Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2014:1982 - Security Advisory
Issued:
2014-12-11
Updated:
2014-12-11

RHSA-2014:1982 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: xorg-x11-server security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated xorg-x11-server packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

X.Org is an open source implementation of the X Window System. It provides
the basic low-level functionality that full-fledged graphical user
interfaces are designed upon.

Multiple integer overflow flaws and out-of-bounds write flaws were found in
the way the X.Org server calculated memory requirements for certain X11
core protocol and GLX extension requests. A malicious, authenticated client
could use either of these flaws to crash the X.Org server or, potentially,
execute arbitrary code with root privileges. (CVE-2014-8092, CVE-2014-8093,
CVE-2014-8098)

It was found that the X.Org server did not properly handle SUN-DES-1
(Secure RPC) authentication credentials. A malicious, unauthenticated
client could use this flaw to crash the X.Org server by submitting a
specially crafted authentication request. (CVE-2014-8091)

Multiple out-of-bounds access flaws were found in the way the X.Org server
calculated memory requirements for certain requests. A malicious,
authenticated client could use either of these flaws to crash the X.Org
server, or leak memory contents to the client. (CVE-2014-8097)

Multiple out-of-bounds access flaws were found in the way the X.Org server
calculated memory requirements for certain requests. A malicious,
authenticated client could use either of these flaws to crash the X.Org
server. (CVE-2014-8095, CVE-2014-8096, CVE-2014-8099, CVE-2014-8100,
CVE-2014-8101, CVE-2014-8102)

All xorg-x11-server users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 1168680 - CVE-2014-8091 xorg-x11-server: denial of service due to unchecked malloc in client authentication
  • BZ - 1168684 - CVE-2014-8092 xorg-x11-server: integer overflow in X11 core protocol requests when calculating memory needs for requests
  • BZ - 1168688 - CVE-2014-8093 xorg-x11-server: integer overflow in GLX extension requests when calculating memory needs for requests
  • BZ - 1168694 - CVE-2014-8095 xorg-x11-server: out of bounds access due to not validating length or offset values in XInput extension
  • BZ - 1168700 - CVE-2014-8096 xorg-x11-server: out of bounds access due to not validating length or offset values in XC-MISC extension
  • BZ - 1168705 - CVE-2014-8097 xorg-x11-server: out of bounds access due to not validating length or offset values in DBE extension
  • BZ - 1168707 - CVE-2014-8098 xorg-x11-server: out of bounds access due to not validating length or offset values in GLX extension
  • BZ - 1168710 - CVE-2014-8099 xorg-x11-server: out of bounds access due to not validating length or offset values in XVideo extension
  • BZ - 1168711 - CVE-2014-8100 xorg-x11-server: out of bounds access due to not validating length or offset values in Render extension
  • BZ - 1168713 - CVE-2014-8101 xorg-x11-server: out of bounds access due to not validating length or offset values in RandR extension
  • BZ - 1168714 - CVE-2014-8102 xorg-x11-server: out of bounds access due to not validating length or offset values in XFixes extension

CVEs

  • CVE-2014-8099
  • CVE-2014-8098
  • CVE-2014-8097
  • CVE-2014-8096
  • CVE-2014-8095
  • CVE-2014-8093
  • CVE-2014-8092
  • CVE-2014-8091
  • CVE-2014-8101
  • CVE-2014-8100
  • CVE-2014-8102

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://www.x.org/wiki/Development/Security/Advisory-2014-12-09/
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
xorg-x11-server-1.1.1-48.107.el5_11.src.rpm SHA-256: 9a5a2153ae0ecf4516e336b4a2666997268437dce9f5f818ba95d44a8349dad6
x86_64
xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: ea5a3d38affca4a86832c075a9f3ea95a181b60256d27c3e36bc90cac5c17d0f
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: f29462c9f69f0fc2a0d617fe0a705249f8c426ac13a44b167e6a9fc248768962
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 9b89bb549f0a75c90883a50f28cceed80dfc7e7be3e50b09d923a941453a2077
xorg-x11-server-Xorg-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: a0b40a881dca90096482b428d12eca2d956ef20675cd9591a46f0658f22d5db3
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: dc02d9416371de153410d2b507a1ea043b7b2965344c2145434b00b7f165d16d
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: fe20c3ee8ee60d1f9c5ae2da42dbbcb77995a4f7c92e794e6856e5e2dbab763f
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 93d6ca06426ae96ca14aab7853a3637db248f1eafe2a0f62195af390650f1ecc
xorg-x11-server-sdk-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 5537cd204c72b1d83143b251ae4fbce13649dad768394ea97ec16ae8f473672a
ia64
xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.ia64.rpm SHA-256: 3edda80b56139a32d91b0689e011b5941a5c8405959a1b3763a63afba6c7b9a9
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.ia64.rpm SHA-256: ec3028cddcc3664e422916556b3b9ed987fd19818cdff98f2e08e7e62e273840
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.ia64.rpm SHA-256: ba7a290ba2a4b92e2f4a047d4de7688df3927efbeaac6116ad4deb9b3077f323
xorg-x11-server-Xorg-1.1.1-48.107.el5_11.ia64.rpm SHA-256: 94962f1b712a6831187e4f687fa6251aea88d6ff08750effb04ea2f1b103dee8
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.ia64.rpm SHA-256: 6cb77041a9551bb4d16ee2b90e1bb37a565527d67848f547ce08525b98797538
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.ia64.rpm SHA-256: bdd44df4b764db2128ab211deae97c7c574ac29968c5a396e7fc4dd4be5b4af1
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.ia64.rpm SHA-256: e7d5897824dd61660015c8c238fa28ef219495ae5ccb6e8e5cdb9bcebc625692
xorg-x11-server-sdk-1.1.1-48.107.el5_11.ia64.rpm SHA-256: cf132aec14242187cb87863559e0ac023c7b95561f1841441d1ace85e5df158d
i386
xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.i386.rpm SHA-256: f281dbe530c48a0668551e61f53c1656def833f4f85da1e9fea1b73e2333aef8
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.i386.rpm SHA-256: 58580a75f41a5f111afd44ba2e6ca16a4fd38886225f55e51cad51a9c704ff5d
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.i386.rpm SHA-256: d961824bc051cc990e12e67032096e269d6a64ce37c59b1939c2db7a5772f225
xorg-x11-server-Xorg-1.1.1-48.107.el5_11.i386.rpm SHA-256: e7890499df2f1a49603ea5baeff7a3d744ac5627cb9e8f87bcb1a5f9c3badb41
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.i386.rpm SHA-256: 41cd10bad339101f80a42743084832498b8eef93f38dcb4cc18a5565a6e6eb0b
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.i386.rpm SHA-256: 2726ea4af9ed2fd6e0861fb0a946f2bf914053637b020de1faefeb255cfd015c
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.i386.rpm SHA-256: bf18b45f6785083d97eae929221eec68cf54424d6397efcbede2232c10f09987
xorg-x11-server-sdk-1.1.1-48.107.el5_11.i386.rpm SHA-256: cb4377ddf63ea7026c5568011fd60c28415dc4be03a652f8da4ac8e4e0d8fc8f

Red Hat Enterprise Linux Workstation 5

SRPM
xorg-x11-server-1.1.1-48.107.el5_11.src.rpm SHA-256: 9a5a2153ae0ecf4516e336b4a2666997268437dce9f5f818ba95d44a8349dad6
x86_64
xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: ea5a3d38affca4a86832c075a9f3ea95a181b60256d27c3e36bc90cac5c17d0f
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: f29462c9f69f0fc2a0d617fe0a705249f8c426ac13a44b167e6a9fc248768962
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 9b89bb549f0a75c90883a50f28cceed80dfc7e7be3e50b09d923a941453a2077
xorg-x11-server-Xorg-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: a0b40a881dca90096482b428d12eca2d956ef20675cd9591a46f0658f22d5db3
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: dc02d9416371de153410d2b507a1ea043b7b2965344c2145434b00b7f165d16d
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: fe20c3ee8ee60d1f9c5ae2da42dbbcb77995a4f7c92e794e6856e5e2dbab763f
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 93d6ca06426ae96ca14aab7853a3637db248f1eafe2a0f62195af390650f1ecc
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 93d6ca06426ae96ca14aab7853a3637db248f1eafe2a0f62195af390650f1ecc
xorg-x11-server-sdk-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 5537cd204c72b1d83143b251ae4fbce13649dad768394ea97ec16ae8f473672a
i386
xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.i386.rpm SHA-256: f281dbe530c48a0668551e61f53c1656def833f4f85da1e9fea1b73e2333aef8
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.i386.rpm SHA-256: 58580a75f41a5f111afd44ba2e6ca16a4fd38886225f55e51cad51a9c704ff5d
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.i386.rpm SHA-256: d961824bc051cc990e12e67032096e269d6a64ce37c59b1939c2db7a5772f225
xorg-x11-server-Xorg-1.1.1-48.107.el5_11.i386.rpm SHA-256: e7890499df2f1a49603ea5baeff7a3d744ac5627cb9e8f87bcb1a5f9c3badb41
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.i386.rpm SHA-256: 41cd10bad339101f80a42743084832498b8eef93f38dcb4cc18a5565a6e6eb0b
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.i386.rpm SHA-256: 2726ea4af9ed2fd6e0861fb0a946f2bf914053637b020de1faefeb255cfd015c
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.i386.rpm SHA-256: bf18b45f6785083d97eae929221eec68cf54424d6397efcbede2232c10f09987
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.i386.rpm SHA-256: bf18b45f6785083d97eae929221eec68cf54424d6397efcbede2232c10f09987
xorg-x11-server-sdk-1.1.1-48.107.el5_11.i386.rpm SHA-256: cb4377ddf63ea7026c5568011fd60c28415dc4be03a652f8da4ac8e4e0d8fc8f

Red Hat Enterprise Linux Desktop 5

SRPM
xorg-x11-server-1.1.1-48.107.el5_11.src.rpm SHA-256: 9a5a2153ae0ecf4516e336b4a2666997268437dce9f5f818ba95d44a8349dad6
x86_64
xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: ea5a3d38affca4a86832c075a9f3ea95a181b60256d27c3e36bc90cac5c17d0f
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: f29462c9f69f0fc2a0d617fe0a705249f8c426ac13a44b167e6a9fc248768962
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 9b89bb549f0a75c90883a50f28cceed80dfc7e7be3e50b09d923a941453a2077
xorg-x11-server-Xorg-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: a0b40a881dca90096482b428d12eca2d956ef20675cd9591a46f0658f22d5db3
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: dc02d9416371de153410d2b507a1ea043b7b2965344c2145434b00b7f165d16d
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: fe20c3ee8ee60d1f9c5ae2da42dbbcb77995a4f7c92e794e6856e5e2dbab763f
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 93d6ca06426ae96ca14aab7853a3637db248f1eafe2a0f62195af390650f1ecc
i386
xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.i386.rpm SHA-256: f281dbe530c48a0668551e61f53c1656def833f4f85da1e9fea1b73e2333aef8
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.i386.rpm SHA-256: 58580a75f41a5f111afd44ba2e6ca16a4fd38886225f55e51cad51a9c704ff5d
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.i386.rpm SHA-256: d961824bc051cc990e12e67032096e269d6a64ce37c59b1939c2db7a5772f225
xorg-x11-server-Xorg-1.1.1-48.107.el5_11.i386.rpm SHA-256: e7890499df2f1a49603ea5baeff7a3d744ac5627cb9e8f87bcb1a5f9c3badb41
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.i386.rpm SHA-256: 41cd10bad339101f80a42743084832498b8eef93f38dcb4cc18a5565a6e6eb0b
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.i386.rpm SHA-256: 2726ea4af9ed2fd6e0861fb0a946f2bf914053637b020de1faefeb255cfd015c
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.i386.rpm SHA-256: bf18b45f6785083d97eae929221eec68cf54424d6397efcbede2232c10f09987

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
xorg-x11-server-1.1.1-48.107.el5_11.src.rpm SHA-256: 9a5a2153ae0ecf4516e336b4a2666997268437dce9f5f818ba95d44a8349dad6
s390x
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.s390x.rpm SHA-256: d973a4959ebf51787ba0cf03faf6718b8825092420b3a9dcfe50931217ab128d
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.s390x.rpm SHA-256: f5b00a68efb093619f3cc157ebb21c032aa946cf274d380aa352a4f288ef2a2f
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.s390x.rpm SHA-256: 76bf65d3a368574172ae1efb33e3631ae20ab7e6eea8650b2e9e1234e05feafa
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.s390x.rpm SHA-256: 823775746c13c694e1296063165cf90c0ee7130636f10c366251f412f38e0932
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.s390x.rpm SHA-256: 774d81843442fd46c0c1d5139e623582e4784d3bfc0fc8d16cd65ec2b5194107

Red Hat Enterprise Linux for Power, big endian 5

SRPM
xorg-x11-server-1.1.1-48.107.el5_11.src.rpm SHA-256: 9a5a2153ae0ecf4516e336b4a2666997268437dce9f5f818ba95d44a8349dad6
ppc
xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.ppc.rpm SHA-256: 0f248942e8ebf318678f2e8c11c71263b566c40f7f494010d9b739982e73fb02
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.ppc.rpm SHA-256: 21b6496d6977ad8366de4a525ac63f18c18774fecbaf1c5e7e0b3b2705987068
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.ppc.rpm SHA-256: 80d079fe170a9a5e303d303db97f6cf056e45a36986ab7ede425662d6b11474e
xorg-x11-server-Xorg-1.1.1-48.107.el5_11.ppc.rpm SHA-256: 2687fdf7c3abd15f04521e3ec321652bead6f63ff1a8a08da12eee5b149e4bb8
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.ppc.rpm SHA-256: f9166570ed801444c32dcfc579ff5d72d9af2ea0b99c72f4dbc66d56212231ca
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.ppc.rpm SHA-256: f0343af4b6a43ee15c8a6a1ef500c0aba3dacffbbf1f74046a051b90e6963b23
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.ppc.rpm SHA-256: c76a499032fb7bcd3e4918574a09fcbc8c1a451232ed5dac0d7706ad6eecdf61
xorg-x11-server-sdk-1.1.1-48.107.el5_11.ppc.rpm SHA-256: c021a3d61db1ff2a2f8c8d3000e1ce038c4a2817d67bc8c80cc3b56d931f63b9

Red Hat Enterprise Linux Server from RHUI 5

SRPM
xorg-x11-server-1.1.1-48.107.el5_11.src.rpm SHA-256: 9a5a2153ae0ecf4516e336b4a2666997268437dce9f5f818ba95d44a8349dad6
x86_64
xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: ea5a3d38affca4a86832c075a9f3ea95a181b60256d27c3e36bc90cac5c17d0f
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: f29462c9f69f0fc2a0d617fe0a705249f8c426ac13a44b167e6a9fc248768962
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 9b89bb549f0a75c90883a50f28cceed80dfc7e7be3e50b09d923a941453a2077
xorg-x11-server-Xorg-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: a0b40a881dca90096482b428d12eca2d956ef20675cd9591a46f0658f22d5db3
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: dc02d9416371de153410d2b507a1ea043b7b2965344c2145434b00b7f165d16d
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: fe20c3ee8ee60d1f9c5ae2da42dbbcb77995a4f7c92e794e6856e5e2dbab763f
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 93d6ca06426ae96ca14aab7853a3637db248f1eafe2a0f62195af390650f1ecc
xorg-x11-server-sdk-1.1.1-48.107.el5_11.x86_64.rpm SHA-256: 5537cd204c72b1d83143b251ae4fbce13649dad768394ea97ec16ae8f473672a
i386
xorg-x11-server-Xdmx-1.1.1-48.107.el5_11.i386.rpm SHA-256: f281dbe530c48a0668551e61f53c1656def833f4f85da1e9fea1b73e2333aef8
xorg-x11-server-Xephyr-1.1.1-48.107.el5_11.i386.rpm SHA-256: 58580a75f41a5f111afd44ba2e6ca16a4fd38886225f55e51cad51a9c704ff5d
xorg-x11-server-Xnest-1.1.1-48.107.el5_11.i386.rpm SHA-256: d961824bc051cc990e12e67032096e269d6a64ce37c59b1939c2db7a5772f225
xorg-x11-server-Xorg-1.1.1-48.107.el5_11.i386.rpm SHA-256: e7890499df2f1a49603ea5baeff7a3d744ac5627cb9e8f87bcb1a5f9c3badb41
xorg-x11-server-Xvfb-1.1.1-48.107.el5_11.i386.rpm SHA-256: 41cd10bad339101f80a42743084832498b8eef93f38dcb4cc18a5565a6e6eb0b
xorg-x11-server-Xvnc-source-1.1.1-48.107.el5_11.i386.rpm SHA-256: 2726ea4af9ed2fd6e0861fb0a946f2bf914053637b020de1faefeb255cfd015c
xorg-x11-server-debuginfo-1.1.1-48.107.el5_11.i386.rpm SHA-256: bf18b45f6785083d97eae929221eec68cf54424d6397efcbede2232c10f09987
xorg-x11-server-sdk-1.1.1-48.107.el5_11.i386.rpm SHA-256: cb4377ddf63ea7026c5568011fd60c28415dc4be03a652f8da4ac8e4e0d8fc8f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility