d2fcaf1edc6

xorg-x11-devel-6.8.2-1.EL.13.25.1.i386.rpm
7303c365dbd159ef219e27bf3698cb08
xorg-x11-devel-6.8.2-1.EL.13.25.1.x86_64.rpm
ae5fa634eb587df9349114af204265a7

xorg-x11-doc-6.8.2-1.EL.13.25.1.x86_64.rpm
a41fb9d73df53bc07e14774c8412cc0b
xorg-x11-font-utils-6.8.2-1.EL.13.25.1.x86_64.rpm
a49fb9b609e0365069cfa8cff4f84b7f

xorg-x11-libs-6.8.2-1.EL.13.25.1.i386.rpm
045a405e6532c2774650160a24371de1
xorg-x11-libs-6.8.2-1.EL.13.25.1.x86_64.rpm
fd9a33437d1bd8d7952b62da3872b32a

xorg-x11-sdk-6.8.2-1.EL.13.25.1.x86_64.rpm
01aefd3efb80ba85d8f388ffa9b690f6
xorg-x11-tools-6.8.2-1.EL.13.25.1.x86_64.rpm
42ef7c17776adf9a260c1e23a74fca6c

xorg-x11-twm-6.8.2-1.EL.13.25.1.x86_64.rpm
5e289a93257046f28d96768bcc76b275
xorg-x11-xauth-6.8.2-1.EL.13.25.1.x86_64.rpm
f74a4299c14490397678eac1b9c0d202

xorg-x11-xdm-6.8.2-1.EL.13.25.1.x86_64.rpm
c69a89d22fbf0c91c455dcdfe59c2e93
xorg-x11-xfs-6.8.2-1.EL.13.25.1.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.25.1.src.rpm

43188f872326428395dac017156b7c18
xorg-x11-6.8.2-1.EL.13.25.1.src.rpm

i386:
107c7a10c50299c8ee7b6f7473e03da3
xorg-x11-6.8.2-1.EL.13.25.1.i386.rpm
11a6d965dd3ddff2b0e7ed60d1463813
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.i386.rpm
4b700cb6a44214eea4b438c2885ea583
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.i386.rpm
65d3132804445d5cc3964a51c568de86

xorg-x11-Xdmx-6.8.2-1.EL.13.25.1.i386.rpm
5b13a461dcf06dd03ac70e4d5c3a289c
xorg-x11-Xnest-6.8.2-1.EL.13.25.1.i386.rpm
68375ef276ef673e8b0e58af6fcc335b

xorg-x11-Xvfb-6.8.2-1.EL.13.25.1.i386.rpm
a0b378ffce6465c186deb7ecac9e990a
xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.i386.rpm
b8b6af15ba4ba4c0edf78767424b200d

xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.25.1.i386.rpm
187e340161f04f697fee9d2fcaf1edc6
xorg-x11-devel-6.8.2-1.EL.13.25.1.i386.rpm
214fd2887c85579ef29cd682d6d43438

xorg-x11-doc-6.8.2-1.EL.13.25.1.i386.rpm
82f2cfec4097fe929b167dfb9882c3ea
xorg-x11-font-utils-6.8.2-1.EL.13.25.1.i386.rpm
a49fb9b609e0365069cfa8cff4f84b7f

xorg-x11-libs-6.8.2-1.EL.13.25.1.i386.rpm
cc7f0d7ea16573f6dd12a0a5da9fc63b
xorg-x11-sdk-6.8.2-1.EL.13.25.1.i386.rpm
833eebb9074481c65cb650e3a38fe6e9

xorg-x11-tools-6.8.2-1.EL.13.25.1.i386.rpm
d16732bbe90e1de3e45cc69584ff8470
xorg-x11-twm-6.8.2-1.EL.13.25.1.i386.rpm
166cd3631adea990bcc73047ef3a7da1

xorg-x11-xauth-6.8.2-1.EL.13.25.1.i386.rpm
a44a116a1d6c1f3e01479b754f340f10
xorg-x11-xdm-6.8.2-1.EL.13.25.1.i386.rpm
12d69550c102d0703d2533f7bd4ddb8e

xorg-x11-xfs-6.8.2-1.EL.13.25.1.i386.rpm

x86_64:
4df4c8d68191b293cae8f35db73c5f51
xorg-x11-6.8.2-1.EL.13.25.1.x86_64.rpm
11a6d965dd3ddff2b0e7ed60d1463813
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.i386.rpm
77ecac98c6b07eead25b17fd9db8df5b

xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.x86_64.rpm
4b700cb6a44214eea4b438c2885ea583
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.i386.rpm
cee5d5558cc61ae7fa9475efa0957290
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.x86_64.rpm
1795f2046a9bdfeb7740696e345e120a

xorg-x11-Xdmx-6.8.2-1.EL.13.25.1.x86_64.rpm
adeb22a0414a5fd281ac369cda7f3627
xorg-x11-Xnest-6.8.2-1.EL.13.25.1.x86_64.rpm
bca16ef172a4423e7008caf1e8b83753

xorg-x11-Xvfb-6.8.2-1.EL.13.25.1.x86_64.rpm
a0b378ffce6465c186deb7ecac9e990a
xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.i386.rpm
5f71a48f939c12bd2690d99f69ca053f

xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.x86_64.rpm
c9ff0b906f48129f1d1c411385e46736
xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.25.1.x86_64.rpm
187e340161f04f697fee9d2fcaf1edc6

xorg-x11-devel-6.8.2-1.EL.13.25.1.i386.rpm
7303c365dbd159ef219e27bf3698cb08
xorg-x11-devel-6.8.2-1.EL.13.25.1.x86_64.rpm
ae5fa634eb587df9349114af204265a7

xorg-x11-doc-6.8.2-1.EL.13.25.1.x86_64.rpm
a41fb9d73df53bc07e14774c8412cc0b
xorg-x11-font-utils-6.8.2-1.EL.13.25.1.x86_64.rpm
a49fb9b609e0365069cfa8cff4f84b7f

xorg-x11-libs-6.8.2-1.EL.13.25.1.i386.rpm
045a405e6532c2774650160a24371de1
xorg-x11-libs-6.8.2-1.EL.13.25.1.x86_64.rpm
fd9a33437d1bd8d7952b62da3872b32a

xorg-x11-sdk-6.8.2-1.EL.13.25.1.x86_64.rpm
01aefd3efb80ba85d8f388ffa9b690f6
xorg-x11-tools-6.8.2-1.EL.13.25.1.x86_64.rpm
42ef7c17776adf9a260c1e23a74fca6c

xorg-x11-twm-6.8.2-1.EL.13.25.1.x86_64.rpm
5e289a93257046f28d96768bcc76b275
xorg-x11-xauth-6.8.2-1.EL.13.25.1.x86_64.rpm
f74a4299c14490397678eac1b9c0d202

xorg-x11-xdm-6.8.2-1.EL.13.25.1.x86_64.rpm
c69a89d22fbf0c91c455dcdfe59c2e93
xorg-x11-xfs-6.8.2-1.EL.13.25.1.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:

ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/xorg-x11-6.8.2-1.EL.13.25.1.src.rpm

43188f872326428395dac017156b7c18
xorg-x11-6.8.2-1.EL.13.25.1.src.rpm

i386:
107c7a10c50299c8ee7b6f7473e03da3
xorg-x11-6.8.2-1.EL.13.25.1.i386.rpm
11a6d965dd3ddff2b0e7ed60d1463813
xorg-x11-Mesa-libGL-6.8.2-1.EL.13.25.1.i386.rpm
4b700cb6a44214eea4b438c2885ea583
xorg-x11-Mesa-libGLU-6.8.2-1.EL.13.25.1.i386.rpm
65d3132804445d5cc3964a51c568de86

xorg-x11-Xdmx-6.8.2-1.EL.13.25.1.i386.rpm
5b13a461dcf06dd03ac70e4d5c3a289c
xorg-x11-Xnest-6.8.2-1.EL.13.25.1.i386.rpm
68375ef276ef673e8b0e58af6fcc335b

xorg-x11-Xvfb-6.8.2-1.EL.13.25.1.i386.rpm
a0b378ffce6465c186deb7ecac9e990a
xorg-x11-deprecated-libs-6.8.2-1.EL.13.25.1.i386.rpm
b8b6af15ba4ba4c0edf78767424b200d

xorg-x11-deprecated-libs-devel-6.8.2-1.EL.13.25.1.i386.rpm
187e340161f04f697fee9d2fcaf1edc6
xorg-x11-devel-6.8.2-1.EL.13.25.1.i386.rpm
214fd2887c85579ef29cd682d6d43438

xorg-x11-doc-6.8.2-1.EL.13.25.1.i386.rpm
82f2cfec4097fe929b167dfb9882c3ea
xorg-x11-font-utils-6.8.2-1.EL.13.25.1.i386.rpm
a49fb9b609e0365069cfa8cff4f84b7f

xorg-x11-libs-6.8.2-1.EL.13.25.1.i386.rpm
cc7f0d7ea16573f6dd12a0a5da9fc63b
xorg-x11-sdk-6.8.2-1.EL.13.25.1.i386.rpm
833eebb9074481c65cb650e3a38fe6e9
xo

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis