The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of X.Org, FreeType: integer overflows

Synthesis of the vulnerability 

A local attacker can exploit overflows in X in order to elevate his privileges.
Vulnerable products: Debian, Fedora, Mandriva Linux, Mandriva NF, NLD, OES, OpenBSD, openSUSE, Solaris, Trusted Solaris, RHEL, Slackware, SLES, TurboLinux, Unix (platform) ~ not comprehensive, XOrg Bundle ~ not comprehensive, libX11.
Severity of this weakness: 3/4.
Number of vulnerabilities in this bulletin: 4.
Creation date: 04/04/2007.
Références of this bulletin: 102886, 102888, 20070501-01-P, 6526191, 6538280, 6538282, 6538286, 6538290, 6539893, 6542279, BID-23283, BID-23284, BID-23300, BID-23402, CERTA-2007-AVI-177, CVE-2007-1003, CVE-2007-1351, CVE-2007-1352, CVE-2007-1667, DSA-1294-1, DSA-1454-1, DSA-1858-1, DSA-1903-1, FEDORA-2007-422, FEDORA-2007-423, FEDORA-2007-424, FEDORA-2007-425, FEDORA-2007-426, FEDORA-2007-427, MDKSA-2007:079, MDKSA-2007:079-1, MDKSA-2007:080, MDKSA-2007:080-1, MDKSA-2007:081, MDKSA-2007:081-1, MDKSA-2007:147, RHSA-2007:0125-01, RHSA-2007:0126-01, RHSA-2007:0127-01, RHSA-2007:0132-01, RHSA-2007:0150-01, RHSA-2007:0157-01, SSA:2007-109-01, SSA:2007-110-01, SUSE-SA:2007:027, SUSE-SR:2007:006, SUSE-SR:2007:008, SUSE-SR:2008:08, TLSA-2007-26, VIGILANCE-VUL-6708.

Description of the vulnerability 

A local attacker can exploit overflows in X in order to elevate his privileges.

The XC-MISC extension is activated by default. A malicious client can create an integer overflow in ProcXCMiscGetXIDList(). [severity:3/4; BID-23284, CERTA-2007-AVI-177, CVE-2007-1003]

An attacker can create a BDF font generating an integer overflow in bdfReadCharacters() function of bdfread.c. This vulnerability also affects Freetype. [severity:3/4; BID-23283, CVE-2007-1351]

An attacker can create a font whose fonts.dir field generates an integer overflow in bdfReadCharacters() function. [severity:3/4; BID-23283, CVE-2007-1352]

The XInitImage() function of ImUtils.c does not correctly check its parameters. An attacker can create a malicous image and invite victim to see it with a software such as xwud or ImageMagick to generate an integer overflow. [severity:3/4; BID-23300, CVE-2007-1667]

These integer overflows lead to a denial of service or to code execution.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity vulnerability impacts software or systems such as Debian, Fedora, Mandriva Linux, Mandriva NF, NLD, OES, OpenBSD, openSUSE, Solaris, Trusted Solaris, RHEL, Slackware, SLES, TurboLinux, Unix (platform) ~ not comprehensive, XOrg Bundle ~ not comprehensive, libX11.

Our Vigil@nce team determined that the severity of this vulnerability is important.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 4 vulnerabilities.

An attacker with a expert ability can exploit this weakness alert.

Solutions for this threat 

X.Org: patch.
A patch is available:
http://xorg.freedesktop.org/archive/X11R7.2/patches/xorg-libX11-1.1.1-xinitimage.diff
  MD5: d52da02163cd401b99b6e3a08d7ff068
  SHA1: a0f904115ad9dc441bebcf2f8267f9751322b727
http://xorg.freedesktop.org/archive/X11R7.2/patches/xorg-libXfont-1.2.7-bdf-fontdir.diff
  MD5: 76e3330c9bace76318e096b3c2182101
  SHA1: 3e57aca6215e1212e53b1a3b1d243916ac7fa703
http://xorg.freedesktop.org/archive/X11R7.2/patches/xorg-xserver-1.2.0-xcmisc.diff
  MD5: 0fa07a8fb2bc14fa01fc29e42b89c59e
  SHA1: 3557cbe23be6912106ed7220d95301311fb93a26

FreeType: version 2.3.3.
Version 2.3.3 is corrected:
  http://www.freetype.org/

libXfont: version 1.2.8.
Version 1.2.8 is corrected:
  http://xorg.freedesktop.org/archive/individual/lib/libXfont-1.2.8.tar.bz2
    MD5: 83b8e21f6ee22512a8f72ba51e2d74f6
    SHA1: 4d8801450d2a9282a84f55ea78a7d184bc8a6411
  http://xorg.freedesktop.org/archive/individual/lib/libXfont-1.2.8.tar.gz
   MD5: 1d1753f63be98840f65a69c5f9852f42
   SHA1: 87a27c6db95bcdc5fe00a1960dd145a0a221d0c3

Debian 4.0: new freetype packages.
New packages are available:
amd64 architecture (AMD x86_64 (AMD64))
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch2_amd64.deb
    Size/MD5 checksum: 673818 96fbd82eeaa6cf095fd10aaa4736c358
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch2_amd64.udeb
    Size/MD5 checksum: 248188 a08b0a89d9857241d42ea7391d98e857
  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch2_amd64.deb
    Size/MD5 checksum: 151550 5d947022a4dc7c1f14601e05993ef2d7
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch2_amd64.deb
    Size/MD5 checksum: 355316 9549934f5ae99b2ba7b3489406a59bf1
i386 architecture (Intel ia32)
  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch2_i386.deb
    Size/MD5 checksum: 135260 dec67a099a07602a703678d834e9bf5f
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch2_i386.udeb
    Size/MD5 checksum: 235868 127461c37904fd8df3a35c0371b97f8a
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch2_i386.deb
    Size/MD5 checksum: 341816 cbe96a1f686ac5abcd657976bc9c6388
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch2_i386.deb
    Size/MD5 checksum: 641568 3145b7a124c05e5a93a2761c928fcbac
ia64 architecture (Intel ia64)
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-dev_2.2.1-5+etch2_ia64.deb
    Size/MD5 checksum: 816940 0d14a9d59fe989cc341fecdf4e273567
  http://security.debian.org/pool/updates/main/f/freetype/freetype2-demos_2.2.1-5+etch2_ia64.deb
    Size/MD5 checksum: 222246 08e1a94becfcf78b31d1be44f46759b2
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6-udeb_2.2.1-5+etch2_ia64.udeb
    Size/MD5 checksum: 383392 0be639622637ed9e31190df0ea0f0820
  http://security.debian.org/pool/updates/main/f/freetype/libfreetype6_2.2.1-5+etch2_ia64.deb
    Size/MD5 checksum: 488832 36deedfb0a679c6a58d9711b9834f5f8

Debian: new graphicsmagick packages.
New packages are available:
  http://security.debian.org/pool/updates/main/g/graphicsmagick/*_1.1.7-13+etch1_*.deb
  http://security.debian.org/pool/updates/main/g/graphicsmagick/*_1.1.11-3.2+lenny1_*.deb

Debian: new imagemagick packages.
New packages are available:
  http://security.debian.org/pool/updates/main/i/imagemagick/*_6.2.4.5.dfsg1-0.15+etch1_*.deb
  http://security.debian.org/pool/updates/main/i/imagemagick/*_6.3.7.9.dfsg2-1~lenny3_*.deb

Debian: new xfree86 packages.
New packages are available:
    http://security.debian.org/pool/updates/main/x/xfree86/*_4.3.0.dfsg.1-14sarge4_*.deb

Fedora Core 5: new libX11 packages.
New packages are available:
    http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/
c22d27ee248a80bc38df598a9eec181467737774 SRPMS/libX11-1.0.0-4.fc5.src.rpm
c22d27ee248a80bc38df598a9eec181467737774 noarch/libX11-1.0.0-4.fc5.src.rpm
8771ae8ef00ea0c750fe08a7b1b849ff97fe7563 ppc/debug/libX11-debuginfo-1.0.0-4.fc5.ppc.rpm
bb6f378e7a39054d97488c808abb504f4b927052 ppc/libX11-1.0.0-4.fc5.ppc.rpm
d8735b5c0548723b72a44986da63bf109c54ccf3 ppc/libX11-devel-1.0.0-4.fc5.ppc.rpm
0c47a719ab3721a55aa9eac4d0350515250e6d28 x86_64/debug/libX11-debuginfo-1.0.0-4.fc5.x86_64.rpm
8bacc024a882f3422f34042bd730d7fe8cfb5363 x86_64/libX11-devel-1.0.0-4.fc5.x86_64.rpm
a0113254f8e206dce9635286ad23be564c16f3a1 x86_64/libX11-1.0.0-4.fc5.x86_64.rpm
54a14a35b6beff16e75578673acc700b19f80b8c i386/debug/libX11-debuginfo-1.0.0-4.fc5.i386.rpm
107a9202f421b8a8cf9dd5be8e556954bbd539d9 i386/libX11-devel-1.0.0-4.fc5.i386.rpm
645037e8a0ea24b8889e9c627a8c216cfd915314 i386/libX11-1.0.0-4.fc5.i386.rpm

Fedora Core 5: new libXfont packages.
New packages are available:
    http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/
aaf45ead6cac1d43c990cbfac69774f2d3a36857 SRPMS/libXfont-1.2.8-1.fc5.src.rpm
aaf45ead6cac1d43c990cbfac69774f2d3a36857 noarch/libXfont-1.2.8-1.fc5.src.rpm
069c67665f9ddae2d67100c6c70509011a489c0a ppc/debug/libXfont-debuginfo-1.2.8-1.fc5.ppc.rpm
f177147d891ba44f6a3253e94e250d21a322057e ppc/libXfont-devel-1.2.8-1.fc5.ppc.rpm
56642a97c35316f2331a46dafac3964d99829581 ppc/libXfont-1.2.8-1.fc5.ppc.rpm
f910418741b85bc75c10997b20610a5347c78f78 x86_64/libXfont-1.2.8-1.fc5.x86_64.rpm
c934f4ddcc06775826dc54b92269b0e35a36a488 x86_64/debug/libXfont-debuginfo-1.2.8-1.fc5.x86_64.rpm
6ad80acdfb463d513efc404b3bba4a16b11a6652 x86_64/libXfont-devel-1.2.8-1.fc5.x86_64.rpm
ce523cb73f9fdfeb84cca8d9d3441de1d7236c61 i386/libXfont-devel-1.2.8-1.fc5.i386.rpm
857c427a94d352c6d588630a7531bdae845c3fdc i386/libXfont-1.2.8-1.fc5.i386.rpm
e993552b7677941677cbf587270901c00bdc5733 i386/debug/libXfont-debuginfo-1.2.8-1.fc5.i386.rpm

Fedora Core 5: new xorg-x11-server packages.
New packages are available:
    http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/
00cbc8150fa51936dc4be6539c746e0993f231a1 SRPMS/xorg-x11-server-1.0.1-9.fc5.7.src.rpm
00cbc8150fa51936dc4be6539c746e0993f231a1 noarch/xorg-x11-server-1.0.1-9.fc5.7.src.rpm
21d4ba0d190b9aa5fe9d42a1906aac2722957a8d ppc/xorg-x11-server-Xvfb-1.0.1-9.fc5.7.ppc.rpm
87837bc9d3ad09777f81c6933f62ac67a8f1806d ppc/xorg-x11-server-Xdmx-1.0.1-9.fc5.7.ppc.rpm
4ff858dcc4243cd4036bc6e004e84b344bfdd714 ppc/debug/xorg-x11-server-debuginfo-1.0.1-9.fc5.7.ppc.rpm
0f029a57cf5b3e56df41418bb66fd546fdbe0b37 ppc/xorg-x11-server-sdk-1.0.1-9.fc5.7.ppc.rpm
a98afa24f810d32b4da760c46b6e26be586d357f ppc/xorg-x11-server-Xnest-1.0.1-9.fc5.7.ppc.rpm
f8f6f081fa6c857eec0a5fe2056809e1a9c0e518 ppc/xorg-x11-server-Xorg-1.0.1-9.fc5.7.ppc.rpm
c7a8b930b49fdd440b8dd9916a980cf2aa1fac12 x86_64/debug/xorg-x11-server-debuginfo-1.0.1-9.fc5.7.x86_64.rpm
f3657299efc6e06ba2d69efb6c4c0f79e10a76f1 x86_64/xorg-x11-server-sdk-1.0.1-9.fc5.7.x86_64.rpm
a28401beb997ff167afbdb169f79fe936e8ab813 x86_64/xorg-x11-server-Xdmx-1.0.1-9.fc5.7.x86_64.rpm
6d462dae35b9302cc0d3a20213579251c30ab2f4 x86_64/xorg-x11-server-Xnest-1.0.1-9.fc5.7.x86_64.rpm
476b9d8a0d66faac671a78899873c49831ce0de3 x86_64/xorg-x11-server-Xorg-1.0.1-9.fc5.7.x86_64.rpm
a9f8a4f474e8c301992ebb9c9fb3da3d6859c0dd x86_64/xorg-x11-server-Xvfb-1.0.1-9.fc5.7.x86_64.rpm
bcf07a6314fc0ce3b234a856b84a1434c96c9b6b i386/debug/xorg-x11-server-debuginfo-1.0.1-9.fc5.7.i386.rpm
9853953b59dbea6b9076cf50552dabee51f2bf5a i386/xorg-x11-server-Xnest-1.0.1-9.fc5.7.i386.rpm
248cbc592dbbf295b38b90958178c9101e505598 i386/xorg-x11-server-Xdmx-1.0.1-9.fc5.7.i386.rpm
b8c97c7ed4759669f3dacb08b2d7ac401ae4da78 i386/xorg-x11-server-sdk-1.0.1-9.fc5.7.i386.rpm
bff108c01d761d3e963e2a48b8c895190c68cde9 i386/xorg-x11-server-Xorg-1.0.1-9.fc5.7.i386.rpm
8139ca6942cd30105f56db6a8b72687413a80733 i386/xorg-x11-server-Xvfb-1.0.1-9.fc5.7.i386.rpm

Fedora Core 6: new libX11 packages.
New packages are available:
    http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/
37ad9863a321eeca9c07f72f50d9ff5184469475 SRPMS/libX11-1.0.3-7.fc6.src.rpm
37ad9863a321eeca9c07f72f50d9ff5184469475 noarch/libX11-1.0.3-7.fc6.src.rpm
306c6dc3c836b9a29d2ac62ae68dd7a9923e9d25 ppc/debug/libX11-debuginfo-1.0.3-7.fc6.ppc.rpm
982e50e0924fa7af1b58b9de5662aaed7744dc39 ppc/libX11-devel-1.0.3-7.fc6.ppc.rpm
edf8554717c80d19a37054d673d1d886dcf5100f ppc/libX11-1.0.3-7.fc6.ppc.rpm
208cffad3d2ee7e9d8f08d367f36f80d8b2fe656 x86_64/debug/libX11-debuginfo-1.0.3-7.fc6.x86_64.rpm
3f726a7f8e32da2dff7f24a84957964ea9562296 x86_64/libX11-1.0.3-7.fc6.x86_64.rpm
ba884558a328b8b4ada6371d5513f9b21466d5d3 x86_64/libX11-devel-1.0.3-7.fc6.x86_64.rpm
f2ee01ea6dc6e3252b9ff33440f119f0f0e11343 i386/debug/libX11-debuginfo-1.0.3-7.fc6.i386.rpm
1e11734d3bab45b4bfdbad80fd6cfddabdd58c35 i386/libX11-devel-1.0.3-7.fc6.i386.rpm
2d5f9bacf810822d3585f4a6a43baf6c91b3891b i386/libX11-1.0.3-7.fc6.i386.rpm

Fedora Core 6: new libXfont packages.
New packages are available:
    http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/
6d39743041082790f356d74797ea2a49da8ff8d9 SRPMS/libXfont-1.2.8-1.fc6.src.rpm
6d39743041082790f356d74797ea2a49da8ff8d9 noarch/libXfont-1.2.8-1.fc6.src.rpm
67a94481532a3506f582c93220236bc3692d312e ppc/libXfont-1.2.8-1.fc6.ppc.rpm
02d654ad2c48fbcedc68ca2a2b7333fb96da3d1b ppc/libXfont-devel-1.2.8-1.fc6.ppc.rpm
e8447ebfb8c764128f76456070bc4ad7142c9ae9 ppc/debug/libXfont-debuginfo-1.2.8-1.fc6.ppc.rpm
f32b3383238a39cf94237c221a7b639781af4581 x86_64/libXfont-1.2.8-1.fc6.x86_64.rpm
121f6011626a50cd21e6e918ab52820e075ac90a x86_64/debug/libXfont-debuginfo-1.2.8-1.fc6.x86_64.rpm
df4fe12911b856f121975e8ea79e0294766ccccb x86_64/libXfont-devel-1.2.8-1.fc6.x86_64.rpm
37af0b5ba409aa9becc67545cec0ace1d8aa4a1f i386/libXfont-1.2.8-1.fc6.i386.rpm
156232489272e4dc9ffe28fdb028ef600c49ee34 i386/debug/libXfont-debuginfo-1.2.8-1.fc6.i386.rpm
03431ab8bf214cac2672611252fb04a703dc64b8 i386/libXfont-devel-1.2.8-1.fc6.i386.rpm

Fedora Core 6: new xorg-x11-server packages.
New packages are available:
    http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/
c372c2467ffe6120e85cfc0f679975518d6ada86 SRPMS/xorg-x11-server-1.1.1-47.8.fc6.src.rpm
c372c2467ffe6120e85cfc0f679975518d6ada86 noarch/xorg-x11-server-1.1.1-47.8.fc6.src.rpm
e6801496adc1c1b53c6f3ff0989c2162967e134a ppc/xorg-x11-server-sdk-1.1.1-47.8.fc6.ppc.rpm
2f4dc0fc28141a82596976dad905aaaa97bc44db ppc/xorg-x11-server-Xorg-1.1.1-47.8.fc6.ppc.rpm
91b7dfb3bb3ec650d319d69617487b10827482a6 ppc/xorg-x11-server-Xdmx-1.1.1-47.8.fc6.ppc.rpm
5a3fc43c6bda3d536d66db09c6ccd83e4d7c09a1 ppc/debug/xorg-x11-server-debuginfo-1.1.1-47.8.fc6.ppc.rpm
b5e3f65d7d8635a997722a4ff92fa3e7fb46e3ba ppc/xorg-x11-server-Xnest-1.1.1-47.8.fc6.ppc.rpm
1cbbd8ac888030a91b9363b106a7cbdcbabfcdf6 ppc/xorg-x11-server-Xvfb-1.1.1-47.8.fc6.ppc.rpm
1a822cacc05cdcc584fc3e12ce37d74cab813407 ppc/xorg-x11-server-Xephyr-1.1.1-47.8.fc6.ppc.rpm
20fa8e75994b364a358b293feb7035b186d02f60 x86_64/xorg-x11-server-Xvfb-1.1.1-47.8.fc6.x86_64.rpm
ae940786143f5069e79f23d20e7160f18dded5b5 x86_64/xorg-x11-server-sdk-1.1.1-47.8.fc6.x86_64.rpm
6b7ef6e1f737b2e3d61291b9150f368fed83714b x86_64/debug/xorg-x11-server-debuginfo-1.1.1-47.8.fc6.x86_64.rpm
39fd15ec3ae12448073e605eff0ce22a7aeec77d x86_64/xorg-x11-server-Xephyr-1.1.1-47.8.fc6.x86_64.rpm
8be4bbe6dddba7633667bde69bd8fcbefd509558 x86_64/xorg-x11-server-Xorg-1.1.1-47.8.fc6.x86_64.rpm
91e7022fa87f0ffb5babc5c56e8533ad65ce2f18 x86_64/xorg-x11-server-Xnest-1.1.1-47.8.fc6.x86_64.rpm
6d88b16e37ad79c52c2336373a36450bd732c8f6 x86_64/xorg-x11-server-Xdmx-1.1.1-47.8.fc6.x86_64.rpm
1ddbe1cdcbee5d531d955520a59cb4df0aed6353 i386/xorg-x11-server-Xnest-1.1.1-47.8.fc6.i386.rpm
bc727aa02f271005ed18b0fd50d46f50154945ae i386/xorg-x11-server-Xdmx-1.1.1-47.8.fc6.i386.rpm
772fcf3827e3fcf7bf792f3fd7d72b116bf97e28 i386/debug/xorg-x11-server-debuginfo-1.1.1-47.8.fc6.i386.rpm
22ceb948e65c720fca587efd517598a9b12c8c81 i386/xorg-x11-server-sdk-1.1.1-47.8.fc6.i386.rpm
62b895cd3f2f01c094a010ca5a8f723eb606b4e8 i386/xorg-x11-server-Xorg-1.1.1-47.8.fc6.i386.rpm
ec62e0e1b4f2fcd41cfda15ec8eac1af699ba327 i386/xorg-x11-server-Xvfb-1.1.1-47.8.fc6.i386.rpm
1bd878a48f34773106bbed64305a25d0b58d40b6 i386/xorg-x11-server-Xephyr-1.1.1-47.8.fc6.i386.rpm

Mandriva: new freetype2 packages.
New packages are available:
 Mandriva Linux 2007.0:
 f6fa7475ddd370e4c5666c8e5f3ea1ab 2007.0/i586/libfreetype6-2.2.1-4.1mdv2007.0.i586.rpm
 798b4436b273364cb5b88adc2ab02284 2007.0/i586/libfreetype6-devel-2.2.1-4.1mdv2007.0.i586.rpm
 d4448a43fcf33b965148f985918c8c1f 2007.0/i586/libfreetype6-static-devel-2.2.1-4.1mdv2007.0.i586.rpm
 e94919cdff41a89e8dfb013b51e97298 2007.0/SRPMS/freetype2-2.2.1-4.1mdv2007.0.src.rpm
 Mandriva Linux 2007.0/X86_64:
 09b1e2a374c33f5ba03fbdf9a3a9c06d 2007.0/x86_64/lib64freetype6-2.2.1-4.1mdv2007.0.x86_64.rpm
 07920f5a1d99c335b6c8348c278ab1c5 2007.0/x86_64/lib64freetype6-devel-2.2.1-4.1mdv2007.0.x86_64.rpm
 d23852054cb490feea6dfb9c00c66d96 2007.0/x86_64/lib64freetype6-static-devel-2.2.1-4.1mdv2007.0.x86_64.rpm
 e94919cdff41a89e8dfb013b51e97298 2007.0/SRPMS/freetype2-2.2.1-4.1mdv2007.0.src.rpm
  
 Mandriva Linux 2007.1:
 b6d65fcc62754bd1400e90efa49e6679 2007.1/i586/libfreetype6-2.3.1-3.1mdv2007.1.i586.rpm
 142d11543d5db9880c9db97b99595559 2007.1/i586/libfreetype6-devel-2.3.1-3.1mdv2007.1.i586.rpm
 bfc535d187f868751ed2460f3de01e53 2007.1/i586/libfreetype6-static-devel-2.3.1-3.1mdv2007.1.i586.rpm
 81a51e662770f7d91ff92b6ae53211af 2007.1/SRPMS/freetype2-2.3.1-3.1mdv2007.1.src.rpm
 Mandriva Linux 2007.1/X86_64:
 3323e12c0ac539c7bc6b7f6ead647f7e 2007.1/x86_64/lib64freetype6-2.3.1-3.1mdv2007.1.x86_64.rpm
 c9c6db8da9895b96eb074ffb09f2383e 2007.1/x86_64/lib64freetype6-devel-2.3.1-3.1mdv2007.1.x86_64.rpm
 87f48e86ee449bbba06fd0159c6c34af 2007.1/x86_64/lib64freetype6-static-devel-2.3.1-3.1mdv2007.1.x86_64.rpm
 81a51e662770f7d91ff92b6ae53211af 2007.1/SRPMS/freetype2-2.3.1-3.1mdv2007.1.src.rpm
 Corporate 3.0:
 dbd9d9dce2eecf5dc0f07b949438f6e2 corporate/3.0/i586/libfreetype6-2.1.7-4.4.C30mdk.i586.rpm
 5b4ae55777d8fb0802300180164626be corporate/3.0/i586/libfreetype6-devel-2.1.7-4.4.C30mdk.i586.rpm
 e93a54a13629939d1b069cc8c6d7ba00 corporate/3.0/i586/libfreetype6-static-devel-2.1.7-4.4.C30mdk.i586.rpm
 389338c4062630ef82932a16888aca74 corporate/3.0/SRPMS/freetype2-2.1.7-4.4.C30mdk.src.rpm
 Corporate 3.0/X86_64:
 020ea45885d2d352f01e6db561e91043 corporate/3.0/x86_64/lib64freetype6-2.1.7-4.4.C30mdk.x86_64.rpm
 1bd6b3ca33a1c79664b77fef5386d968 corporate/3.0/x86_64/lib64freetype6-devel-2.1.7-4.4.C30mdk.x86_64.rpm
 8beb621c6ad598032038295c1742eaa5 corporate/3.0/x86_64/lib64freetype6-static-devel-2.1.7-4.4.C30mdk.x86_64.rpm
 dbd9d9dce2eecf5dc0f07b949438f6e2 corporate/3.0/x86_64/libfreetype6-2.1.7-4.4.C30mdk.i586.rpm
 389338c4062630ef82932a16888aca74 corporate/3.0/SRPMS/freetype2-2.1.7-4.4.C30mdk.src.rpm
 Corporate 4.0:
 14f546a8e3fe70362e25138b08efe734 corporate/4.0/i586/libfreetype6-2.1.10-9.5.20060mlcs4.i586.rpm
 47bc3d7a07c632386e1d11c5180e89bf corporate/4.0/i586/libfreetype6-devel-2.1.10-9.5.20060mlcs4.i586.rpm
 d61c4fbe40e780d40638e83e556ca464 corporate/4.0/i586/libfreetype6-static-devel-2.1.10-9.5.20060mlcs4.i586.rpm
 53fb2858df7f92bee30b27f588953d42 corporate/4.0/SRPMS/freetype2-2.1.10-9.5.20060mlcs4.src.rpm
 Corporate 4.0/X86_64:
 593b7b057948a4e68bccc078f3e6582a corporate/4.0/x86_64/lib64freetype6-2.1.10-9.5.20060mlcs4.x86_64.rpm
 06e9aedc719c1e1232d193dfe0fd1430 corporate/4.0/x86_64/lib64freetype6-devel-2.1.10-9.5.20060mlcs4.x86_64.rpm
 f3e065cdefa7ae88538dd8c8d630d65b corporate/4.0/x86_64/lib64freetype6-static-devel-2.1.10-9.5.20060mlcs4.x86_64.rpm
 14f546a8e3fe70362e25138b08efe734 corporate/4.0/x86_64/libfreetype6-2.1.10-9.5.20060mlcs4.i586.rpm
 47bc3d7a07c632386e1d11c5180e89bf corporate/4.0/x86_64/libfreetype6-devel-2.1.10-9.5.20060mlcs4.i586.rpm
 d61c4fbe40e780d40638e83e556ca464 corporate/4.0/x86_64/libfreetype6-static-devel-2.1.10-9.5.20060mlcs4.i586.rpm
 53fb2858df7f92bee30b27f588953d42 corporate/4.0/SRPMS/freetype2-2.1.10-9.5.20060mlcs4.src.rpm
 Multi Network Firewall 2.0:
 2d6f0486f22dba324dcfbfba8ee92aea mnf/2.0/i586/libfreetype6-2.1.7-4.4.M20mdk.i586.rpm
 cb19a04e2a59b58c0404865ee2b6ad0b mnf/2.0/i586/libfreetype6-devel-2.1.7-4.4.M20mdk.i586.rpm
 95374cb08444a52b998bec97099d8692 mnf/2.0/i586/libfreetype6-static-devel-2.1.7-4.4.M20mdk.i586.rpm
 61be4166abddbca6eb0910f71fefcb53 mnf/2.0/SRPMS/freetype2-2.1.7-4.4.M20mdk.src.rpm

Mandriva: new ImageMagick packages.
New packages are available:
 
 Mandriva Linux 2007.0:
 343587ddd298b9dfb7dc6c5caecb70d0 2007.0/i586/ImageMagick-6.2.9.2-1.3mdv2007.0.i586.rpm
 fcce307ef73994175a3d51137266a6af 2007.0/i586/ImageMagick-doc-6.2.9.2-1.3mdv2007.0.i586.rpm
 64bd268c6592b10f44adc22c16c8034b 2007.0/i586/libMagick10.4.0-6.2.9.2-1.3mdv2007.0.i586.rpm
 83bdd365ddaebdeba93669741053d998 2007.0/i586/libMagick10.4.0-devel-6.2.9.2-1.3mdv2007.0.i586.rpm
 da2075d33957e1cfd48bca48e6045366 2007.0/i586/perl-Image-Magick-6.2.9.2-1.3mdv2007.0.i586.rpm
 9475b65f0389811d6d24b4afb5d1f0f7 2007.0/SRPMS/ImageMagick-6.2.9.2-1.3mdv2007.0.src.rpm
 Mandriva Linux 2007.0/X86_64:
 96bdffd605ca39d1dc0a679cef1ac7fc 2007.0/x86_64/ImageMagick-6.2.9.2-1.3mdv2007.0.x86_64.rpm
 6889ad0d3b9b99744f4e3d245fa09a94 2007.0/x86_64/ImageMagick-doc-6.2.9.2-1.3mdv2007.0.x86_64.rpm
 3d58aa4195fcb658853bd515103e9434 2007.0/x86_64/lib64Magick10.4.0-6.2.9.2-1.3mdv2007.0.x86_64.rpm
 5eddebd9cae0bf6e9aedf8542e880ae1 2007.0/x86_64/lib64Magick10.4.0-devel-6.2.9.2-1.3mdv2007.0.x86_64.rpm
 290cd11e7d80cc96cf633c12aa0907ce 2007.0/x86_64/perl-Image-Magick-6.2.9.2-1.3mdv2007.0.x86_64.rpm
 9475b65f0389811d6d24b4afb5d1f0f7 2007.0/SRPMS/ImageMagick-6.2.9.2-1.3mdv2007.0.src.rpm
 Mandriva Linux 2007.1:
 eb87e7c334209c8684a1b67445720fd7 2007.1/i586/ImageMagick-6.3.2.9-5.1mdv2007.1.i586.rpm
 3ae9d9d49b46f327efbcf35967700011 2007.1/i586/ImageMagick-desktop-6.3.2.9-5.1mdv2007.1.i586.rpm
 729b308b20fa3fdf18e262a4da4092d8 2007.1/i586/ImageMagick-doc-6.3.2.9-5.1mdv2007.1.i586.rpm
 174bd6a073bc802246d6e97b1995174e 2007.1/i586/libMagick10.7.0-6.3.2.9-5.1mdv2007.1.i586.rpm
 ffe8d8e96f27eb2b5767f587c03d1c3f 2007.1/i586/libMagick10.7.0-devel-6.3.2.9-5.1mdv2007.1.i586.rpm
 94b7c633860dca3e15f6f93b9690bc06 2007.1/i586/perl-Image-Magick-6.3.2.9-5.1mdv2007.1.i586.rpm
 8d70c1afadd634d2e3b618b14b79efbf 2007.1/SRPMS/ImageMagick-6.3.2.9-5.1mdv2007.1.src.rpm
 Mandriva Linux 2007.1/X86_64:
 2321dfeec60cd7aa9d10e4b2d3e95c15 2007.1/x86_64/ImageMagick-6.3.2.9-5.1mdv2007.1.x86_64.rpm
 3cab45fe3f4f5d122645de4fe1bf9c03 2007.1/x86_64/ImageMagick-desktop-6.3.2.9-5.1mdv2007.1.x86_64.rpm
 03b60841608c2ccb09f97befca901906 2007.1/x86_64/ImageMagick-doc-6.3.2.9-5.1mdv2007.1.x86_64.rpm
 209cc68583cc4daf0fa9ebd425c94007 2007.1/x86_64/lib64Magick10.7.0-6.3.2.9-5.1mdv2007.1.x86_64.rpm
 edcf84ea5290d2e92ddc2e2cd1f21a03 2007.1/x86_64/lib64Magick10.7.0-devel-6.3.2.9-5.1mdv2007.1.x86_64.rpm
 43ba4dd5a323036259b1b5fdecc2076b 2007.1/x86_64/perl-Image-Magick-6.3.2.9-5.1mdv2007.1.x86_64.rpm
 8d70c1afadd634d2e3b618b14b79efbf 2007.1/SRPMS/ImageMagick-6.3.2.9-5.1mdv2007.1.src.rpm
 Corporate 3.0:
 16813a44dac74871a5db809ce9f9e002 corporate/3.0/i586/ImageMagick-5.5.7.15-6.11.C30mdk.i586.rpm
 57b4e7c0600b065753442c4b5e221b20 corporate/3.0/i586/ImageMagick-doc-5.5.7.15-6.11.C30mdk.i586.rpm
 0cc167ebf831e7480ae074bd16c15b75 corporate/3.0/i586/libMagick5.5.7-5.5.7.15-6.11.C30mdk.i586.rpm
 25f93102616d5e30e97c145f13a35726 corporate/3.0/i586/libMagick5.5.7-devel-5.5.7.15-6.11.C30mdk.i586.rpm
 60e2ad207a60aaa172f4e3d0f024c122 corporate/3.0/i586/perl-Magick-5.5.7.15-6.11.C30mdk.i586.rpm
 14bc8952ce20fd3849f80b1e78f7043c corporate/3.0/SRPMS/ImageMagick-5.5.7.15-6.11.C30mdk.src.rpm
 Corporate 3.0/X86_64:
 593bbef64a1dd8be7dff37021a504812 corporate/3.0/x86_64/ImageMagick-5.5.7.15-6.11.C30mdk.x86_64.rpm
 7b9998a9e7f0f653aa57db89c27cb15b corporate/3.0/x86_64/ImageMagick-doc-5.5.7.15-6.11.C30mdk.x86_64.rpm
 6c7492a96b986962b8f8f9f7925bde8d corporate/3.0/x86_64/lib64Magick5.5.7-5.5.7.15-6.11.C30mdk.x86_64.rpm
 22f51cc5c770c95958f5e3c344748f5c corporate/3.0/x86_64/lib64Magick5.5.7-devel-5.5.7.15-6.11.C30mdk.x86_64.rpm
 aefed15ea641344181dddd4ec35752c0 corporate/3.0/x86_64/perl-Magick-5.5.7.15-6.11.C30mdk.x86_64.rpm
 14bc8952ce20fd3849f80b1e78f7043c corporate/3.0/SRPMS/ImageMagick-5.5.7.15-6.11.C30mdk.src.rpm
 Corporate 4.0:
 95973160bd68a3aed051806372901781 corporate/4.0/i586/ImageMagick-6.2.4.3-1.6.20060mlcs4.i586.rpm
 abde3c8490d43ae6420d0d9956f2aee5 corporate/4.0/i586/ImageMagick-doc-6.2.4.3-1.6.20060mlcs4.i586.rpm
 b6d7c4e7eb3129d9dd7a54fb01ef8092 corporate/4.0/i586/libMagick8.4.2-6.2.4.3-1.6.20060mlcs4.i586.rpm
 d84c750f874a5208012029e3583cb9e4 corporate/4.0/i586/libMagick8.4.2-devel-6.2.4.3-1.6.20060mlcs4.i586.rpm
 f675bf9dca0952142beb708f4810b9c7 corporate/4.0/i586/perl-Image-Magick-6.2.4.3-1.6.20060mlcs4.i586.rpm
 a875a3e81ed37bd88099a44f40f9cb56 corporate/4.0/SRPMS/ImageMagick-6.2.4.3-1.6.20060mlcs4.src.rpm
 Corporate 4.0/X86_64:
 932916789e755403722596bc6ff5db77 corporate/4.0/x86_64/ImageMagick-6.2.4.3-1.6.20060mlcs4.x86_64.rpm
 4450c7359f47f2dd7bc6792ede57a4e2 corporate/4.0/x86_64/ImageMagick-doc-6.2.4.3-1.6.20060mlcs4.x86_64.rpm
 90666c9e1ed0ac69283ca78892f621ab corporate/4.0/x86_64/lib64Magick8.4.2-6.2.4.3-1.6.20060mlcs4.x86_64.rpm
 b55e2d4e7bea0f4f6c7ff76cb7cf5b7b corporate/4.0/x86_64/lib64Magick8.4.2-devel-6.2.4.3-1.6.20060mlcs4.x86_64.rpm
 c2e233ddc77013d62169ea4cb4a1d56f corporate/4.0/x86_64/perl-Image-Magick-6.2.4.3-1.6.20060mlcs4.x86_64.rpm
 a875a3e81ed37bd88099a44f40f9cb56 corporate/4.0/SRPMS/ImageMagick-6.2.4.3-1.6.20060mlcs4.src.rpm

Mandriva: new tightvnc packages.
New packages are available:
 
 Mandriva Linux 2007.0:
 68955a65584a1c964141aa1d0e44f7e0 2007.0/i586/tightvnc-1.2.9-13.2mdv2007.0.i586.rpm
 9928944d22067747b5427a15ab59c853 2007.0/i586/tightvnc-doc-1.2.9-13.2mdv2007.0.i586.rpm
 9a6643c4c00c3d758a204e1b46969914 2007.0/i586/tightvnc-server-1.2.9-13.2mdv2007.0.i586.rpm
 0a4abe1c964ed13e3d445efc0c1dd244 2007.0/SRPMS/tightvnc-1.2.9-13.2mdv2007.0.src.rpm
 Mandriva Linux 2007.0/X86_64:
 700ed069013c7cfef989263344e41dd0 2007.0/x86_64/tightvnc-1.2.9-13.2mdv2007.0.x86_64.rpm
 8a8c9a1721c9521d2224da5b73ddaf76 2007.0/x86_64/tightvnc-doc-1.2.9-13.2mdv2007.0.x86_64.rpm
 7a6402ace347731a1ae8722d80a75638 2007.0/x86_64/tightvnc-server-1.2.9-13.2mdv2007.0.x86_64.rpm
 0a4abe1c964ed13e3d445efc0c1dd244 2007.0/SRPMS/tightvnc-1.2.9-13.2mdv2007.0.src.rpm
 
 Mandriva Linux 2007.1:
 9c14a56106984cd16780a1fd7e9c7beb 2007.1/i586/tightvnc-1.2.9-16.1mdv2007.1.i586.rpm
 8aa3673bc8843dae12d9f18c4226214e 2007.1/i586/tightvnc-doc-1.2.9-16.1mdv2007.1.i586.rpm
 d78d10a879bc1b1c461f75b815dcd656 2007.1/i586/tightvnc-server-1.2.9-16.1mdv2007.1.i586.rpm
 59e94b523bc078f3997f689dae0e22b5 2007.1/SRPMS/tightvnc-1.2.9-16.1mdv2007.1.src.rpm
 Mandriva Linux 2007.1/X86_64:
 26e585c8ba950720c17ea4ce1373c05c 2007.1/x86_64/tightvnc-1.2.9-16.1mdv2007.1.x86_64.rpm
 6f031ef92c5bec87488bba5861f0d41e 2007.1/x86_64/tightvnc-doc-1.2.9-16.1mdv2007.1.x86_64.rpm
 205e13d0c46dc25bfa39c7dcfafe6dcb 2007.1/x86_64/tightvnc-server-1.2.9-16.1mdv2007.1.x86_64.rpm
 59e94b523bc078f3997f689dae0e22b5 2007.1/SRPMS/tightvnc-1.2.9-16.1mdv2007.1.src.rpm
 Corporate 3.0:
 65109fe6bab801e11e503b60b308643b corporate/3.0/i586/tightvnc-1.2.9-2.2.C30mdk.i586.rpm
 3b08614f635cd9cf8b68d7c76d30b345 corporate/3.0/i586/tightvnc-doc-1.2.9-2.2.C30mdk.i586.rpm
 0e61567902f05149ac4f08e64953febf corporate/3.0/i586/tightvnc-server-1.2.9-2.2.C30mdk.i586.rpm
 e019fb72dce33e1dbf2e6f7a3bdcb384 corporate/3.0/SRPMS/tightvnc-1.2.9-2.2.C30mdk.src.rpm
 Corporate 3.0/X86_64:
 ef2e7129cf59e0dbdbf783ebbefb7e43 corporate/3.0/x86_64/tightvnc-1.2.9-2.2.C30mdk.x86_64.rpm
 cdd378ae7999c118a7dfafd0c67cc674 corporate/3.0/x86_64/tightvnc-doc-1.2.9-2.2.C30mdk.x86_64.rpm
 e30948128bc10c8aacc06694d986b1fa corporate/3.0/x86_64/tightvnc-server-1.2.9-2.2.C30mdk.x86_64.rpm
 e019fb72dce33e1dbf2e6f7a3bdcb384 corporate/3.0/SRPMS/tightvnc-1.2.9-2.2.C30mdk.src.rpm
 Corporate 4.0:
 173bc482a466816a6b0c5a8b5568b8ef corporate/4.0/i586/tightvnc-1.2.9-6.2.20060mlcs4.i586.rpm
 5b274d7ac4cd7758411ddbafc885209e corporate/4.0/i586/tightvnc-doc-1.2.9-6.2.20060mlcs4.i586.rpm
 41fe3f9509d09eaa69f915afb348fee0 corporate/4.0/i586/tightvnc-server-1.2.9-6.2.20060mlcs4.i586.rpm
 2651d5941592eba01e6acf47382d9cae corporate/4.0/SRPMS/tightvnc-1.2.9-6.2.20060mlcs4.src.rpm
 Corporate 4.0/X86_64:
 e1aef1895d0bbbc24690e778ec848d74 corporate/4.0/x86_64/tightvnc-1.2.9-6.2.20060mlcs4.x86_64.rpm
 54537c7aa36eff300a96daac296af9ed corporate/4.0/x86_64/tightvnc-doc-1.2.9-6.2.20060mlcs4.x86_64.rpm
 342dc521a4cf33fdf775f0c13191a552 corporate/4.0/x86_64/tightvnc-server-1.2.9-6.2.20060mlcs4.x86_64.rpm
 2651d5941592eba01e6acf47382d9cae corporate/4.0/SRPMS/tightvnc-1.2.9-6.2.20060mlcs4.src.rpm

Mandriva: new xorg-x11/XFree86 packages.
New packages are available:
 
 Mandriva Linux 2007.0:
  libx11-1.0.3-2.2mdv2007.0
  libxfont-1.1.0-4.2mdv2007.0
  x11-server-1.1.1-11.3mdv2007.0
  x11-server-xgl-0.0.1-0.20060714.10.1mdv2007.0
 
 Mandriva Linux 2007.1:
  libx11-1.1.1-2.1mdv2007.1
  libxfont-1.2.7-1.1mdv2007.1
  x11-server-1.2.0-8.1mdv2007.1
  x11-server-xgl-0.0.1-0.20070105.4.1mdv2007.1
 Corporate 3.0:
  XFree86-4.3-32.13.C30mdk
 Corporate 4.0:
  xorg-x11-6.9.0-5.15.20060mlcs4

OpenBSD: patch for X.
A patch is available:
  ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/011_xorg.patch
  ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/021_xorg.patch

OpenBSD: several patches.
After availability of version 4.1, several patches were published:
  ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/macppc/006_altivec.patch
  ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/005_route6.patch
  ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/004_xorg.patch
  ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/002_splnet.patch
  ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.1/common/001_mbuf.patch

RHEL 2.1, 3: new XFree86 packages.
New packages are available:
Red Hat Enterprise Linux version 2.1: XFree86-4.1.0-82.EL
Red Hat Enterprise Linux version 3: XFree86-4.3.0-120.EL

RHEL 4: new xorg-x11 packages.
New packages are available:
Red Hat Enterprise Linux version 4: xorg-x11-6.8.2-1.EL.13.37.7

RHEL 5: new libXfont packages.
New packages are available:
Red Hat Enterprise Linux version 5: libXfont-1.2.2-1.0.2.el5

RHEL 5: new xorg-x11-apps, libX11 packages.
New packages are available:
Red Hat Enterprise Linux 5:
  libX11-1.0.3-8.0.1.el5
  xorg-x11-apps-7.1-4.0.1.el5

RHEL 5: new xorg-x11-server packages.
New packages are available:
Red Hat Enterprise Linux version 5 : xorg-x11-server-1.1.1-48.13.0.1.el5

RHEL: new freetype packages.
New packages are available:
Red Hat Enterprise Linux version 3: freetype-2.1.4-6.el3
Red Hat Enterprise Linux version 4: freetype-2.1.9-5.el4
Red Hat Enterprise Linux version 5: freetype-2.2.1-17.el5

SGI ProPack: new cups, freetype, openoffice, php, postgresql, xscreensaver packages.
Patch 10403 is available:
  http://support.sgi.com/
New packages are also available:
  ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS
  ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS

Slackware: new x11, freetype packages.
New packages are available:
Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/x11-6.8.1-i486-6_slack10.1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/x11-devel-6.8.1-i486-6_slack10.1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/x11-xdmx-6.8.1-i486-6_slack10.1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/x11-xnest-6.8.1-i486-6_slack10.1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/x11-xvfb-6.8.1-i486-6_slack10.1.tgz
Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-6.8.2-i486-9_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-devel-6.8.2-i486-9_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-xdmx-6.8.2-i486-9_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-xnest-6.8.2-i486-9_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-xvfb-6.8.2-i486-9_slack10.2.tgz
Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/fontconfig-2.4.2-i486-1_slack11.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/freetype-2.3.4-i486-1_slack11.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/x11-6.9.0-i486-14_slack11.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/x11-devel-6.9.0-i486-13_slack11.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/x11-xdmx-6.9.0-i486-13_slack11.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/x11-xnest-6.9.0-i486-13_slack11.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/x11-xvfb-6.9.0-i486-13_slack11.0.tgz

Solaris: patch and workaround for libX11.
A patch is available:
  SPARC Platform
    - Solaris 10 : patch 119059-26
  x86 Platform
    - Solaris 10 : patch 119060-25
A workaround is to not use /usr/openwin/bin/xwud.

Solaris: patch workaround for libfreetype, Xsun and Xorg.
Patches are available:
  SPARC Platform
    * Solaris 8, Xsun : patch 119067-07
    * Solaris 8, libfreetype : patch 124420-02
    * Solaris 9, Xsun : patch 112785-61
    * Solaris 9, libfreetype : patch 116105-07
    * Solaris 10, Xsun : patch 119059-25
    * Solaris 10, libfreetype : patch 119812-03
  x86 Platform
    * Solaris 8, Xsun : patch 119068-07
    * Solaris 8, libfreetype : patch 124421-02
    * Solaris 9, Xsun : patch 112786-50
    * Solaris 9, Xorg : patch 124833-02
    * Solaris 9, libfreetype : patch 116106-06
    * Solaris 10, Xsun : patch 119060-24
    * Solaris 10, Xorg : patch 125720-03
    * Solaris 10, libfreetype : patch 119813-04
A workaround is to execute:
  # chmod 0755 /usr/openwin/bin/Xsun
  # chmod 0755 /usr/X11/bin/Xorg
Additional information are indicated in Sun's announce.

SUSE: new ipsec-tools, inkscape, rarpd, ImageMagick/GraphicsMagick, mod_perl, dovecot packages.
New packages are available via FTP or YaST.

SUSE: new qt, kdelibs3, mediawiki, freetype2, xmms, spamassassin packages.
New packages are available via YaST or FTP.

SUSE: new wireshark, otrs, xine, xgl, silc-toolkit, lighttpd, tk packages.
New packages are available.

SUSE: new XFree86, Xorg packages.
New packages are available:
   openSUSE 10.2:
   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/xorg-x11-Xvnc-7.1-33.3.i586.rpm
         f653bfd1f2d272f42bfed24c6eeb1971
   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/xorg-x11-libX11-7.2-15.i586.rpm
         dbc88177adc2c4e061cc698ac16942b7
   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/xorg-x11-libs-7.2-21.i586.rpm
         90189f0fabe1a25f97ee3717fe73a268
   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/xorg-x11-server-7.2-30.6.i586.rpm
         3ab84eb3fc151fce81b71b0834e0982e
   SUSE LINUX 10.1:
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xorg-x11-Xnest-6.9.0-50.32.5.i586.rpm
         d81eceaf06b90d1f48c4e2138a94cb48
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xorg-x11-Xprt-6.9.0-50.32.5.i586.rpm
         0aaf70eee9f9429e7472e340a368ac74
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xorg-x11-Xvfb-6.9.0-50.32.5.i586.rpm
         c00a864032826956a1e0c99bf1ed6fc7
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xorg-x11-Xvnc-6.9.0-50.32.5.i586.rpm
         6cd779e78b4cd4d9a7e6ffe0b3394bcd
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xorg-x11-libs-6.9.0-50.32.5.i586.rpm
         3979722de546dbc5accb94860db7e367
   ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/xorg-x11-server-6.9.0-50.32.5.i586.rpm
         6ea5413c97893e21c273b53278dfd166
   SUSE LINUX 10.0:
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xorg-x11-Xnest-6.8.2-100.12.i586.rpm
         24e662286dad295b861990479564bbc6
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xorg-x11-Xprt-6.8.2-100.12.i586.rpm
         d2eebfa2b0ecc7648ed55ed81e6e6ca0
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xorg-x11-Xvfb-6.8.2-100.12.i586.rpm
         1883fead459c79ad1b8f4a1742431029
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xorg-x11-Xvnc-6.8.2-100.12.i586.rpm
         2a1feeeb929b9407c94ccea5b4798bdc
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xorg-x11-libs-6.8.2-100.12.i586.rpm
         647f7deea79edc9cb1bd75e42b9c36fa
   ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/xorg-x11-server-6.8.2-100.12.i586.rpm
         7371693bab6474b4eba84450c47e9856
   SUSE LINUX 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/xorg-x11-Xnest-6.8.2-30.12.i586.rpm
         9a1f51d708a343686924457782eb40ff
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/xorg-x11-Xprt-6.8.2-30.12.i586.rpm
         1544af7ebe5cde6e03f78219e15fe329
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/xorg-x11-Xvfb-6.8.2-30.12.i586.rpm
         09689cf5bd8c8a1ffea4324f6b1c797a
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/xorg-x11-Xvnc-6.8.2-30.12.i586.rpm
         c7ec29ab8f7902a825cb060caa930dc5
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/xorg-x11-libs-6.8.2-30.12.i586.rpm
         455b252e226a2977bcc0c95eddb05f89
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/xorg-x11-server-6.8.2-30.12.i586.rpm
         dfaf184254c76d904ca463459c696070

Turbolinux: new xorg-x11, XFree86 packages.
New packages are available:
Turbolinux FUJI : xorg-x11-6.8.2-49
Turbolinux 10 : XFree86-4.3.0-95
Turbolinux 8 : XFree86-4.2.0-35
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computer security patch. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.