X.Org is an open source implementation of the X Window System. It provides
basic low-level functionality that full-fledged graphical user interfaces
are designed upon.
Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHM
modules. A malicious authorized client could exploit these issues to cause
a denial of service (crash), or potentially execute arbitrary code with
root privileges on the X.Org server. (CVE-2007-6429)
A memory corruption flaw was found in the X.Org server's XInput extension.
A malicious authorized client could exploit this issue to cause a denial of
service (crash), or potentially execute arbitrary code with root privileges
on the X.Org server. (CVE-2007-6427)
An input validation flaw was found in the X.Org server's XFree86-Misc
extension. A malicious authorized client could exploit this issue to cause
a denial of service (crash), or potentially execute arbitrary code with
root privileges on the X.Org server. (CVE-2007-5760)
An information disclosure flaw was found in the X.Org server's TOG-CUP
extension. A malicious authorized client could exploit this issue to cause
a denial of service (crash), or potentially view arbitrary memory content
within the X server's address space. (CVE-2007-6428)
A flaw was found in the X.Org server's XC-SECURITY extension, that could
have allowed a local user to verify the existence of an arbitrary file,
even in directories that are not normally accessible to that user.
(CVE-2007-5958)
Users of xorg-x11-server should upgrade to these updated packages, which
contain backported patches to resolve these issues.
{"oraclelinux": [{"lastseen": "2019-05-29T18:35:29", "description": " [1.1.1-48.26.4.0.1]\n - Add Enterprise Linux detection\n \n [1.1.1-48.26.4]\n - cve-2007-5760.patch: XFree86-Misc Extension Invalid Array Index \n Vulnerability\n - cve-2007-5958.patch: Xorg / XFree86 file existence disclosure \n vulnerability\n - cve-2007-6427.patch: XInput Extension Memory Corruption Vulnerability\n - cve-2007-6428.patch: TOG-CUP Extension Memory Corruption Vulnerability\n - cve-2007-6429.patch: EVI and MIT-SHM Extension Integer Overflow \n Vulnerability ", "cvss3": {}, "published": "2008-01-17T00:00:00", "type": "oraclelinux", "title": "Important: xorg-x11-server security update ", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2008-01-17T00:00:00", "id": "ELSA-2008-0031", "href": "http://linux.oracle.com/errata/ELSA-2008-0031.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:34:21", "description": " [6.8.2-1.EL.33.0.1.0.1]\n \n - Add Enterprise Linux detection\n - Add XFree86-4.3.0-oracle-bug-report-address-update.patch\n \n [6.8.2-1.EL.33.0.1]\n - cve-2007-4568.patch: XFS Integer Overflow Vulnerability\n - cve-2007-5760.patch: XFree86-Misc Extension Invalid Array Index \n Vulnerability\n - cve-2007-5958.patch: Xorg / XFree86 file existence disclosure \n vulnerability\n - cve-2007-6427.patch: XInput Extension Memory Corruption Vulnerability\n - cve-2007-6428.patch: TOG-CUP Extension Memory Corruption Vulnerability\n - cve-2007-6429.patch: EVI and MIT-SHM Extension Integer Overflow \n Vulnerability\n - cve-2008-0006.patch: libXfont PCF Parser Memory Corruption Vulnerability ", "cvss3": {}, "published": "2008-01-17T00:00:00", "type": "oraclelinux", "title": "Important: xorg-x11 security update ", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2008-01-17T00:00:00", "id": "ELSA-2008-0030", "href": "http://linux.oracle.com/errata/ELSA-2008-0030.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:21", "description": " [4.3.0-125.EL.0.1]\n - Add oracle detection to Imake.\n \n [4.3.0-125.EL]\n - cve-2007-4568.patch: XFS Integer Overflow Vulnerability\n - cve-2007-5958.patch: Xorg / XFree86 file existence disclosure \n vulnerability\n - cve-2007-6427.patch: XInput Extension Memory Corruption Vulnerability\n - cve-2007-6428.patch: TOG-CUP Extension Memory Corruption Vulnerability\n - cve-2007-6429.patch: EVI and MIT-SHM Extension Integer Overflow \n Vulnerability\n - cve-2008-0006.patch: libXfont PCF Parser Memory Corruption Vulnerability ", "cvss3": {}, "published": "2008-01-18T00:00:00", "type": "oraclelinux", "title": "Important: XFree86 security update ", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2008-01-18T00:00:00", "id": "ELSA-2008-0029", "href": "http://linux.oracle.com/errata/ELSA-2008-0029.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:36:45", "description": "Oracle Linux Local Security Checks ELSA-2008-0031", "cvss3": {}, "published": "2015-10-08T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2008-0031", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310122616", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122616", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2008-0031.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122616\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-08 14:49:26 +0300 (Thu, 08 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2008-0031\");\n script_tag(name:\"insight\", value:\"ELSA-2008-0031 - Important: xorg-x11-server security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2008-0031\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2008-0031.html\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6429\", \"CVE-2007-6428\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xdmx\", rpm:\"xorg-x11-server-Xdmx~1.1.1~48.26.el5_1.4.0.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xephyr\", rpm:\"xorg-x11-server-Xephyr~1.1.1~48.26.el5_1.4.0.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xnest\", rpm:\"xorg-x11-server-Xnest~1.1.1~48.26.el5_1.4.0.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xorg\", rpm:\"xorg-x11-server-Xorg~1.1.1~48.26.el5_1.4.0.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xvfb\", rpm:\"xorg-x11-server-Xvfb~1.1.1~48.26.el5_1.4.0.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-sdk\", rpm:\"xorg-x11-server-sdk~1.1.1~48.26.el5_1.4.0.1\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-04-09T11:40:13", "description": "Check for the Version of x11-server-xgl", "cvss3": {}, "published": "2009-04-09T00:00:00", "type": "openvas", "title": "Mandriva Update for x11-server-xgl MDVSA-2008:025 (x11-server-xgl)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310830527", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830527", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for x11-server-xgl MDVSA-2008:025 (x11-server-xgl)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"An input validation flaw was found in the X.org server's XFree86-Misc\n extension that could allow a malicious authorized client to cause\n a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the X.org server (CVE-2007-5760).\n\n A flaw was found in the X.org server's XC-SECURITY extension that\n could allow a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user\n (CVE-2007-5958).\n \n A memory corruption flaw was found in the X.org server's XInput\n extension that could allow a malicious authorized client to cause a\n denial of service (crash) or potentially execute arbitrary code with\n root privileges on the X.org server (CVE-2007-6427).\n \n An information disclosure flaw was found in the X.org server's TOG-CUP\n extension that could allow a malicious authorized client to cause\n a denial of service (crash) or potentially view arbitrary memory\n content within the X.org server's address space (CVE-2007-6428).\n \n Two integer overflow flaws were found in the X.org server's EVI and\n MIT-SHM modules that could allow a malicious authorized client to\n cause a denial of service (crash) or potentially execute arbitrary\n code with the privileges of the X.org server (CVE-2007-6429).\n \n The updated packages have been patched to correct these issues.\";\n\ntag_affected = \"x11-server-xgl on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64,\n Mandriva Linux 2007.1,\n Mandriva Linux 2007.1/X86_64,\n Mandriva Linux 2008.0,\n Mandriva Linux 2008.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2008-01/msg00039.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830527\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 14:26:37 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"MDVSA\", value: \"2008:025\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n script_name( \"Mandriva Update for x11-server-xgl MDVSA-2008:025 (x11-server-xgl)\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of x11-server-xgl\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server-xgl\", rpm:\"x11-server-xgl~0.0.1~0.20070105.4.3mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server-xgl\", rpm:\"x11-server-xgl~0.0.1~0.20060714.11.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2008.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server-xgl\", rpm:\"x11-server-xgl~0.0.1~0.20070917.2.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:40:15", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n XFree86-Xnest\n XFree86-Xvfb\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012483 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "cvss3": {}, "published": "2009-10-10T00:00:00", "type": "openvas", "title": "SLES9: Security update for XFree86-Xnest", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:136141256231065188", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065188", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5012483.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for XFree86-Xnest\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n XFree86-Xnest\n XFree86-Xvfb\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012483 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65188\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2007-5760\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES9: Security update for XFree86-Xnest\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.99.902~43.94\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:56:39", "description": "Check for the Version of xorg-x11-server", "cvss3": {}, "published": "2009-03-06T00:00:00", "type": "openvas", "title": "RedHat Update for xorg-x11-server RHSA-2008:0031-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-07-12T00:00:00", "id": "OPENVAS:870156", "href": "http://plugins.openvas.org/nasl.php?oid=870156", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for xorg-x11-server RHSA-2008:0031-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"X.Org is an open source implementation of the X Window System. It provides\n basic low-level functionality that full-fledged graphical user interfaces\n are designed upon.\n\n Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHM\n modules. A malicious authorized client could exploit these issues to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-6429)\n \n A memory corruption flaw was found in the X.Org server's XInput extension.\n A malicious authorized client could exploit this issue to cause a denial of\n service (crash), or potentially execute arbitrary code with root privileges\n on the X.Org server. (CVE-2007-6427)\n \n An input validation flaw was found in the X.Org server's XFree86-Misc\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-5760)\n \n An information disclosure flaw was found in the X.Org server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the X server's address space. (CVE-2007-6428)\n \n A flaw was found in the X.Org server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of xorg-x11-server should upgrade to these updated packages, which\n contain backported patches to resolve these issues.\";\n\ntag_affected = \"xorg-x11-server on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-January/msg00011.html\");\n script_id(870156);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0031-01\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n script_name( \"RedHat Update for xorg-x11-server RHSA-2008:0031-01\");\n\n script_summary(\"Check for the Version of xorg-x11-server\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xdmx\", rpm:\"xorg-x11-server-Xdmx~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xephyr\", rpm:\"xorg-x11-server-Xephyr~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xnest\", rpm:\"xorg-x11-server-Xnest~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xorg\", rpm:\"xorg-x11-server-Xorg~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xvfb\", rpm:\"xorg-x11-server-Xvfb~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-debuginfo\", rpm:\"xorg-x11-server-debuginfo~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-sdk\", rpm:\"xorg-x11-server-sdk~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-26T08:55:20", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n XFree86-libs\n XFree86-server\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5020914 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "cvss3": {}, "published": "2009-10-10T00:00:00", "type": "openvas", "title": "SLES9: Security update for XFree86-libs", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-07-11T00:00:00", "id": "OPENVAS:65392", "href": "http://plugins.openvas.org/nasl.php?oid=65392", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5020914.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for XFree86-libs\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n XFree86-libs\n XFree86-server\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5020914 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65392);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2007-5760\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES9: Security update for XFree86-libs\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.99.902~43.94\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:40:05", "description": "Check for the Version of x11-server", "cvss3": {}, "published": "2009-04-09T00:00:00", "type": "openvas", "title": "Mandriva Update for x11-server MDVSA-2008:023 (x11-server)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310830381", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830381", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for x11-server MDVSA-2008:023 (x11-server)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"An input validation flaw was found in the X.org server's XFree86-Misc\n extension that could allow a malicious authorized client to cause\n a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the X.org server (CVE-2007-5760).\n\n A flaw was found in the X.org server's XC-SECURITY extension that\n could allow a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user\n (CVE-2007-5958).\n \n A memory corruption flaw was found in the X.org server's XInput\n extension that could allow a malicious authorized client to cause a\n denial of service (crash) or potentially execute arbitrary code with\n root privileges on the X.org server (CVE-2007-6427).\n \n An information disclosure flaw was found in the X.org server's TOG-CUP\n extension that could allow a malicious authorized client to cause\n a denial of service (crash) or potentially view arbitrary memory\n content within the X.org server's address space (CVE-2007-6428).\n \n Two integer overflow flaws were found in the X.org server's EVI and\n MIT-SHM modules that could allow a malicious authorized client to\n cause a denial of service (crash) or potentially execute arbitrary\n code with the privileges of the X.org server (CVE-2007-6429).\n \n The updated packages have been patched to correct these issues.\";\n\ntag_affected = \"x11-server on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64,\n Mandriva Linux 2007.1,\n Mandriva Linux 2007.1/X86_64,\n Mandriva Linux 2008.0,\n Mandriva Linux 2008.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2008-01/msg00042.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830381\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 14:26:37 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"MDVSA\", value: \"2008:023\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n script_name( \"Mandriva Update for x11-server MDVSA-2008:023 (x11-server)\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of x11-server\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server\", rpm:\"x11-server~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-common\", rpm:\"x11-server-common~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-devel\", rpm:\"x11-server-devel~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xati\", rpm:\"x11-server-xati~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xchips\", rpm:\"x11-server-xchips~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xdmx\", rpm:\"x11-server-xdmx~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xephyr\", rpm:\"x11-server-xephyr~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xepson\", rpm:\"x11-server-xepson~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfake\", rpm:\"x11-server-xfake~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfbdev\", rpm:\"x11-server-xfbdev~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xi810\", rpm:\"x11-server-xi810~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmach64\", rpm:\"x11-server-xmach64~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmga\", rpm:\"x11-server-xmga~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xneomagic\", rpm:\"x11-server-xneomagic~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnest\", rpm:\"x11-server-xnest~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnvidia\", rpm:\"x11-server-xnvidia~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xorg\", rpm:\"x11-server-xorg~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xpm2\", rpm:\"x11-server-xpm2~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xprt\", rpm:\"x11-server-xprt~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xr128\", rpm:\"x11-server-xr128~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsdl\", rpm:\"x11-server-xsdl~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsmi\", rpm:\"x11-server-xsmi~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvesa\", rpm:\"x11-server-xvesa~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvfb\", rpm:\"x11-server-xvfb~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvia\", rpm:\"x11-server-xvia~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvnc\", rpm:\"x11-server-xvnc~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server\", rpm:\"x11-server~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-common\", rpm:\"x11-server-common~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-devel\", rpm:\"x11-server-devel~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xati\", rpm:\"x11-server-xati~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xchips\", rpm:\"x11-server-xchips~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xdmx\", rpm:\"x11-server-xdmx~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xephyr\", rpm:\"x11-server-xephyr~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xepson\", rpm:\"x11-server-xepson~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfake\", rpm:\"x11-server-xfake~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfbdev\", rpm:\"x11-server-xfbdev~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xi810\", rpm:\"x11-server-xi810~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmach64\", rpm:\"x11-server-xmach64~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmga\", rpm:\"x11-server-xmga~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xneomagic\", rpm:\"x11-server-xneomagic~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnest\", rpm:\"x11-server-xnest~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnvidia\", rpm:\"x11-server-xnvidia~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xorg\", rpm:\"x11-server-xorg~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xpm2\", rpm:\"x11-server-xpm2~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xprt\", rpm:\"x11-server-xprt~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xr128\", rpm:\"x11-server-xr128~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsdl\", rpm:\"x11-server-xsdl~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsmi\", rpm:\"x11-server-xsmi~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvesa\", rpm:\"x11-server-xvesa~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvfb\", rpm:\"x11-server-xvfb~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvia\", rpm:\"x11-server-xvia~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2008.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server\", rpm:\"x11-server~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-common\", rpm:\"x11-server-common~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-devel\", rpm:\"x11-server-devel~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xati\", rpm:\"x11-server-xati~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xchips\", rpm:\"x11-server-xchips~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xdmx\", rpm:\"x11-server-xdmx~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xephyr\", rpm:\"x11-server-xephyr~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xepson\", rpm:\"x11-server-xepson~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfake\", rpm:\"x11-server-xfake~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfbdev\", rpm:\"x11-server-xfbdev~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xi810\", rpm:\"x11-server-xi810~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmach64\", rpm:\"x11-server-xmach64~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmga\", rpm:\"x11-server-xmga~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xneomagic\", rpm:\"x11-server-xneomagic~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnest\", rpm:\"x11-server-xnest~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnvidia\", rpm:\"x11-server-xnvidia~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xorg\", rpm:\"x11-server-xorg~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xpm2\", rpm:\"x11-server-xpm2~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xr128\", rpm:\"x11-server-xr128~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsdl\", rpm:\"x11-server-xsdl~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsmi\", rpm:\"x11-server-xsmi~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvesa\", rpm:\"x11-server-xvesa~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvfb\", rpm:\"x11-server-xvfb~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvia\", rpm:\"x11-server-xvia~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvnc\", rpm:\"x11-server-xvnc~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:41:16", "description": "Check for the Version of xorg-x11-server", "cvss3": {}, "published": "2009-03-06T00:00:00", "type": "openvas", "title": "RedHat Update for xorg-x11-server RHSA-2008:0031-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310870156", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870156", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for xorg-x11-server RHSA-2008:0031-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"X.Org is an open source implementation of the X Window System. It provides\n basic low-level functionality that full-fledged graphical user interfaces\n are designed upon.\n\n Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHM\n modules. A malicious authorized client could exploit these issues to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-6429)\n \n A memory corruption flaw was found in the X.Org server's XInput extension.\n A malicious authorized client could exploit this issue to cause a denial of\n service (crash), or potentially execute arbitrary code with root privileges\n on the X.Org server. (CVE-2007-6427)\n \n An input validation flaw was found in the X.Org server's XFree86-Misc\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-5760)\n \n An information disclosure flaw was found in the X.Org server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the X server's address space. (CVE-2007-6428)\n \n A flaw was found in the X.Org server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of xorg-x11-server should upgrade to these updated packages, which\n contain backported patches to resolve these issues.\";\n\ntag_affected = \"xorg-x11-server on Red Hat Enterprise Linux (v. 5 server)\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-January/msg00011.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870156\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0031-01\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n script_name( \"RedHat Update for xorg-x11-server RHSA-2008:0031-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of xorg-x11-server\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xdmx\", rpm:\"xorg-x11-server-Xdmx~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xephyr\", rpm:\"xorg-x11-server-Xephyr~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xnest\", rpm:\"xorg-x11-server-Xnest~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xorg\", rpm:\"xorg-x11-server-Xorg~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xvfb\", rpm:\"xorg-x11-server-Xvfb~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-debuginfo\", rpm:\"xorg-x11-server-debuginfo~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-sdk\", rpm:\"xorg-x11-server-sdk~1.1.1~48.26.el5_1.4\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:56:40", "description": "Check for the Version of x11-server-xgl", "cvss3": {}, "published": "2009-04-09T00:00:00", "type": "openvas", "title": "Mandriva Update for x11-server-xgl MDVSA-2008:025 (x11-server-xgl)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-07-06T00:00:00", "id": "OPENVAS:830527", "href": "http://plugins.openvas.org/nasl.php?oid=830527", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for x11-server-xgl MDVSA-2008:025 (x11-server-xgl)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"An input validation flaw was found in the X.org server's XFree86-Misc\n extension that could allow a malicious authorized client to cause\n a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the X.org server (CVE-2007-5760).\n\n A flaw was found in the X.org server's XC-SECURITY extension that\n could allow a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user\n (CVE-2007-5958).\n \n A memory corruption flaw was found in the X.org server's XInput\n extension that could allow a malicious authorized client to cause a\n denial of service (crash) or potentially execute arbitrary code with\n root privileges on the X.org server (CVE-2007-6427).\n \n An information disclosure flaw was found in the X.org server's TOG-CUP\n extension that could allow a malicious authorized client to cause\n a denial of service (crash) or potentially view arbitrary memory\n content within the X.org server's address space (CVE-2007-6428).\n \n Two integer overflow flaws were found in the X.org server's EVI and\n MIT-SHM modules that could allow a malicious authorized client to\n cause a denial of service (crash) or potentially execute arbitrary\n code with the privileges of the X.org server (CVE-2007-6429).\n \n The updated packages have been patched to correct these issues.\";\n\ntag_affected = \"x11-server-xgl on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64,\n Mandriva Linux 2007.1,\n Mandriva Linux 2007.1/X86_64,\n Mandriva Linux 2008.0,\n Mandriva Linux 2008.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2008-01/msg00039.php\");\n script_id(830527);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 14:26:37 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"MDVSA\", value: \"2008:025\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n script_name( \"Mandriva Update for x11-server-xgl MDVSA-2008:025 (x11-server-xgl)\");\n\n script_summary(\"Check for the Version of x11-server-xgl\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server-xgl\", rpm:\"x11-server-xgl~0.0.1~0.20070105.4.3mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server-xgl\", rpm:\"x11-server-xgl~0.0.1~0.20060714.11.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2008.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server-xgl\", rpm:\"x11-server-xgl~0.0.1~0.20070917.2.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:56:37", "description": "Check for the Version of x11-server", "cvss3": {}, "published": "2009-04-09T00:00:00", "type": "openvas", "title": "Mandriva Update for x11-server MDVSA-2008:023 (x11-server)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-07-06T00:00:00", "id": "OPENVAS:830381", "href": "http://plugins.openvas.org/nasl.php?oid=830381", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for x11-server MDVSA-2008:023 (x11-server)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"An input validation flaw was found in the X.org server's XFree86-Misc\n extension that could allow a malicious authorized client to cause\n a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the X.org server (CVE-2007-5760).\n\n A flaw was found in the X.org server's XC-SECURITY extension that\n could allow a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user\n (CVE-2007-5958).\n \n A memory corruption flaw was found in the X.org server's XInput\n extension that could allow a malicious authorized client to cause a\n denial of service (crash) or potentially execute arbitrary code with\n root privileges on the X.org server (CVE-2007-6427).\n \n An information disclosure flaw was found in the X.org server's TOG-CUP\n extension that could allow a malicious authorized client to cause\n a denial of service (crash) or potentially view arbitrary memory\n content within the X.org server's address space (CVE-2007-6428).\n \n Two integer overflow flaws were found in the X.org server's EVI and\n MIT-SHM modules that could allow a malicious authorized client to\n cause a denial of service (crash) or potentially execute arbitrary\n code with the privileges of the X.org server (CVE-2007-6429).\n \n The updated packages have been patched to correct these issues.\";\n\ntag_affected = \"x11-server on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64,\n Mandriva Linux 2007.1,\n Mandriva Linux 2007.1/X86_64,\n Mandriva Linux 2008.0,\n Mandriva Linux 2008.0/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2008-01/msg00042.php\");\n script_id(830381);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 14:26:37 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"MDVSA\", value: \"2008:023\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n script_name( \"Mandriva Update for x11-server MDVSA-2008:023 (x11-server)\");\n\n script_summary(\"Check for the Version of x11-server\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server\", rpm:\"x11-server~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-common\", rpm:\"x11-server-common~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-devel\", rpm:\"x11-server-devel~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xati\", rpm:\"x11-server-xati~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xchips\", rpm:\"x11-server-xchips~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xdmx\", rpm:\"x11-server-xdmx~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xephyr\", rpm:\"x11-server-xephyr~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xepson\", rpm:\"x11-server-xepson~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfake\", rpm:\"x11-server-xfake~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfbdev\", rpm:\"x11-server-xfbdev~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xi810\", rpm:\"x11-server-xi810~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmach64\", rpm:\"x11-server-xmach64~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmga\", rpm:\"x11-server-xmga~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xneomagic\", rpm:\"x11-server-xneomagic~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnest\", rpm:\"x11-server-xnest~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnvidia\", rpm:\"x11-server-xnvidia~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xorg\", rpm:\"x11-server-xorg~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xpm2\", rpm:\"x11-server-xpm2~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xprt\", rpm:\"x11-server-xprt~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xr128\", rpm:\"x11-server-xr128~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsdl\", rpm:\"x11-server-xsdl~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsmi\", rpm:\"x11-server-xsmi~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvesa\", rpm:\"x11-server-xvesa~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvfb\", rpm:\"x11-server-xvfb~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvia\", rpm:\"x11-server-xvia~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvnc\", rpm:\"x11-server-xvnc~1.2.0~9.4mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server\", rpm:\"x11-server~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-common\", rpm:\"x11-server-common~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-devel\", rpm:\"x11-server-devel~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xati\", rpm:\"x11-server-xati~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xchips\", rpm:\"x11-server-xchips~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xdmx\", rpm:\"x11-server-xdmx~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xephyr\", rpm:\"x11-server-xephyr~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xepson\", rpm:\"x11-server-xepson~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfake\", rpm:\"x11-server-xfake~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfbdev\", rpm:\"x11-server-xfbdev~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xi810\", rpm:\"x11-server-xi810~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmach64\", rpm:\"x11-server-xmach64~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmga\", rpm:\"x11-server-xmga~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xneomagic\", rpm:\"x11-server-xneomagic~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnest\", rpm:\"x11-server-xnest~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnvidia\", rpm:\"x11-server-xnvidia~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xorg\", rpm:\"x11-server-xorg~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xpm2\", rpm:\"x11-server-xpm2~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xprt\", rpm:\"x11-server-xprt~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xr128\", rpm:\"x11-server-xr128~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsdl\", rpm:\"x11-server-xsdl~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsmi\", rpm:\"x11-server-xsmi~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvesa\", rpm:\"x11-server-xvesa~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvfb\", rpm:\"x11-server-xvfb~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvia\", rpm:\"x11-server-xvia~1.1.1~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2008.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"x11-server\", rpm:\"x11-server~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-common\", rpm:\"x11-server-common~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-devel\", rpm:\"x11-server-devel~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xati\", rpm:\"x11-server-xati~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xchips\", rpm:\"x11-server-xchips~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xdmx\", rpm:\"x11-server-xdmx~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xephyr\", rpm:\"x11-server-xephyr~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xepson\", rpm:\"x11-server-xepson~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfake\", rpm:\"x11-server-xfake~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xfbdev\", rpm:\"x11-server-xfbdev~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xi810\", rpm:\"x11-server-xi810~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmach64\", rpm:\"x11-server-xmach64~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xmga\", rpm:\"x11-server-xmga~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xneomagic\", rpm:\"x11-server-xneomagic~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnest\", rpm:\"x11-server-xnest~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xnvidia\", rpm:\"x11-server-xnvidia~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xorg\", rpm:\"x11-server-xorg~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xpm2\", rpm:\"x11-server-xpm2~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xr128\", rpm:\"x11-server-xr128~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsdl\", rpm:\"x11-server-xsdl~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xsmi\", rpm:\"x11-server-xsmi~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvesa\", rpm:\"x11-server-xvesa~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvfb\", rpm:\"x11-server-xvfb~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvia\", rpm:\"x11-server-xvia~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x11-server-xvnc\", rpm:\"x11-server-xvnc~1.3.0.0~24.1mdv2008.0\", rls:\"MNDK_2008.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:37:38", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n XFree86-libs\n XFree86-server\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5020914 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "cvss3": {}, "published": "2009-10-10T00:00:00", "type": "openvas", "title": "SLES9: Security update for XFree86-libs", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:136141256231065392", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065392", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5020914.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for XFree86-libs\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n XFree86-libs\n XFree86-server\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5020914 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65392\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2007-5760\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES9: Security update for XFree86-libs\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.99.902~43.94\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-26T08:56:13", "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n XFree86-Xnest\n XFree86-Xvfb\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012483 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "cvss3": {}, "published": "2009-10-10T00:00:00", "type": "openvas", "title": "SLES9: Security update for XFree86-Xnest", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-07-11T00:00:00", "id": "OPENVAS:65188", "href": "http://plugins.openvas.org/nasl.php?oid=65188", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5012483.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for XFree86-Xnest\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n XFree86-Xnest\n XFree86-Xvfb\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5012483 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65188);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2007-5760\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES9: Security update for XFree86-Xnest\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.99.902~43.94\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:48", "description": "The remote host is missing updates announced in\nadvisory GLSA 200801-09.", "cvss3": {}, "published": "2008-09-24T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200801-09 (xorg-server libXfont)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:60221", "href": "http://plugins.openvas.org/nasl.php?oid=60221", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities have been discovered in the X.Org X server and\nXfont library, allowing for a local privilege escalation and arbitrary\ncode execution.\";\ntag_solution = \"All X.Org X server users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-base/xorg-server-1.3.0.0-r4'\n\nAll X.Org Xfont library users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-libs/libXfont-1.3.1-r1'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200801-09\nhttp://bugs.gentoo.org/show_bug.cgi?id=204362\nhttp://lists.freedesktop.org/archives/xorg/2008-January/031918.html\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200801-09.\";\n\n \n\nif(description)\n{\n script_id(60221);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Gentoo Security Advisory GLSA 200801-09 (xorg-server libXfont)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"x11-base/xorg-server\", unaffected: make_list(\"ge 1.3.0.0-r4\"), vulnerable: make_list(\"lt 1.3.0.0-r4\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"x11-libs/libXfont\", unaffected: make_list(\"ge 1.3.1-r1\"), vulnerable: make_list(\"lt 1.3.1-r1\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:50:02", "description": "The remote host is missing an update to xorg-server, libxfont, xfree86\nannounced via advisory DSA 1466-2.", "cvss3": {}, "published": "2008-01-31T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 1466-2 (xorg-server, libxfont, xfree86)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:60210", "href": "http://plugins.openvas.org/nasl.php?oid=60210", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1466_2.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1466-2 (xorg-server, libxfont, xfree86)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The X.org fix for CVE-2007-6429 introduced a regression in the MIT-SHM\nextension, which prevented the start of a few applications. This update\nfixes this problem and also references the patch for CVE-2008-0006,\nwhich was included in the previous update, but not mentioned in the\nadvisory text.\n\nSeveral local vulnerabilities have been discovered in the X.Org X\nserver. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2007-5760\n\nregenrecht discovered that missing input sanitising within\nthe XFree86-Misc extension may lead to local privilege escalation.\n\nCVE-2007-5958\n\nIt was discovered that error messages of security policy file\nhandling may lead to a minor information leak disclosing the\nexistence of files otherwise unaccessible to the user.\n\nCVE-2007-6427\n\nregenrecht discovered that missing input sanitising within\nthe XInput-Misc extension may lead to local privilege escalation.\n\nCVE-2007-6428\n\nregenrecht discovered that missing input sanitising within\nthe TOG-CUP extension may lead to disclosure of memory contents.\n\nCVE-2007-6429\n\nregenrecht discovered that integer overflows in the EVI\nand MIT-SHM extensions may lead to local privilege escalation.\n\nCVE-2008-0006\n\nIt was discovered that insufficient validation of PCF fonts could lead\nto local privilege escalation.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2:1.4.1~git20080118-1 of xorg-server and version 1:1.3.1-2\nof libxfont.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 1.1.1-21etch3 or xorg-server and 1.2.2-2.etch1 of libxfont.\n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 4.3.0.dfsg.1-14sarge6 of xfree86.\n\nWe recommend that you upgrade your libxfont abd xorg-server packages.\";\ntag_summary = \"The remote host is missing an update to xorg-server, libxfont, xfree86\nannounced via advisory DSA 1466-2.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201466-2\";\n\n\nif(description)\n{\n script_id(60210);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-31 16:11:48 +0100 (Thu, 31 Jan 2008)\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Debian Security Advisory DSA 1466-2 (xorg-server, libxfont, xfree86)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"xserver-xorg-core\", ver:\"1.1.1-21etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xserver-xorg-dev\", ver:\"1.1.1-21etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xnest\", ver:\"1.1.1-21etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xvfb\", ver:\"1.1.1-21etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xdmx\", ver:\"1.1.1-21etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xdmx-tools\", ver:\"1.1.1-21etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"xserver-xephyr\", ver:\"1.1.1-21etch3\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:02", "description": "Check for the Version of xorg-x11-server", "cvss3": {}, "published": "2009-02-17T00:00:00", "type": "openvas", "title": "Fedora Update for xorg-x11-server FEDORA-2008-0831", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:860038", "href": "http://plugins.openvas.org/nasl.php?oid=860038", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for xorg-x11-server FEDORA-2008-0831\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"xorg-x11-server on Fedora 7\";\ntag_insight = \"X.Org X11 X server\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00704.html\");\n script_id(860038);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-17 17:12:43 +0100 (Tue, 17 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2008-0831\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"Fedora Update for xorg-x11-server FEDORA-2008-0831\");\n\n script_summary(\"Check for the Version of xorg-x11-server\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC7\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server\", rpm:\"xorg-x11-server~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xorg\", rpm:\"xorg-x11-server-Xorg~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xvfb\", rpm:\"xorg-x11-server-Xvfb~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-source\", rpm:\"xorg-x11-server-source~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-sdk\", rpm:\"xorg-x11-server-sdk~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xephyr\", rpm:\"xorg-x11-server-Xephyr~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xnest\", rpm:\"xorg-x11-server-Xnest~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xdmx\", rpm:\"xorg-x11-server-Xdmx~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-debuginfo\", rpm:\"xorg-x11-server-debuginfo~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-debuginfo\", rpm:\"xorg-x11-server-debuginfo~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-source\", rpm:\"xorg-x11-server-source~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-sdk\", rpm:\"xorg-x11-server-sdk~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xephyr\", rpm:\"xorg-x11-server-Xephyr~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xvfb\", rpm:\"xorg-x11-server-Xvfb~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xdmx\", rpm:\"xorg-x11-server-Xdmx~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xnest\", rpm:\"xorg-x11-server-Xnest~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xorg\", rpm:\"xorg-x11-server-Xorg~1.3.0.0~15.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-12T11:20:36", "description": "Check for the Version of Xorg and XFree", "cvss3": {}, "published": "2009-01-23T00:00:00", "type": "openvas", "title": "SuSE Update for Xorg and XFree SUSE-SA:2008:003", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-12-08T00:00:00", "id": "OPENVAS:850025", "href": "http://plugins.openvas.org/nasl.php?oid=850025", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2008_003.nasl 8050 2017-12-08 09:34:29Z santu $\n#\n# SuSE Update for Xorg and XFree SUSE-SA:2008:003\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The X windows system is vulnerable to several kind of vulner-\n abilities that are caused due to insufficient input validation.\n\n The bugs range from crashing the X server to executing arbitrary\n code with the privilges of the X server process.\n\n For a successful attack the opponent needs shell access to the\n vulnerable system (local) or an already established connection\n to the X server.\n\n Thanks to US CERT and iDefense for reporting this vulnerabilities\n and to the Xorg-Security folks for fixing it.\n\n The Fixes are:\n - CVE-2007-5760: XFree86 Misc extension out of bounds array index\n - CVE-2007-5958: File existence disclosure\n - CVE-2007-6427: Xinput extension memory corruption\n - CVE-2007-6428: TOG-cup extension memory corruption\n - CVE-2007-6429: MIT-SHM and EVI extensions integer overflows\n - CVE-2008-0006: PCF Font parser buffer overflow\";\n\ntag_impact = \"remote code execution\";\ntag_affected = \"Xorg and XFree on SUSE LINUX 10.1, openSUSE 10.2, openSUSE 10.3, SuSE Linux Enterprise Server 8, SUSE SLES 9, Novell Linux Desktop 9, Open Enterprise Server, Novell Linux POS 9, SUSE Linux Enterprise Desktop 10 SP1, SLE SDK 10 SP1, SUSE Linux Enterprise Server 10 SP1\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_id(850025);\n script_version(\"$Revision: 8050 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-08 10:34:29 +0100 (Fri, 08 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-23 16:44:26 +0100 (Fri, 23 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"SUSE-SA\", value: \"2008-003\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"SuSE Update for Xorg and XFree SUSE-SA:2008:003\");\n\n script_summary(\"Check for the Version of Xorg and XFree\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"openSUSE10.3\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel\", rpm:\"xorg-x11-devel~7.2~103.4\", rls:\"openSUSE10.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs\", rpm:\"xorg-x11-libs~7.2~103.4\", rls:\"openSUSE10.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server\", rpm:\"xorg-x11-server~7.2~143.9\", rls:\"openSUSE10.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-extra\", rpm:\"xorg-x11-server-extra~7.2~143.9\", rls:\"openSUSE10.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-sdk\", rpm:\"xorg-x11-server-sdk~7.2~143.9\", rls:\"openSUSE10.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel-32bit\", rpm:\"xorg-x11-devel-32bit~7.2~103.4\", rls:\"openSUSE10.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs-32bit\", rpm:\"xorg-x11-libs-32bit~7.2~103.4\", rls:\"openSUSE10.3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"openSUSE10.2\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel\", rpm:\"xorg-x11-devel~7.2~25\", rls:\"openSUSE10.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs\", rpm:\"xorg-x11-libs~7.2~25\", rls:\"openSUSE10.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server\", rpm:\"xorg-x11-server~7.2~30.11\", rls:\"openSUSE10.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-sdk\", rpm:\"xorg-x11-server-sdk~7.2~30.11\", rls:\"openSUSE10.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel-32bit\", rpm:\"xorg-x11-devel-32bit~7.2~25\", rls:\"openSUSE10.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs-32bit\", rpm:\"xorg-x11-libs-32bit~7.2~25\", rls:\"openSUSE10.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"SLESDK10SP1\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xvfb\", rpm:\"xorg-x11-Xvfb~6.9.0~50.54.5\", rls:\"SLESDK10SP1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xnest\", rpm:\"xorg-x11-Xnest~6.9.0~50.54.5\", rls:\"SLESDK10SP1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"OES\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.99.902~43.94\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.3.99.902~43.94\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.99.902~43.94\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-server\", rpm:\"XFree86-server~4.3.99.902~43.94\", rls:\"OES\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"SLES9\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.99.902~43.94\", rls:\"SLES9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.3.99.902~43.94\", rls:\"SLES9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.99.902~43.94\", rls:\"SLES9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-server\", rpm:\"XFree86-server~4.3.99.902~43.94\", rls:\"SLES9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"NLDk9\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.99.902~43.94\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.3.99.902~43.94\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.99.902~43.94\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-server\", rpm:\"XFree86-server~4.3.99.902~43.94\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"SLESDk10SP1\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xvfb\", rpm:\"xorg-x11-Xvfb~6.9.0~50.54.5\", rls:\"SLESDk10SP1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xnest\", rpm:\"xorg-x11-Xnest~6.9.0~50.54.5\", rls:\"SLESDk10SP1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs-32bit\", rpm:\"xorg-x11-libs-32bit~6.9.0~50.54.5\", rls:\"SLESDk10SP1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs\", rpm:\"xorg-x11-libs~6.9.0~50.54.5\", rls:\"SLESDk10SP1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server\", rpm:\"xorg-x11-server~6.9.0~50.54.5\", rls:\"SLESDk10SP1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"SL10.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xnest\", rpm:\"xorg-x11-Xnest~6.9.0~50.54.5\", rls:\"SL10.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xvfb\", rpm:\"xorg-x11-Xvfb~6.9.0~50.54.5\", rls:\"SL10.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel\", rpm:\"xorg-x11-devel~6.9.0~50.54.5\", rls:\"SL10.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs\", rpm:\"xorg-x11-libs~6.9.0~50.54.5\", rls:\"SL10.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server\", rpm:\"xorg-x11-server~6.9.0~50.54.5\", rls:\"SL10.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"NLPOS9\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.99.902~43.94\", rls:\"NLPOS9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.3.99.902~43.94\", rls:\"NLPOS9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.99.902~43.94\", rls:\"NLPOS9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-server\", rpm:\"XFree86-server~4.3.99.902~43.94\", rls:\"NLPOS9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:25", "description": "Check for the Version of xorg-x11-server", "cvss3": {}, "published": "2009-02-17T00:00:00", "type": "openvas", "title": "Fedora Update for xorg-x11-server FEDORA-2008-0760", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:860368", "href": "http://plugins.openvas.org/nasl.php?oid=860368", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for xorg-x11-server FEDORA-2008-0760\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"xorg-x11-server on Fedora 8\";\ntag_insight = \"X.Org X11 X server\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00641.html\");\n script_id(860368);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-17 17:12:43 +0100 (Tue, 17 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"FEDORA\", value: \"2008-0760\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"Fedora Update for xorg-x11-server FEDORA-2008-0760\");\n\n script_summary(\"Check for the Version of xorg-x11-server\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC8\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server\", rpm:\"xorg-x11-server~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-debuginfo\", rpm:\"xorg-x11-server-debuginfo~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-source\", rpm:\"xorg-x11-server-source~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-sdk\", rpm:\"xorg-x11-server-sdk~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xephyr\", rpm:\"xorg-x11-server-Xephyr~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xvfb\", rpm:\"xorg-x11-server-Xvfb~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xdmx\", rpm:\"xorg-x11-server-Xdmx~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xnest\", rpm:\"xorg-x11-server-Xnest~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xorg\", rpm:\"xorg-x11-server-Xorg~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xvfb\", rpm:\"xorg-x11-server-Xvfb~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xnest\", rpm:\"xorg-x11-server-Xnest~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-debuginfo\", rpm:\"xorg-x11-server-debuginfo~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xorg\", rpm:\"xorg-x11-server-Xorg~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-source\", rpm:\"xorg-x11-server-source~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xdmx\", rpm:\"xorg-x11-server-Xdmx~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-sdk\", rpm:\"xorg-x11-server-sdk~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-server-Xephyr\", rpm:\"xorg-x11-server-Xephyr~1.3.0.0~39.fc8\", rls:\"FC8\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:49:46", "description": "The remote host is missing updates announced in\nadvisory GLSA 200804-05.", "cvss3": {}, "published": "2008-09-24T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200804-05 (nx, nxnode)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:60805", "href": "http://plugins.openvas.org/nasl.php?oid=60805", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"NX uses code from the X.org X11 server which is prone to multiple\nvulnerabilities.\";\ntag_solution = \"All NX Node users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-misc/nxnode-3.1.0-r2'\n\nAll NX users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-misc/nx-3.1.0-r1'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200804-05\nhttp://bugs.gentoo.org/show_bug.cgi?id=210317\nhttp://www.gentoo.org/security/en/glsa/glsa-200801-09.xml\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200804-05.\";\n\n \n\nif(description)\n{\n script_id(60805);\n script_cve_id(\"CVE-2007-5760\",\"CVE-2007-5958\",\"CVE-2007-6427\",\"CVE-2007-6428\",\"CVE-2007-6429\",\"CVE-2008-0006\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_name(\"Gentoo Security Advisory GLSA 200804-05 (nx, nxnode)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"net-misc/nxnode\", unaffected: make_list(\"ge 3.1.0-r2\"), vulnerable: make_list(\"lt 3.1.0-r2\"))) != NULL) {\n report += res;\n}\nif ((res = ispkgvuln(pkg:\"net-misc/nx\", unaffected: make_list(\"ge 3.1.0-r1\"), vulnerable: make_list(\"lt 3.1.0-r1\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:27:48", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-571-2", "cvss3": {}, "published": "2009-03-23T00:00:00", "type": "openvas", "title": "Ubuntu Update for xorg-server regression USN-571-2", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840328", "href": "http://plugins.openvas.org/nasl.php?oid=840328", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_571_2.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for xorg-server regression USN-571-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"USN-571-1 fixed vulnerabilities in X.org. The upstream fixes were\n incomplete, and under certain situations, applications using the MIT-SHM\n extension (e.g. Java, wxWidgets) would crash with BadAlloc X errors.\n This update fixes the problem.\n\n We apologize for the inconvenience.\n \n Original advisory details:\n \n Multiple overflows were discovered in the XFree86-Misc, XInput-Misc,\n TOG-CUP, EVI, and MIT-SHM extensions which did not correctly validate\n function arguments. An authenticated attacker could send specially\n crafted requests and gain root privileges. (CVE-2007-5760, CVE-2007-6427,\n CVE-2007-6428, CVE-2007-6429)\n \n It was discovered that the X.org server did not use user privileges when\n attempting to open security policy files. Local attackers could exploit\n this to probe for files in directories they would not normally be able\n to access. (CVE-2007-5958)\n \n It was discovered that the PCF font handling code did not correctly\n validate the size of fonts. An authenticated attacker could load a\n specially crafted font and gain additional privileges. (CVE-2008-0006)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-571-2\";\ntag_affected = \"xorg-server regression on Ubuntu 6.06 LTS ,\n Ubuntu 6.10 ,\n Ubuntu 7.04 ,\n Ubuntu 7.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-571-2/\");\n script_id(840328);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"571-2\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2007-5958\", \"CVE-2008-0006\");\n script_name( \"Ubuntu Update for xorg-server regression USN-571-2\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU7.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"xnest\", ver:\"1.2.0-3ubuntu8.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-core\", ver:\"1.2.0-3ubuntu8.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-dev\", ver:\"1.2.0-3ubuntu8.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xvfb\", ver:\"1.2.0-3ubuntu8.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx-tools\", ver:\"1.2.0-3ubuntu8.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx\", ver:\"1.2.0-3ubuntu8.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xephyr\", ver:\"1.2.0-3ubuntu8.3\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"xnest\", ver:\"1.0.2-0ubuntu10.10\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-core\", ver:\"1.0.2-0ubuntu10.10\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-dev\", ver:\"1.0.2-0ubuntu10.10\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xvfb\", ver:\"1.0.2-0ubuntu10.10\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx-tools\", ver:\"1.0.2-0ubuntu10.10\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx\", ver:\"1.0.2-0ubuntu10.10\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"xnest\", ver:\"1.1.1-0ubuntu12.5\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-core\", ver:\"1.1.1-0ubuntu12.5\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-dev\", ver:\"1.1.1-0ubuntu12.5\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xvfb\", ver:\"1.1.1-0ubuntu12.5\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx-tools\", ver:\"1.1.1-0ubuntu12.5\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx\", ver:\"1.1.1-0ubuntu12.5\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xephyr\", ver:\"1.1.1-0ubuntu12.5\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU7.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"xnest\", ver:\"1.3.0.0.dfsg-12ubuntu8.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xephyr\", ver:\"1.3.0.0.dfsg-12ubuntu8.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-core-dbg\", ver:\"1.3.0.0.dfsg-12ubuntu8.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-core\", ver:\"1.3.0.0.dfsg-12ubuntu8.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-dev\", ver:\"1.3.0.0.dfsg-12ubuntu8.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xvfb\", ver:\"1.3.0.0.dfsg-12ubuntu8.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx-tools\", ver:\"1.3.0.0.dfsg-12ubuntu8.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx\", ver:\"1.3.0.0.dfsg-12ubuntu8.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xprint\", ver:\"1.3.0.0.dfsg-12ubuntu8.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xprint-common\", ver:\"1.3.0.0.dfsg-12ubuntu8.3\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-04T11:29:48", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-571-1", "cvss3": {}, "published": "2009-03-23T00:00:00", "type": "openvas", "title": "Ubuntu Update for libxfont, xorg-server vulnerabilities USN-571-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840279", "href": "http://plugins.openvas.org/nasl.php?oid=840279", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_571_1.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for libxfont, xorg-server vulnerabilities USN-571-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple overflows were discovered in the XFree86-Misc, XInput-Misc,\n TOG-CUP, EVI, and MIT-SHM extensions which did not correctly validate\n function arguments. An authenticated attacker could send specially\n crafted requests and gain root privileges. (CVE-2007-5760, CVE-2007-6427,\n CVE-2007-6428, CVE-2007-6429)\n\n It was discovered that the X.org server did not use user privileges when\n attempting to open security policy files. Local attackers could exploit\n this to probe for files in directories they would not normally be able\n to access. (CVE-2007-5958)\n \n It was discovered that the PCF font handling code did not correctly\n validate the size of fonts. An authenticated attacker could load a\n specially crafted font and gain additional privileges. (CVE-2008-0006)\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-571-1\";\ntag_affected = \"libxfont, xorg-server vulnerabilities on Ubuntu 6.06 LTS ,\n Ubuntu 6.10 ,\n Ubuntu 7.04 ,\n Ubuntu 7.10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-571-1/\");\n script_id(840279);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"USN\", value: \"571-1\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"Ubuntu Update for libxfont, xorg-server vulnerabilities USN-571-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU7.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libxfont-dev\", ver:\"1.2.7-1ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libxfont1-dbg\", ver:\"1.2.7-1ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libxfont1\", ver:\"1.2.7-1ubuntu1.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xnest\", ver:\"1.2.0-3ubuntu8.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-core\", ver:\"1.2.0-3ubuntu8.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-dev\", ver:\"1.2.0-3ubuntu8.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xvfb\", ver:\"1.2.0-3ubuntu8.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx-tools\", ver:\"1.2.0-3ubuntu8.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx\", ver:\"1.2.0-3ubuntu8.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xephyr\", ver:\"1.2.0-3ubuntu8.1\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libxfont-dev\", ver:\"1.0.0-0ubuntu3.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libxfont1-dbg\", ver:\"1.0.0-0ubuntu3.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libxfont1\", ver:\"1.0.0-0ubuntu3.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xnest\", ver:\"1.0.2-0ubuntu10.8\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-core\", ver:\"1.0.2-0ubuntu10.8\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-dev\", ver:\"1.0.2-0ubuntu10.8\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xvfb\", ver:\"1.0.2-0ubuntu10.8\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx-tools\", ver:\"1.0.2-0ubuntu10.8\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx\", ver:\"1.0.2-0ubuntu10.8\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libxfont-dev\", ver:\"1.2.0-0ubuntu3.2\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libxfont1-dbg\", ver:\"1.2.0-0ubuntu3.2\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libxfont1\", ver:\"1.2.0-0ubuntu3.2\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xnest\", ver:\"1.1.1-0ubuntu12.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-core\", ver:\"1.1.1-0ubuntu12.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-dev\", ver:\"1.1.1-0ubuntu12.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xvfb\", ver:\"1.1.1-0ubuntu12.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx-tools\", ver:\"1.1.1-0ubuntu12.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx\", ver:\"1.1.1-0ubuntu12.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xephyr\", ver:\"1.1.1-0ubuntu12.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU7.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libxfont-dev\", ver:\"1.3.0-0ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libxfont1-dbg\", ver:\"1.3.0-0ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libxfont1\", ver:\"1.3.0-0ubuntu1.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xnest\", ver:\"1.3.0.0.dfsg-12ubuntu8.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xephyr\", ver:\"1.3.0.0.dfsg-12ubuntu8.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-core-dbg\", ver:\"1.3.0.0.dfsg-12ubuntu8.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-core\", ver:\"1.3.0.0.dfsg-12ubuntu8.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xserver-xorg-dev\", ver:\"1.3.0.0.dfsg-12ubuntu8.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xvfb\", ver:\"1.3.0.0.dfsg-12ubuntu8.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx-tools\", ver:\"1.3.0.0.dfsg-12ubuntu8.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xdmx\", ver:\"1.3.0.0.dfsg-12ubuntu8.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xprint\", ver:\"1.3.0.0.dfsg-12ubuntu8.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"xprint-common\", ver:\"1.3.0.0.dfsg-12ubuntu8.1\", rls:\"UBUNTU7.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:10:22", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "cvss3": {}, "published": "2008-09-04T00:00:00", "type": "openvas", "title": "FreeBSD Ports: xorg-server", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-6427"], "modified": "2016-10-05T00:00:00", "id": "OPENVAS:60226", "href": "http://plugins.openvas.org/nasl.php?oid=60226", "sourceData": "#\n#VID fe2b6597-c9a4-11dc-8da8-0008a18a9961\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following packages are affected:\n xorg-server\n libXfont\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://lists.freedesktop.org/archives/xorg/2008-January/031918.html\nhttp://lists.freedesktop.org/archives/xorg/2008-January/032099.html\nhttp://secunia.com/advisories/28532/\nhttp://www.vuxml.org/freebsd/fe2b6597-c9a4-11dc-8da8-0008a18a9961.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(60226);\n script_version(\"$Revision: 4218 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-10-05 16:20:48 +0200 (Wed, 05 Oct 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"FreeBSD Ports: xorg-server\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"xorg-server\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.4_4,1\")<0) {\n txt += 'Package xorg-server version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\nbver = portver(pkg:\"libXfont\");\nif(!isnull(bver) && revcomp(a:bver, b:\"1.3.1_2,1\")<0) {\n txt += 'Package libXfont version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:39:16", "description": "Check for the Version of xorg-x11", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "CentOS Update for xorg-x11 CESA-2008:0030 centos4 x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310880075", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880075", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for xorg-x11 CESA-2008:0030 centos4 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The xorg-x11 packages contain X.Org, an open source implementation of the X\n Window System. It provides the basic low-level functionality that\n full-fledged graphical user interfaces are designed upon.\n\n Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHM\n modules. A malicious authorized client could exploit these issues to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the X.Org server\n handled malformed font files. A malicious local user could exploit these\n issues to potentially execute arbitrary code with the privileges of the\n X.Org server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the X.Org server's XInput extension.\n A malicious authorized client could exploit this issue to cause a denial of\n service (crash), or potentially execute arbitrary code with root privileges\n on the X.Org server. (CVE-2007-6427)\n \n An input validation flaw was found in the X.Org server's XFree86-Misc\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-5760)\n \n An information disclosure flaw was found in the X.Org server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the X server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.Org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the X.Org server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of xorg-x11 should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"xorg-x11 on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-January/014649.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880075\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0030\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"CentOS Update for xorg-x11 CESA-2008:0030 centos4 x86_64\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of xorg-x11\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11\", rpm:\"xorg-x11~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs\", rpm:\"xorg-x11-deprecated-libs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs-devel\", rpm:\"xorg-x11-deprecated-libs-devel~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel\", rpm:\"xorg-x11-devel~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-doc\", rpm:\"xorg-x11-doc~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-font-utils\", rpm:\"xorg-x11-font-utils~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs\", rpm:\"xorg-x11-libs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGL\", rpm:\"xorg-x11-Mesa-libGL~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGLU\", rpm:\"xorg-x11-Mesa-libGLU~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-sdk\", rpm:\"xorg-x11-sdk~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-tools\", rpm:\"xorg-x11-tools~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-twm\", rpm:\"xorg-x11-twm~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xauth\", rpm:\"xorg-x11-xauth~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xdm\", rpm:\"xorg-x11-xdm~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xdmx\", rpm:\"xorg-x11-Xdmx~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xfs\", rpm:\"xorg-x11-xfs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xnest\", rpm:\"xorg-x11-Xnest~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xvfb\", rpm:\"xorg-x11-Xvfb~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:55:47", "description": "Check for the Version of xorg-x11", "cvss3": {}, "published": "2009-03-06T00:00:00", "type": "openvas", "title": "RedHat Update for xorg-x11 RHSA-2008:0030-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2017-07-12T00:00:00", "id": "OPENVAS:870070", "href": "http://plugins.openvas.org/nasl.php?oid=870070", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for xorg-x11 RHSA-2008:0030-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The xorg-x11 packages contain X.Org, an open source implementation of the X\n Window System. It provides the basic low-level functionality that\n full-fledged graphical user interfaces are designed upon.\n\n Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHM\n modules. A malicious authorized client could exploit these issues to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the X.Org server\n handled malformed font files. A malicious local user could exploit these\n issues to potentially execute arbitrary code with the privileges of the\n X.Org server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the X.Org server's XInput extension.\n A malicious authorized client could exploit this issue to cause a denial of\n service (crash), or potentially execute arbitrary code with root privileges\n on the X.Org server. (CVE-2007-6427)\n \n An input validation flaw was found in the X.Org server's XFree86-Misc\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-5760)\n \n An information disclosure flaw was found in the X.Org server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the X server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.Org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the X.Org server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of xorg-x11 should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"xorg-x11 on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-January/msg00010.html\");\n script_id(870070);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0030-01\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"RedHat Update for xorg-x11 RHSA-2008:0030-01\");\n\n script_summary(\"Check for the Version of xorg-x11\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11\", rpm:\"xorg-x11~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGL\", rpm:\"xorg-x11-Mesa-libGL~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGLU\", rpm:\"xorg-x11-Mesa-libGLU~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xdmx\", rpm:\"xorg-x11-Xdmx~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xnest\", rpm:\"xorg-x11-Xnest~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xvfb\", rpm:\"xorg-x11-Xvfb~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs\", rpm:\"xorg-x11-deprecated-libs~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs-devel\", rpm:\"xorg-x11-deprecated-libs-devel~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel\", rpm:\"xorg-x11-devel~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-doc\", rpm:\"xorg-x11-doc~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-font-utils\", rpm:\"xorg-x11-font-utils~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs\", rpm:\"xorg-x11-libs~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-sdk\", rpm:\"xorg-x11-sdk~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-tools\", rpm:\"xorg-x11-tools~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-twm\", rpm:\"xorg-x11-twm~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xauth\", rpm:\"xorg-x11-xauth~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xdm\", rpm:\"xorg-x11-xdm~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xfs\", rpm:\"xorg-x11-xfs~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:25", "description": "Check for the Version of xorg-x11", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "CentOS Update for xorg-x11 CESA-2008:0030 centos4 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:880013", "href": "http://plugins.openvas.org/nasl.php?oid=880013", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for xorg-x11 CESA-2008:0030 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The xorg-x11 packages contain X.Org, an open source implementation of the X\n Window System. It provides the basic low-level functionality that\n full-fledged graphical user interfaces are designed upon.\n\n Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHM\n modules. A malicious authorized client could exploit these issues to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the X.Org server\n handled malformed font files. A malicious local user could exploit these\n issues to potentially execute arbitrary code with the privileges of the\n X.Org server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the X.Org server's XInput extension.\n A malicious authorized client could exploit this issue to cause a denial of\n service (crash), or potentially execute arbitrary code with root privileges\n on the X.Org server. (CVE-2007-6427)\n \n An input validation flaw was found in the X.Org server's XFree86-Misc\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-5760)\n \n An information disclosure flaw was found in the X.Org server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the X server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.Org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the X.Org server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of xorg-x11 should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"xorg-x11 on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-January/014648.html\");\n script_id(880013);\n script_version(\"$Revision: 6651 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:45:21 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0030\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"CentOS Update for xorg-x11 CESA-2008:0030 centos4 i386\");\n\n script_summary(\"Check for the Version of xorg-x11\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11\", rpm:\"xorg-x11~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs\", rpm:\"xorg-x11-deprecated-libs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs-devel\", rpm:\"xorg-x11-deprecated-libs-devel~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel\", rpm:\"xorg-x11-devel~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-doc\", rpm:\"xorg-x11-doc~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-font-utils\", rpm:\"xorg-x11-font-utils~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs\", rpm:\"xorg-x11-libs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGL\", rpm:\"xorg-x11-Mesa-libGL~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGLU\", rpm:\"xorg-x11-Mesa-libGLU~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-sdk\", rpm:\"xorg-x11-sdk~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-tools\", rpm:\"xorg-x11-tools~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-twm\", rpm:\"xorg-x11-twm~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xauth\", rpm:\"xorg-x11-xauth~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xdm\", rpm:\"xorg-x11-xdm~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xdmx\", rpm:\"xorg-x11-Xdmx~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xfs\", rpm:\"xorg-x11-xfs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xnest\", rpm:\"xorg-x11-Xnest~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xvfb\", rpm:\"xorg-x11-Xvfb~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:39:36", "description": "Check for the Version of xorg-x11", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "CentOS Update for xorg-x11 CESA-2008:0030 centos4 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310880013", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880013", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for xorg-x11 CESA-2008:0030 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The xorg-x11 packages contain X.Org, an open source implementation of the X\n Window System. It provides the basic low-level functionality that\n full-fledged graphical user interfaces are designed upon.\n\n Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHM\n modules. A malicious authorized client could exploit these issues to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the X.Org server\n handled malformed font files. A malicious local user could exploit these\n issues to potentially execute arbitrary code with the privileges of the\n X.Org server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the X.Org server's XInput extension.\n A malicious authorized client could exploit this issue to cause a denial of\n service (crash), or potentially execute arbitrary code with root privileges\n on the X.Org server. (CVE-2007-6427)\n \n An input validation flaw was found in the X.Org server's XFree86-Misc\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-5760)\n \n An information disclosure flaw was found in the X.Org server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the X server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.Org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the X.Org server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of xorg-x11 should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"xorg-x11 on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-January/014648.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880013\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0030\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"CentOS Update for xorg-x11 CESA-2008:0030 centos4 i386\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of xorg-x11\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11\", rpm:\"xorg-x11~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs\", rpm:\"xorg-x11-deprecated-libs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs-devel\", rpm:\"xorg-x11-deprecated-libs-devel~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel\", rpm:\"xorg-x11-devel~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-doc\", rpm:\"xorg-x11-doc~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-font-utils\", rpm:\"xorg-x11-font-utils~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs\", rpm:\"xorg-x11-libs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGL\", rpm:\"xorg-x11-Mesa-libGL~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGLU\", rpm:\"xorg-x11-Mesa-libGLU~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-sdk\", rpm:\"xorg-x11-sdk~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-tools\", rpm:\"xorg-x11-tools~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-twm\", rpm:\"xorg-x11-twm~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xauth\", rpm:\"xorg-x11-xauth~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xdm\", rpm:\"xorg-x11-xdm~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xdmx\", rpm:\"xorg-x11-Xdmx~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xfs\", rpm:\"xorg-x11-xfs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xnest\", rpm:\"xorg-x11-Xnest~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xvfb\", rpm:\"xorg-x11-Xvfb~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:38:58", "description": "Check for the Version of xorg-x11", "cvss3": {}, "published": "2009-03-06T00:00:00", "type": "openvas", "title": "RedHat Update for xorg-x11 RHSA-2008:0030-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310870070", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870070", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for xorg-x11 RHSA-2008:0030-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The xorg-x11 packages contain X.Org, an open source implementation of the X\n Window System. It provides the basic low-level functionality that\n full-fledged graphical user interfaces are designed upon.\n\n Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHM\n modules. A malicious authorized client could exploit these issues to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the X.Org server\n handled malformed font files. A malicious local user could exploit these\n issues to potentially execute arbitrary code with the privileges of the\n X.Org server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the X.Org server's XInput extension.\n A malicious authorized client could exploit this issue to cause a denial of\n service (crash), or potentially execute arbitrary code with root privileges\n on the X.Org server. (CVE-2007-6427)\n \n An input validation flaw was found in the X.Org server's XFree86-Misc\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-5760)\n \n An information disclosure flaw was found in the X.Org server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the X server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.Org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the X.Org server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of xorg-x11 should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"xorg-x11 on Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-January/msg00010.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870070\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0030-01\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"RedHat Update for xorg-x11 RHSA-2008:0030-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of xorg-x11\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11\", rpm:\"xorg-x11~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGL\", rpm:\"xorg-x11-Mesa-libGL~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGLU\", rpm:\"xorg-x11-Mesa-libGLU~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xdmx\", rpm:\"xorg-x11-Xdmx~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xnest\", rpm:\"xorg-x11-Xnest~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xvfb\", rpm:\"xorg-x11-Xvfb~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs\", rpm:\"xorg-x11-deprecated-libs~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs-devel\", rpm:\"xorg-x11-deprecated-libs-devel~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel\", rpm:\"xorg-x11-devel~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-doc\", rpm:\"xorg-x11-doc~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-font-utils\", rpm:\"xorg-x11-font-utils~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs\", rpm:\"xorg-x11-libs~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-sdk\", rpm:\"xorg-x11-sdk~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-tools\", rpm:\"xorg-x11-tools~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-twm\", rpm:\"xorg-x11-twm~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xauth\", rpm:\"xorg-x11-xauth~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xdm\", rpm:\"xorg-x11-xdm~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xfs\", rpm:\"xorg-x11-xfs~6.8.2~1.EL.33.0.1\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:18", "description": "Check for the Version of xorg-x11", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "CentOS Update for xorg-x11 CESA-2008:0030 centos4 x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-5760", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:880075", "href": "http://plugins.openvas.org/nasl.php?oid=880075", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for xorg-x11 CESA-2008:0030 centos4 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The xorg-x11 packages contain X.Org, an open source implementation of the X\n Window System. It provides the basic low-level functionality that\n full-fledged graphical user interfaces are designed upon.\n\n Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHM\n modules. A malicious authorized client could exploit these issues to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the X.Org server\n handled malformed font files. A malicious local user could exploit these\n issues to potentially execute arbitrary code with the privileges of the\n X.Org server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the X.Org server's XInput extension.\n A malicious authorized client could exploit this issue to cause a denial of\n service (crash), or potentially execute arbitrary code with root privileges\n on the X.Org server. (CVE-2007-6427)\n \n An input validation flaw was found in the X.Org server's XFree86-Misc\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the X.Org server. (CVE-2007-5760)\n \n An information disclosure flaw was found in the X.Org server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the X server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.Org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the X.Org server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of xorg-x11 should upgrade to these updated packages, which contain\n backported patches to resolve these issues.\";\n\ntag_affected = \"xorg-x11 on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-January/014649.html\");\n script_id(880075);\n script_version(\"$Revision: 6651 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:45:21 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0030\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"CentOS Update for xorg-x11 CESA-2008:0030 centos4 x86_64\");\n\n script_summary(\"Check for the Version of xorg-x11\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"xorg-x11\", rpm:\"xorg-x11~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs\", rpm:\"xorg-x11-deprecated-libs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-deprecated-libs-devel\", rpm:\"xorg-x11-deprecated-libs-devel~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-devel\", rpm:\"xorg-x11-devel~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-doc\", rpm:\"xorg-x11-doc~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-font-utils\", rpm:\"xorg-x11-font-utils~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-libs\", rpm:\"xorg-x11-libs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGL\", rpm:\"xorg-x11-Mesa-libGL~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Mesa-libGLU\", rpm:\"xorg-x11-Mesa-libGLU~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-sdk\", rpm:\"xorg-x11-sdk~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-tools\", rpm:\"xorg-x11-tools~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-twm\", rpm:\"xorg-x11-twm~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xauth\", rpm:\"xorg-x11-xauth~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xdm\", rpm:\"xorg-x11-xdm~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xdmx\", rpm:\"xorg-x11-Xdmx~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-xfs\", rpm:\"xorg-x11-xfs~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xnest\", rpm:\"xorg-x11-Xnest~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"xorg-x11-Xvfb\", rpm:\"xorg-x11-Xvfb~6.8.2~1.EL.33.0.2\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:55:47", "description": "Check for the Version of XFree86", "cvss3": {}, "published": "2009-03-06T00:00:00", "type": "openvas", "title": "RedHat Update for XFree86 RHSA-2008:0029-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2017-07-12T00:00:00", "id": "OPENVAS:870005", "href": "http://plugins.openvas.org/nasl.php?oid=870005", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for XFree86 RHSA-2008:0029-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XFree86 is an implementation of the X Window System, which provides the\n core functionality for the Linux graphical desktop.\n\n Two integer overflow flaws were found in the XFree86 server's EVI and\n MIT-SHM modules. A malicious authorized client could exploit these issues\n to cause a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the XFree86 server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the XFree86 server\n handled malformed font files. A malicious local user could exploit this\n issue to potentially execute arbitrary code with the privileges of the\n XFree86 server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the XFree86 server's XInput\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the XFree86 server. (CVE-2007-6427)\n \n An information disclosure flaw was found in the XFree86 server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the XFree86 server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the XFree86 server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of XFree86 are advised to upgrade to these updated packages, which\n contain backported patches to resolve these issues.\";\n\ntag_affected = \"XFree86 on Red Hat Enterprise Linux AS (Advanced Server) version 2.1,\n Red Hat Enterprise Linux ES version 2.1,\n Red Hat Enterprise Linux WS version 2.1,\n Red Hat Enterprise Linux AS version 3,\n Red Hat Enterprise Linux ES version 3,\n Red Hat Enterprise Linux WS version 3\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-January/msg00013.html\");\n script_id(870005);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0029-01\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"RedHat Update for XFree86 RHSA-2008:0029-01\");\n\n script_summary(\"Check for the Version of XFree86\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_2.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-100dpi-fonts\", rpm:\"XFree86-100dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86\", rpm:\"XFree86~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-75dpi-fonts\", rpm:\"XFree86-75dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-100dpi-fonts\", rpm:\"XFree86-ISO8859-15-100dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-75dpi-fonts\", rpm:\"XFree86-ISO8859-15-75dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-100dpi-fonts\", rpm:\"XFree86-ISO8859-2-100dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-75dpi-fonts\", rpm:\"XFree86-ISO8859-2-75dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-100dpi-fonts\", rpm:\"XFree86-ISO8859-9-100dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-75dpi-fonts\", rpm:\"XFree86-ISO8859-9-75dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-cyrillic-fonts\", rpm:\"XFree86-cyrillic-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-devel\", rpm:\"XFree86-devel~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-doc\", rpm:\"XFree86-doc~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-tools\", rpm:\"XFree86-tools~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-twm\", rpm:\"XFree86-twm~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xdm\", rpm:\"XFree86-xdm~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xf86cfg\", rpm:\"XFree86-xf86cfg~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xfs\", rpm:\"XFree86-xfs~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_3\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-100dpi-fonts\", rpm:\"XFree86-100dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86\", rpm:\"XFree86~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-75dpi-fonts\", rpm:\"XFree86-75dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-100dpi-fonts\", rpm:\"XFree86-ISO8859-14-100dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-75dpi-fonts\", rpm:\"XFree86-ISO8859-14-75dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-100dpi-fonts\", rpm:\"XFree86-ISO8859-15-100dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-75dpi-fonts\", rpm:\"XFree86-ISO8859-15-75dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-100dpi-fonts\", rpm:\"XFree86-ISO8859-2-100dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-75dpi-fonts\", rpm:\"XFree86-ISO8859-2-75dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-100dpi-fonts\", rpm:\"XFree86-ISO8859-9-100dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-75dpi-fonts\", rpm:\"XFree86-ISO8859-9-75dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGL\", rpm:\"XFree86-Mesa-libGL~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGLU\", rpm:\"XFree86-Mesa-libGLU~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-base-fonts\", rpm:\"XFree86-base-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-cyrillic-fonts\", rpm:\"XFree86-cyrillic-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-devel\", rpm:\"XFree86-devel~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-doc\", rpm:\"XFree86-doc~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-font-utils\", rpm:\"XFree86-font-utils~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs-data\", rpm:\"XFree86-libs-data~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-sdk\", rpm:\"XFree86-sdk~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-syriac-fonts\", rpm:\"XFree86-syriac-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-tools\", rpm:\"XFree86-tools~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-truetype-fonts\", rpm:\"XFree86-truetype-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-twm\", rpm:\"XFree86-twm~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xauth\", rpm:\"XFree86-xauth~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xdm\", rpm:\"XFree86-xdm~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xfs\", rpm:\"XFree86-xfs~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:39:50", "description": "Check for the Version of XFree86", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "CentOS Update for XFree86 CESA-2008:0029-01 centos2 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310880063", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880063", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for XFree86 CESA-2008:0029-01 centos2 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XFree86 is an implementation of the X Window System, which provides the\n core functionality for the Linux graphical desktop.\n\n Two integer overflow flaws were found in the XFree86 server's EVI and\n MIT-SHM modules. A malicious authorized client could exploit these issues\n to cause a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the XFree86 server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the XFree86 server\n handled malformed font files. A malicious local user could exploit this\n issue to potentially execute arbitrary code with the privileges of the\n XFree86 server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the XFree86 server's XInput\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the XFree86 server. (CVE-2007-6427)\n \n An information disclosure flaw was found in the XFree86 server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the XFree86 server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the XFree86 server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of XFree86 are advised to upgrade to these updated packages, which\n contain backported patches to resolve these issues.\";\n\ntag_affected = \"XFree86 on CentOS 2\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-January/014630.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880063\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0029-01\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"CentOS Update for XFree86 CESA-2008:0029-01 centos2 i386\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of XFree86\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS2\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-100dpi-fonts\", rpm:\"XFree86-100dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86\", rpm:\"XFree86~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-75dpi-fonts\", rpm:\"XFree86-75dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-cyrillic-fonts\", rpm:\"XFree86-cyrillic-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-devel\", rpm:\"XFree86-devel~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-doc\", rpm:\"XFree86-doc~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-100dpi-fonts\", rpm:\"XFree86-ISO8859-15-100dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-75dpi-fonts\", rpm:\"XFree86-ISO8859-15-75dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-100dpi-fonts\", rpm:\"XFree86-ISO8859-2-100dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-75dpi-fonts\", rpm:\"XFree86-ISO8859-2-75dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-100dpi-fonts\", rpm:\"XFree86-ISO8859-9-100dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-75dpi-fonts\", rpm:\"XFree86-ISO8859-9-75dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-tools\", rpm:\"XFree86-tools~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-twm\", rpm:\"XFree86-twm~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xdm\", rpm:\"XFree86-xdm~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xf86cfg\", rpm:\"XFree86-xf86cfg~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xfs\", rpm:\"XFree86-xfs~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:56", "description": "Check for the Version of XFree86-100dpi-fonts", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:880113", "href": "http://plugins.openvas.org/nasl.php?oid=880113", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XFree86 is an implementation of the X Window System, which provides the\n core functionality for the Linux graphical desktop.\n\n Two integer overflow flaws were found in the XFree86 server's EVI and\n MIT-SHM modules. A malicious authorized client could exploit these issues\n to cause a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the XFree86 server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the XFree86 server\n handled malformed font files. A malicious local user could exploit this\n issue to potentially execute arbitrary code with the privileges of the\n XFree86 server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the XFree86 server's XInput\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the XFree86 server. (CVE-2007-6427)\n \n An information disclosure flaw was found in the XFree86 server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the XFree86 server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the XFree86 server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of XFree86 are advised to upgrade to these updated packages, which\n contain backported patches to resolve these issues.\";\n\ntag_affected = \"XFree86-100dpi-fonts on CentOS 3\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-January/014618.html\");\n script_id(880113);\n script_version(\"$Revision: 6651 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:45:21 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0029\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 i386\");\n\n script_summary(\"Check for the Version of XFree86-100dpi-fonts\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS3\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-100dpi-fonts\", rpm:\"XFree86-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86\", rpm:\"XFree86~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-75dpi-fonts\", rpm:\"XFree86-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-base-fonts\", rpm:\"XFree86-base-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-cyrillic-fonts\", rpm:\"XFree86-cyrillic-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-devel\", rpm:\"XFree86-devel~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-doc\", rpm:\"XFree86-doc~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-font-utils\", rpm:\"XFree86-font-utils~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-100dpi-fonts\", rpm:\"XFree86-ISO8859-14-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-75dpi-fonts\", rpm:\"XFree86-ISO8859-14-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-100dpi-fonts\", rpm:\"XFree86-ISO8859-15-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-75dpi-fonts\", rpm:\"XFree86-ISO8859-15-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-100dpi-fonts\", rpm:\"XFree86-ISO8859-2-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-75dpi-fonts\", rpm:\"XFree86-ISO8859-2-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-100dpi-fonts\", rpm:\"XFree86-ISO8859-9-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-75dpi-fonts\", rpm:\"XFree86-ISO8859-9-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs-data\", rpm:\"XFree86-libs-data~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGL\", rpm:\"XFree86-Mesa-libGL~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGLU\", rpm:\"XFree86-Mesa-libGLU~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-sdk\", rpm:\"XFree86-sdk~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-syriac-fonts\", rpm:\"XFree86-syriac-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-tools\", rpm:\"XFree86-tools~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-truetype-fonts\", rpm:\"XFree86-truetype-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-twm\", rpm:\"XFree86-twm~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xauth\", rpm:\"XFree86-xauth~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xdm\", rpm:\"XFree86-xdm~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xfs\", rpm:\"XFree86-xfs~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:39:33", "description": "Check for the Version of XFree86-100dpi-fonts", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310880198", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880198", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XFree86 is an implementation of the X Window System, which provides the\n core functionality for the Linux graphical desktop.\n\n Two integer overflow flaws were found in the XFree86 server's EVI and\n MIT-SHM modules. A malicious authorized client could exploit these issues\n to cause a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the XFree86 server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the XFree86 server\n handled malformed font files. A malicious local user could exploit this\n issue to potentially execute arbitrary code with the privileges of the\n XFree86 server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the XFree86 server's XInput\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the XFree86 server. (CVE-2007-6427)\n \n An information disclosure flaw was found in the XFree86 server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the XFree86 server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the XFree86 server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of XFree86 are advised to upgrade to these updated packages, which\n contain backported patches to resolve these issues.\";\n\ntag_affected = \"XFree86-100dpi-fonts on CentOS 3\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-January/014619.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880198\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0029\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 x86_64\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of XFree86-100dpi-fonts\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS3\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-100dpi-fonts\", rpm:\"XFree86-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86\", rpm:\"XFree86~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-75dpi-fonts\", rpm:\"XFree86-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-base-fonts\", rpm:\"XFree86-base-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-cyrillic-fonts\", rpm:\"XFree86-cyrillic-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-devel\", rpm:\"XFree86-devel~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-doc\", rpm:\"XFree86-doc~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-font-utils\", rpm:\"XFree86-font-utils~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-100dpi-fonts\", rpm:\"XFree86-ISO8859-14-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-75dpi-fonts\", rpm:\"XFree86-ISO8859-14-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-100dpi-fonts\", rpm:\"XFree86-ISO8859-15-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-75dpi-fonts\", rpm:\"XFree86-ISO8859-15-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-100dpi-fonts\", rpm:\"XFree86-ISO8859-2-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-75dpi-fonts\", rpm:\"XFree86-ISO8859-2-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-100dpi-fonts\", rpm:\"XFree86-ISO8859-9-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-75dpi-fonts\", rpm:\"XFree86-ISO8859-9-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs-data\", rpm:\"XFree86-libs-data~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGL\", rpm:\"XFree86-Mesa-libGL~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGLU\", rpm:\"XFree86-Mesa-libGLU~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-sdk\", rpm:\"XFree86-sdk~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-syriac-fonts\", rpm:\"XFree86-syriac-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-tools\", rpm:\"XFree86-tools~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-truetype-fonts\", rpm:\"XFree86-truetype-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-twm\", rpm:\"XFree86-twm~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xauth\", rpm:\"XFree86-xauth~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xdm\", rpm:\"XFree86-xdm~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xfs\", rpm:\"XFree86-xfs~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:38:58", "description": "Check for the Version of XFree86", "cvss3": {}, "published": "2009-03-06T00:00:00", "type": "openvas", "title": "RedHat Update for XFree86 RHSA-2008:0029-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310870005", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870005", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for XFree86 RHSA-2008:0029-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XFree86 is an implementation of the X Window System, which provides the\n core functionality for the Linux graphical desktop.\n\n Two integer overflow flaws were found in the XFree86 server's EVI and\n MIT-SHM modules. A malicious authorized client could exploit these issues\n to cause a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the XFree86 server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the XFree86 server\n handled malformed font files. A malicious local user could exploit this\n issue to potentially execute arbitrary code with the privileges of the\n XFree86 server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the XFree86 server's XInput\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the XFree86 server. (CVE-2007-6427)\n \n An information disclosure flaw was found in the XFree86 server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the XFree86 server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the XFree86 server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of XFree86 are advised to upgrade to these updated packages, which\n contain backported patches to resolve these issues.\";\n\ntag_affected = \"XFree86 on Red Hat Enterprise Linux AS (Advanced Server) version 2.1,\n Red Hat Enterprise Linux ES version 2.1,\n Red Hat Enterprise Linux WS version 2.1,\n Red Hat Enterprise Linux AS version 3,\n Red Hat Enterprise Linux ES version 3,\n Red Hat Enterprise Linux WS version 3\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2008-January/msg00013.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870005\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-06 07:30:35 +0100 (Fri, 06 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"RHSA\", value: \"2008:0029-01\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"RedHat Update for XFree86 RHSA-2008:0029-01\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of XFree86\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_2.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-100dpi-fonts\", rpm:\"XFree86-100dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86\", rpm:\"XFree86~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-75dpi-fonts\", rpm:\"XFree86-75dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-100dpi-fonts\", rpm:\"XFree86-ISO8859-15-100dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-75dpi-fonts\", rpm:\"XFree86-ISO8859-15-75dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-100dpi-fonts\", rpm:\"XFree86-ISO8859-2-100dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-75dpi-fonts\", rpm:\"XFree86-ISO8859-2-75dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-100dpi-fonts\", rpm:\"XFree86-ISO8859-9-100dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-75dpi-fonts\", rpm:\"XFree86-ISO8859-9-75dpi-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-cyrillic-fonts\", rpm:\"XFree86-cyrillic-fonts~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-devel\", rpm:\"XFree86-devel~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-doc\", rpm:\"XFree86-doc~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-tools\", rpm:\"XFree86-tools~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-twm\", rpm:\"XFree86-twm~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xdm\", rpm:\"XFree86-xdm~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xf86cfg\", rpm:\"XFree86-xf86cfg~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xfs\", rpm:\"XFree86-xfs~4.1.0~85.EL\", rls:\"RHENT_2.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_3\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-100dpi-fonts\", rpm:\"XFree86-100dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86\", rpm:\"XFree86~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-75dpi-fonts\", rpm:\"XFree86-75dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-100dpi-fonts\", rpm:\"XFree86-ISO8859-14-100dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-75dpi-fonts\", rpm:\"XFree86-ISO8859-14-75dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-100dpi-fonts\", rpm:\"XFree86-ISO8859-15-100dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-75dpi-fonts\", rpm:\"XFree86-ISO8859-15-75dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-100dpi-fonts\", rpm:\"XFree86-ISO8859-2-100dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-75dpi-fonts\", rpm:\"XFree86-ISO8859-2-75dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-100dpi-fonts\", rpm:\"XFree86-ISO8859-9-100dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-75dpi-fonts\", rpm:\"XFree86-ISO8859-9-75dpi-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGL\", rpm:\"XFree86-Mesa-libGL~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGLU\", rpm:\"XFree86-Mesa-libGLU~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-base-fonts\", rpm:\"XFree86-base-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-cyrillic-fonts\", rpm:\"XFree86-cyrillic-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-devel\", rpm:\"XFree86-devel~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-doc\", rpm:\"XFree86-doc~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-font-utils\", rpm:\"XFree86-font-utils~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs-data\", rpm:\"XFree86-libs-data~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-sdk\", rpm:\"XFree86-sdk~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-syriac-fonts\", rpm:\"XFree86-syriac-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-tools\", rpm:\"XFree86-tools~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-truetype-fonts\", rpm:\"XFree86-truetype-fonts~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-twm\", rpm:\"XFree86-twm~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xauth\", rpm:\"XFree86-xauth~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xdm\", rpm:\"XFree86-xdm~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xfs\", rpm:\"XFree86-xfs~4.3.0~125.EL\", rls:\"RHENT_3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:41:00", "description": "Check for the Version of XFree86-100dpi-fonts", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310880113", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310880113", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XFree86 is an implementation of the X Window System, which provides the\n core functionality for the Linux graphical desktop.\n\n Two integer overflow flaws were found in the XFree86 server's EVI and\n MIT-SHM modules. A malicious authorized client could exploit these issues\n to cause a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the XFree86 server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the XFree86 server\n handled malformed font files. A malicious local user could exploit this\n issue to potentially execute arbitrary code with the privileges of the\n XFree86 server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the XFree86 server's XInput\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the XFree86 server. (CVE-2007-6427)\n \n An information disclosure flaw was found in the XFree86 server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the XFree86 server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the XFree86 server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of XFree86 are advised to upgrade to these updated packages, which\n contain backported patches to resolve these issues.\";\n\ntag_affected = \"XFree86-100dpi-fonts on CentOS 3\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-January/014618.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.880113\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0029\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 i386\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of XFree86-100dpi-fonts\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS3\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-100dpi-fonts\", rpm:\"XFree86-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86\", rpm:\"XFree86~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-75dpi-fonts\", rpm:\"XFree86-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-base-fonts\", rpm:\"XFree86-base-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-cyrillic-fonts\", rpm:\"XFree86-cyrillic-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-devel\", rpm:\"XFree86-devel~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-doc\", rpm:\"XFree86-doc~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-font-utils\", rpm:\"XFree86-font-utils~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-100dpi-fonts\", rpm:\"XFree86-ISO8859-14-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-75dpi-fonts\", rpm:\"XFree86-ISO8859-14-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-100dpi-fonts\", rpm:\"XFree86-ISO8859-15-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-75dpi-fonts\", rpm:\"XFree86-ISO8859-15-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-100dpi-fonts\", rpm:\"XFree86-ISO8859-2-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-75dpi-fonts\", rpm:\"XFree86-ISO8859-2-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-100dpi-fonts\", rpm:\"XFree86-ISO8859-9-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-75dpi-fonts\", rpm:\"XFree86-ISO8859-9-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs-data\", rpm:\"XFree86-libs-data~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGL\", rpm:\"XFree86-Mesa-libGL~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGLU\", rpm:\"XFree86-Mesa-libGLU~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-sdk\", rpm:\"XFree86-sdk~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-syriac-fonts\", rpm:\"XFree86-syriac-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-tools\", rpm:\"XFree86-tools~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-truetype-fonts\", rpm:\"XFree86-truetype-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-twm\", rpm:\"XFree86-twm~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xauth\", rpm:\"XFree86-xauth~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xdm\", rpm:\"XFree86-xdm~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xfs\", rpm:\"XFree86-xfs~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:30", "description": "Check for the Version of XFree86", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "CentOS Update for XFree86 CESA-2008:0029-01 centos2 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:880063", "href": "http://plugins.openvas.org/nasl.php?oid=880063", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for XFree86 CESA-2008:0029-01 centos2 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XFree86 is an implementation of the X Window System, which provides the\n core functionality for the Linux graphical desktop.\n\n Two integer overflow flaws were found in the XFree86 server's EVI and\n MIT-SHM modules. A malicious authorized client could exploit these issues\n to cause a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the XFree86 server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the XFree86 server\n handled malformed font files. A malicious local user could exploit this\n issue to potentially execute arbitrary code with the privileges of the\n XFree86 server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the XFree86 server's XInput\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the XFree86 server. (CVE-2007-6427)\n \n An information disclosure flaw was found in the XFree86 server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the XFree86 server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the XFree86 server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of XFree86 are advised to upgrade to these updated packages, which\n contain backported patches to resolve these issues.\";\n\ntag_affected = \"XFree86 on CentOS 2\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-January/014630.html\");\n script_id(880063);\n script_version(\"$Revision: 6651 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:45:21 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0029-01\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"CentOS Update for XFree86 CESA-2008:0029-01 centos2 i386\");\n\n script_summary(\"Check for the Version of XFree86\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS2\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-100dpi-fonts\", rpm:\"XFree86-100dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86\", rpm:\"XFree86~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-75dpi-fonts\", rpm:\"XFree86-75dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-cyrillic-fonts\", rpm:\"XFree86-cyrillic-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-devel\", rpm:\"XFree86-devel~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-doc\", rpm:\"XFree86-doc~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-100dpi-fonts\", rpm:\"XFree86-ISO8859-15-100dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-75dpi-fonts\", rpm:\"XFree86-ISO8859-15-75dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-100dpi-fonts\", rpm:\"XFree86-ISO8859-2-100dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-75dpi-fonts\", rpm:\"XFree86-ISO8859-2-75dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-100dpi-fonts\", rpm:\"XFree86-ISO8859-9-100dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-75dpi-fonts\", rpm:\"XFree86-ISO8859-9-75dpi-fonts~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-tools\", rpm:\"XFree86-tools~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-twm\", rpm:\"XFree86-twm~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xdm\", rpm:\"XFree86-xdm~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xf86cfg\", rpm:\"XFree86-xf86cfg~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xfs\", rpm:\"XFree86-xfs~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.1.0~86.EL\", rls:\"CentOS2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-25T10:56:24", "description": "Check for the Version of XFree86-100dpi-fonts", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2007-6428", "CVE-2007-4990", "CVE-2007-6427", "CVE-2007-4568"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:880198", "href": "http://plugins.openvas.org/nasl.php?oid=880198", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"XFree86 is an implementation of the X Window System, which provides the\n core functionality for the Linux graphical desktop.\n\n Two integer overflow flaws were found in the XFree86 server's EVI and\n MIT-SHM modules. A malicious authorized client could exploit these issues\n to cause a denial of service (crash), or potentially execute arbitrary code\n with root privileges on the XFree86 server. (CVE-2007-6429)\n \n A heap based buffer overflow flaw was found in the way the XFree86 server\n handled malformed font files. A malicious local user could exploit this\n issue to potentially execute arbitrary code with the privileges of the\n XFree86 server. (CVE-2008-0006)\n \n A memory corruption flaw was found in the XFree86 server's XInput\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially execute arbitrary code with\n root privileges on the XFree86 server. (CVE-2007-6427)\n \n An information disclosure flaw was found in the XFree86 server's TOG-CUP\n extension. A malicious authorized client could exploit this issue to cause\n a denial of service (crash), or potentially view arbitrary memory content\n within the XFree86 server's address space. (CVE-2007-6428)\n \n An integer and heap overflow flaw were found in the X.org font server, xfs.\n A user with the ability to connect to the font server could have been able\n to cause a denial of service (crash), or potentially execute arbitrary code\n with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990)\n \n A flaw was found in the XFree86 server's XC-SECURITY extension, that could\n have allowed a local user to verify the existence of an arbitrary file,\n even in directories that are not normally accessible to that user.\n (CVE-2007-5958)\n \n Users of XFree86 are advised to upgrade to these updated packages, which\n contain backported patches to resolve these issues.\";\n\ntag_affected = \"XFree86-100dpi-fonts on CentOS 3\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2008-January/014619.html\");\n script_id(880198);\n script_version(\"$Revision: 6651 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:45:21 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 09:02:20 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2008:0029\");\n script_cve_id(\"CVE-2007-4568\", \"CVE-2007-4990\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_name( \"CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 x86_64\");\n\n script_summary(\"Check for the Version of XFree86-100dpi-fonts\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS3\")\n{\n\n if ((res = isrpmvuln(pkg:\"XFree86-100dpi-fonts\", rpm:\"XFree86-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86\", rpm:\"XFree86~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-75dpi-fonts\", rpm:\"XFree86-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-base-fonts\", rpm:\"XFree86-base-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-cyrillic-fonts\", rpm:\"XFree86-cyrillic-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-devel\", rpm:\"XFree86-devel~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-doc\", rpm:\"XFree86-doc~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-font-utils\", rpm:\"XFree86-font-utils~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-100dpi-fonts\", rpm:\"XFree86-ISO8859-14-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-14-75dpi-fonts\", rpm:\"XFree86-ISO8859-14-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-100dpi-fonts\", rpm:\"XFree86-ISO8859-15-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-15-75dpi-fonts\", rpm:\"XFree86-ISO8859-15-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-100dpi-fonts\", rpm:\"XFree86-ISO8859-2-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-2-75dpi-fonts\", rpm:\"XFree86-ISO8859-2-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-100dpi-fonts\", rpm:\"XFree86-ISO8859-9-100dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-ISO8859-9-75dpi-fonts\", rpm:\"XFree86-ISO8859-9-75dpi-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs\", rpm:\"XFree86-libs~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-libs-data\", rpm:\"XFree86-libs-data~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGL\", rpm:\"XFree86-Mesa-libGL~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Mesa-libGLU\", rpm:\"XFree86-Mesa-libGLU~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-sdk\", rpm:\"XFree86-sdk~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-syriac-fonts\", rpm:\"XFree86-syriac-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-tools\", rpm:\"XFree86-tools~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-truetype-fonts\", rpm:\"XFree86-truetype-fonts~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-twm\", rpm:\"XFree86-twm~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xauth\", rpm:\"XFree86-xauth~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xdm\", rpm:\"XFree86-xdm~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-xfs\", rpm:\"XFree86-xfs~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xnest\", rpm:\"XFree86-Xnest~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"XFree86-Xvfb\", rpm:\"XFree86-Xvfb~4.3.0~125.EL\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-09T11:38:25", "description": "Check for the Version of Xserver", "cvss3": {}, "published": "2009-05-05T00:00:00", "type": "openvas", "title": "HP-UX Update for Xserver HPSBUX02381", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2008-1379", "CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2008-1377", "CVE-2007-6427"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310835183", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310835183", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# HP-UX Update for Xserver HPSBUX02381\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009, 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_impact = \"Remote execution of arbitrary code\";\ntag_affected = \"Xserver on\n HP-UX B.11.11, B.11.23, B.11.31 running Xserver\";\ntag_insight = \"Potential security vulnerabilities have been identified with HP-UX running \n Xserver. The vulnerabilities could be exploited remotely to execute \n arbitrary code.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01543321-1\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.835183\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"HPSBUX\", value: \"02381\");\n script_cve_id(\"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6429\", \"CVE-2008-0006\", \"CVE-2008-1377\", \"CVE-2008-1379\");\n script_name( \"HP-UX Update for Xserver HPSBUX02381\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of Xserver\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2009, 2011 Greenbone Networks GmbH\");\n script_family(\"HP-UX Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/hp_hp-ux\", \"ssh/login/release\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-hpux.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"HPUX11.31\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Xserver.X11-SERV\", patch_list:['PHSS_38840'], rls:\"HPUX11.31\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"HPUX11.23\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Xserver.X11-SERV\", patch_list:['PHSS_37972'], rls:\"HPUX11.23\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"HPUX11.11\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Xserver.X11-SERV\", patch_list:['PHSS_34392'], rls:\"HPUX11.11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:56:00", "description": "Check for the Version of Xserver", "cvss3": {}, "published": "2009-05-05T00:00:00", "type": "openvas", "title": "HP-UX Update for Xserver HPSBUX02381", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2008-1379", "CVE-2007-5958", "CVE-2007-6429", "CVE-2008-0006", "CVE-2008-1377", "CVE-2007-6427"], "modified": "2017-07-06T00:00:00", "id": "OPENVAS:835183", "href": "http://plugins.openvas.org/nasl.php?oid=835183", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# HP-UX Update for Xserver HPSBUX02381\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009, 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_impact = \"Remote execution of arbitrary code\";\ntag_affected = \"Xserver on\n HP-UX B.11.11, B.11.23, B.11.31 running Xserver\";\ntag_insight = \"Potential security vulnerabilities have been identified with HP-UX running \n Xserver. The vulnerabilities could be exploited remotely to execute \n arbitrary code.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01543321-1\");\n script_id(835183);\n script_version(\"$Revision: 6584 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 16:13:23 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-05-05 12:14:23 +0200 (Tue, 05 May 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"HPSBUX\", value: \"02381\");\n script_cve_id(\"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6429\", \"CVE-2008-0006\", \"CVE-2008-1377\", \"CVE-2008-1379\");\n script_name( \"HP-UX Update for Xserver HPSBUX02381\");\n\n script_summary(\"Check for the Version of Xserver\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2009, 2011 Greenbone Networks GmbH\");\n script_family(\"HP-UX Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/hp_hp-ux\", \"ssh/login/release\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-hpux.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"HPUX11.31\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Xserver.X11-SERV\", patch_list:['PHSS_38840'], rls:\"HPUX11.31\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"HPUX11.23\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Xserver.X11-SERV\", patch_list:['PHSS_37972'], rls:\"HPUX11.23\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"HPUX11.11\")\n{\n\n if ((res = ishpuxpkgvuln(pkg:\"Xserver.X11-SERV\", patch_list:['PHSS_34392'], rls:\"HPUX11.11\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:50:18", "description": "The remote host is missing updates announced in\nadvisory GLSA 200805-07.", "cvss3": {}, "published": "2008-09-24T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200805-07 (ltsp)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2006-3738", "CVE-2007-4995", "CVE-2007-5958", "CVE-2007-1667", "CVE-2007-4730", "CVE-2007-3108", "CVE-2007-1351", "CVE-2007-6429", "CVE-2007-2754", "CVE-2008-0006", "CVE-2007-5269", "CVE-2007-6428", "CVE-2007-5135", "CVE-2007-5268", "CVE-2007-5760", "CVE-2007-5266", "CVE-2007-2445", "CVE-2007-6427"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:61041", "href": "http://plugins.openvas.org/nasl.php?oid=61041", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities have been discovered in components shipped with\nLTSP which allow remote attackers to compromise terminal clients.\";\ntag_solution = \"LTSP 4.2 is not maintained upstream in favor of version 5. Since version 5\nis not yet available in Gentoo, the package has been masked. We recommend\nthat users unmerge LTSP:\n\n # emerge --unmerge net-misc/ltsp\n\nIf you have a requirement for Linux Terminal Servers, please either set up\na terminal server by hand or use one of the distributions that already\nmigrated to LTSP 5. If you want to contribute to the integration of LTSP 5\nin Gentoo, or want to follow its development, find details in bug 177580.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200805-07\nhttp://bugs.gentoo.org/show_bug.cgi?id=215699\nhttp://www.gentoo.org/security/en/glsa/glsa-200705-02.xml\nhttp://www.gentoo.org/security/en/glsa/glsa-200705-06.xml\nhttp://www.gentoo.org/security/en/glsa/glsa-200705-22.xml\nhttp://www.gentoo.org/security/en/glsa/glsa-200705-24.xml\nhttp://www.gentoo.org/security/en/glsa/glsa-200710-06.xml\nhttp://www.gentoo.org/security/en/glsa/glsa-200710-16.xml\nhttp://www.gentoo.org/security/en/glsa/glsa-200710-30.xml\nhttp://www.gentoo.org/security/en/glsa/glsa-200711-08.xml\nhttp://www.gentoo.org/security/en/glsa/glsa-200801-09.xml\nhttps://bugs.gentoo.org/177580\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200805-07.\";\n\n \n\nif(description)\n{\n script_id(61041);\n script_cve_id(\"CVE-2006-3738\",\"CVE-2007-1351\",\"CVE-2007-1667\",\"CVE-2007-2445\",\"CVE-2007-2754\",\"CVE-2007-3108\",\"CVE-2007-4730\",\"CVE-2007-4995\",\"CVE-2007-5135\",\"CVE-2007-5266\",\"CVE-2007-5268\",\"CVE-2007-5269\",\"CVE-2007-5760\",\"CVE-2007-5958\",\"CVE-2007-6427\",\"CVE-2007-6428\",\"CVE-2007-6429\",\"CVE-2008-0006\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_name(\"Gentoo Security Advisory GLSA 200805-07 (ltsp)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"net-misc/ltsp\", unaffected: make_list(), vulnerable: make_list(\"lt 5.0\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "debian": [{"lastseen": "2023-05-02T17:21:18", "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1466-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nJanuary 17, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : xorg-server, libxfont, xfree86\nVulnerability : several\nProblem type : local\nDebian-specific: no\nCVE Id(s) : CVE-2007-5760 CVE-2007-5958 CVE-2007-6427 CVE-2007-6428 CVE-2007-6429 \n\nSeveral local vulnerabilities have been discovered in the X.Org X\nserver. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2007-5760\n\n "regenrecht" discovered that missing input sanitising within\n the XFree86-Misc extension may lead to local privilege escalation.\n\nCVE-2007-5958\n\n It was discovered that error messages of security policy file\n handling may lead to a minor information leak disclosing the\n existance of files otherwise unaccessible to the user.\n\nCVE-2007-6427\n\n "regenrecht" discovered that missing input sanitising within\n the XInput-Misc extension may lead to local privilege escalation.\n\nCVE-2007-6428\n\n "regenrecht" discovered that missing input sanitising within\n the TOG-CUP extension may lead to disclosure of memory contents.\n\nCVE-2007-6429\n\n "regenrecht" discovered that integer overflows in the EVI\n and MIT-SHM extensions may lead to local privilege escalation.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2:1.4.1~git20080105-2 of xorg-server and version 1:1.3.1-2\nof libxfont.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 1.1.1-21etch2 or xorg-server and 1.2.2-2.etch1 of libxfont.\n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 4.3.0.dfsg.1-14sarge6 of xfree86.\n\nWe recommend that you upgrade your libxfont abd xorg-server packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian 3.1 (oldstable)\n- ----------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/x/xfree86/xfree86_4.3.0.dfsg.1-14sarge6.diff.gz\n Size/MD5 checksum: 3704067 b679c2b8259208bebfc85d9e7e4ebd27\n http://security.debian.org/pool/updates/main/x/xfree86/xfree86_4.3.0.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 59123696 8e6990288c8f1a1d1e03f7c36d7185ee\n http://security.debian.org/pool/updates/main/x/xfree86/xfree86_4.3.0.dfsg.1-14sarge6.dsc\n Size/MD5 checksum: 2642 1e8a3fcaa1f77022201ab8118b880c81\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 159048 75947ee71283a1983ce250f59ce46575\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-base-transcoded_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 1204156 f1639fb7e69dc13dbc2505c0f5489241\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-scalable_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 901298 d9751c8d4a8800e75f59403efbaa6739\n http://security.debian.org/pool/updates/main/x/xfree86/pm-dev_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 159754 3a22ba17bf64e1a6ad04c642414989eb\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-cyrillic_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 541542 fe79c0e2d27eff769252081e9b16f749\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-data_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 907238 433e7efb0c7a9d616d71ad13d7d02c70\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-base_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 5490948 1d83706ae8d515c006afd4ded114b48f\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3-dbg_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 158912 1526a5608ac9219097dfbb514bc44438\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-pic_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 158874 86ce48140db418ed12d1311014bdb682\n http://security.debian.org/pool/updates/main/x/xfree86/xfree86-common_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 815908 f8df1e951ba0e03c4547882b383d97ab\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-75dpi_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 3841206 fa8f67aa1008ecd124a1a11ca8702d06\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-75dpi-transcoded_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 7073312 9a1a228f3107289bbaf00498f7310e95\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dev_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 158966 e6fe8e8512a239ecce202fe31f88e9c7\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-100dpi_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 4363428 ed79be1a2bad65f0f604ff07c6c5e537\n http://security.debian.org/pool/updates/main/x/xfree86/xspecs_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 5835606 0efce8dbea269b497d42f454db330a8c\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dbg_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 158960 ca6fb9354fa4ffca3c7acf392808100d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 427058 17c1f69f648f0c4b68fabd66e785dc58\n http://security.debian.org/pool/updates/main/x/xfree86/x-dev_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 216792 310acc2c06c7e64f5cf516f5611bec2f\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-100dpi-transcoded_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 8196490 77301933b09282b1176653e0e6f14376\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dev_4.3.0.dfsg.1-14sarge6_all.deb\n Size/MD5 checksum: 158898 1934a60228b2d7910efd175fe557c539\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 206498 d92d7757e849a1edd88971ac6a5c6e2b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 4559206 b3d3e891d564a33e213ecb06e9be4ac8\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 285248 fc0bf5755b259660f48d28e8cccf4465\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 2376668 a31752712aa83fd1fb7d3b90eb17a119\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 185196 59a194554930152141f5e784689ab7fa\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 327454 08da64ce223de0c0ac7787181d125740\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 576394 99a9aa9976c5b7da3416bcbec36f8526\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 412240 811a59aa19837f52dc068c38a11ced13\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 33948402 e9809cfbe777b52f58d4d2ab86449476\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 393374 2a51da5c202d9c6eb05030295b5284eb\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 680416 95d459e4586d3f5494ee33d2fb84c031\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 523090 b8cdc3f42cbab12683f3f7895851db4f\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 188168 7b86786e3a2510388015094845ff0b05\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 165016 35049edb7a074ebffacd3962a208ca8a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 1150896 c56c778ea50df0f23de1b8ec36490876\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 6597196 116ae1313de006692dacee5ba2609ec4\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 210422 7a38033d5e9f0b903b2b60853e715e4f\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 172890 01f118f956895cc5ce8c253b3cdacf5d\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 203396 bfcb8e9e65a0316bbb4c780d8a6e39a2\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 196730 57a32bfb07db9854b97d7803dbfe1757\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 1007404 f33d7a57882aed918e2dae064c1c01a9\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 204816 919a41c2f140b766ac375ca651bea0fe\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 241106 b0098f8f0d939bb7ad2abdddcf17c8f1\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 523180 d0e6f976f0698d928e38814944e85f2a\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 1587370 a03b461b506abd1ac1454910d5230910\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 178248 055bd7a7ac6c6d345af7dc5ad989fbbe\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 9805316 8fabd125c2081e6e6ac2b3de3582d2b0\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 313698 f1acd0973fcfa561e1c78cdd1e2706b5\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 1100898 6f1b6023854b54ec18fc05b8e76f6eaf\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 254092 28ba1bd8feaeb63cc505c50ba860601d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 490290 398f38e0f3a95975a1a8b60f2284a9a0\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 816910 21af6e7475b5dce622f524062002d47f\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 176762 fa8071afb8745490bafe43ea20f872a5\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 383002 64809a5a5d9ba734b682a9c23036bd3a\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 601112 bbc11c070d1b0d2dcfb93767e201a127\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 173204 e4cca9e35bcfd8fc24e5cc8d1783652e\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 183362 082e0e51324d616fd06dec6b19d74b5f\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 159004 467b5a3943839705554c452ea62d1438\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 1183078 ab84689be133a69a9ac959568ee7ca26\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 2272294 e95739eb8900f349283aadb91e1a5cc2\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 289886 2867c342e15d5161db37ff6b48cd4f81\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 174706 9615f6958e8867e7dd7485d02588f080\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 194004 4da587afc0bab9b70b3a58e163dc2810\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 1339752 90c983facf0f4e9a045d1a2c1a8f0f4d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 4641194 ad0f4f8eb324f91f14cf0a8c0ff1a4c5\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 245274 ca88f897a1b4aa27c364c1026ab605f2\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 522658 e5b2c7eceff644a2bbf49ca24ce5bd47\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 185286 f6fd48184b740eb59d42c2e4f2eeb287\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 351486 ef22c8adf6e6245db8dc62650a27564f\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 1114868 89cdcbf88dfbf82a7a389ac43e19a4c5\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 159052 2999d3c77f8ea24d9f29b5089a5466ec\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 441420 c4d1175f40974cd9148e7ca0161774aa\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 45042236 e2686df24f4c41fac42905d1dbf50bf5\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 537746 82fa04c5208b1c9e26669f2fc867dbaa\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 934384 462112cc4d20c98cbf470343e8505683\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 210276 4c082c7b733bc042535689090f62227d\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 184736 35b128c2a5f48801f6792a9292fa0750\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 811868 bb042a4b270d82046c137728bedeede3\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 158798 54c473dce4a2f7fc99b1558f659b40f5\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 361500 b57c91a0a09a64f213a1b6bbda67e102\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 192050 44cfa0362870a0623132ff26db23ddbd\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 247242 4a7fd08c17991d5593b5f2ccaa2aca83\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 186562 e6ca1fa3b39d252add88665517ac10f1\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 332012 e727ff6f70dde85c2f99eed7e312e87d\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 230856 31c29f3cb3d7718ca6636210ad246de7\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 1034468 2568a94c2b8739d335bb0bb7aec5cf12\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 816354 9d5fcaa6ee8df5be413ef0765d0d2f5c\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 2089744 4d01c64582570a93d7a09efc7ac60225\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 241778 4bb5c627640798a67b9bd2c5841c87a0\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 1576564 df01687536d447a60dbe1be4bc690b6c\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 210186 c82b9190cd6cad15215875852c08a577\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 220004 4edbee904f43930cebbcfdceb3285cb1\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 713494 b373dfe17901594e8d2f1d7be461dccf\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 550336 533886f26c0029aa71334e12e6506b97\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 173706 8fcd5ebf96768300a3049580a9224a0d\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 184746 75bbdda61ce5f4181b6a564c7c7a97ba\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 265432 9ea5c548e4ebcb9ba63ddfcc9a9a5d6b\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 822480 b489259e74b0cb1fd2b1fd6727572d7b\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 481324 50ec19c82c84194a39b70b177d9ba939\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 195958 03c35e4fd014fe0ecc819ece8b4ce7cc\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 317960 c57b6f2e26fef7994865f8e36059cd3f\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 184514 130a81a120901e892335124724c565f8\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 212418 70e2bddb80959c8872ee5c1b7409fb63\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_alpha.deb\n Size/MD5 checksum: 295810 d6cf9150285a34eaaf94e0136eba6172\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 1552428 0fb7630d42b191e70afcc33f47086098\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 1317234 c7dffd194e75ca8eae12794817cced14\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 521860 1bd85156eda10070acd975d7a11e903f\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 9651662 e98e601a72497dfc682d34c25b80e445\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 789472 6f44ee44014eeba6552193eda9b35571\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 159160 f2b66622ab34c63679c55f423340e05a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 158908 3e655923cc6b2eb4361acccf03cac46b\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 237966 0f2169f123ba8c0aade3a0483a3f6d32\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 476808 084d35424d0f518f62171b941d654d92\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 251732 478d01ab2b7970b4f5ce37e7e3c46150\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 180810 31abc7513851ec0751116aeb1373fe60\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 299610 401b97ad5f1546b018ef18fa02af45ed\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 333886 9ce78f33eee053dcb114e9d8a15043f6\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 904092 2a3d035888c22231605bb5a33ff0e7eb\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 368654 83241f3dd1bd20207f38d12ae77b3ced\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 798420 9ebe5ca5bb71b556787dc23ed977374e\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 183984 faa94003146a4f5965b3b939187fbf4d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 400606 51e3d04d4adcb0b80c15032fd0c67928\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 337460 fb945fdf9e3d48ad81cccd8c8db83f01\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 175756 a362cb8f1781c83770c542d39778faba\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 233382 ecdaf0ff8c7fedea5652561f49e13c6d\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 289296 4442dfc5efcc7a75fc581a03a63c9e9a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 460808 5d864ebfa24c521e80a1c2407fad8a19\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 210172 b91d025bcf29835565f7aa8b3ff2da56\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 569784 76f7b4e854d6fa24993cd7887c96e083\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 163768 8b9cd100e173ff7afd61d7d4e8562fda\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 159108 53359ed314d3e407bdeb580ed6fa2db4\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 193264 217a624c04a05bd2d85a2a54381b07ff\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 440944 f0a0d3218cb327e205d22e4dc44ee391\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 201622 9391b38d6d6b4547e8344cf75ccae52d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 686926 e6efcc0430f86c541a15eaadc45fc07f\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 247806 efd15567fdf283e7d5343c44092c24c4\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 172304 24dc2c03464273a849a540d0ffb3c213\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 209256 cb381fb5980a10bb8cc2d2def5c7f788\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 735560 43388b0977456de0e6f5e119c4e306e0\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 181906 709992100e26fd103612b209a3b67b98\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 890030 eff3dd56cb64e681bdc3af08d1462a1b\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 1621214 cf424bf70fb40a5eb17b04e1074c0ed5\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 178716 0213c89e647d0ae1f659379c55cb7b1b\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 197640 3bd863cad32d1c171a573ad620cfbfb5\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 172416 3337ab0f77338d51bd4b49306a8cefe6\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 749750 51dbc507f797aedbaabcba84b10c7301\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 182846 ed89a40b7e7ca731fada4c6d5f6a2479\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 295496 65e957d8cd4328003e303bc53f6c1723\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 182730 c7e28cf8877975764a30b504d07a5ce4\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 236690 48a4f0ec4fc5b8431bbbc551a593641e\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 173862 276c7cfb1b56df3394d9ba173fd6a342\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 1123014 43f69f5346a79bd566af80c17177a4db\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 318550 26ff7f4961c0f191760b9d91d3285434\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 512934 a1f61e9edd3bbb5dfe7bff737d545f9f\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 1044788 0d577b3cc056170a247dd02d842c2333\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 205710 9fbba79e2fce1de9fd3263b244ff6edd\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 516936 5ec1985ad01f21b462b2bf62678f5738\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 962690 02d50db907f30c1ed79d0c4d8bbb351a\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 172428 8fbc3b6285c23d70a39443d0ac4d88ca\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 441046 054183571bbbac776b2b6781a7c28faf\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 172248 73acc85f5fafd78e8390eb59ea10ada6\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 6039494 11f999b93e4d80b1d1f4d694e0431376\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 180828 87154dbe6c2609df3e951fb8d15ea2eb\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 1764774 26594cdfb19295779bb7ef65b64ace4e\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 1421930 0023e572d9733174f505bf33eeae66e0\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 187522 3126aaf77a1d312b25422123ebcf0409\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 367562 d963f20cb8f44df09fd4b9a7e98480dc\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 644510 8527f9f2de307f68cc02aa238c73cd81\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 5696606 ba9049be3efe93cc8d33cf76d68a7a01\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 413470 c92cf918a147d8571c0ac14aa68060ae\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 4203228 6aa08bfcc0e14395c2ff57a82740ef7d\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 198256 ca702f6f4ec486ecddf17555415c7036\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 208128 17255c9c0dac66471d632fbbca9b7530\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 226336 0c1d611d47e740d2af659b145c52423e\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 191478 57258d7eb532243bf64e2c9eae70ac37\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 346380 d91546ee6120b3486b740fb2a7f6f435\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 191994 58d5c6947265c5a073d72614886b2341\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 351208 79f4e0b3f9670f6365bd79ecfa3a914c\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 277700 56311aafc6cd611d56b5a02a6eba4d36\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 212614 907a5d69574e41d587d51ae953c56ad4\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 38019058 f5df291821ab8db93eac74a2c3ba87e8\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 183766 57b090168b1a6a0465edb967d80e3649\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 4490304 bc395201bec262a7ae6a044e04074172\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 663172 11314620651b4f5a485ab952d97e3f42\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 1168626 dc701f299edf0d029faa544e910328c8\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 2084248 1cc06df7b8d8458489c886dd8542c0fc\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 204774 c4d153536719bfe085546659537c0555\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_amd64.deb\n Size/MD5 checksum: 262630 e8baedc476475d49c1db2ed67f24c08d\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 158792 0f02f39da70eca10e4d2954ab14c24ee\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 209236 a1730821586ddb0639f7d26c0e1bc05b\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 204542 2ae4e1397e84475d7e85c8bc892e3d0f\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 412010 44c11070cf4002a8417c83c2062e0eb6\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 180116 daafa80ee3d8fac6d428ad8d3710ecd9\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 201134 d10fb998ae0fe21086fffb8d4dd5963d\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 255248 18497ca838a47085523fe8d8556fc84f\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 205208 e4229ff22a350ee90a2371778c9086fe\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 471552 bac552f1ea2a7fa8bdbb982961a3ad4b\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 500270 21d8e847357393360212e187d1573e6c\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 285834 8f1fb4415cfbb060231cd34d42208c26\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 226512 c57c670aeabcd599dbbbfca8be763295\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 181130 eef185f3c2ab02fb859f3fd40250b434\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 276262 5c97d2b704d6ea24b8576a11cfdf2543\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 284292 d89a0621ab99afb8cd3eaaf70950718e\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 1558118 0a32570ddf76b4e49630b2349de9f245\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 732082 24e8960d96d549fafec477e7a0d8e937\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 1098874 3ea0f00e30d27bab405365bdd78d2469\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 189152 02bf3c4e1f547843e023bf5c2d3e1bf6\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 648612 8d4daaa7dee4fa4cbc2937007b4a693e\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 337778 5064b1e94bcb34f2653bd11634af5ef8\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 180916 922d5f43532808348eeb9fdeaa308604\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 189320 688b6eda498b7773cacd2069b25b900c\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 779790 baf8bca4b8ce909743f40bf6b7b36e04\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 5534356 a6e9da397a0cf9aa7aafade26c8d6a20\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 281352 92c35756991e7f34729c7c493a84657d\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 9662722 66971cfb90319cbf76bf5b5ad2241471\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 224544 f77f1d4351bc2d45d2cf96efc1b0e7a5\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 1953286 0ba5096fb85161f4a481b077c9220b06\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 234036 d237cc3760b289bce6bd410b9e986240\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 895580 d7345aac9ae11e3db156976a3994db31\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 163586 e4d9fffe4fe0f4e011c9cbacc1da8f05\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 440522 a86a885b16c71fec38061fece18e2e5b\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 173158 154087f1106bc6047e98c1ad8be4a0ce\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 192170 7cb9b083f6f11862c7e638fa39f7f6a4\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 178392 3f2f922d85e4b2b7d01696c319ef66a2\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 1192004 b0e1f9b44d0b7e0335f2580e725d4e44\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 171972 d7cc6646b15b909619a14c6216626c60\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 1700618 f4988f8220dea6f6a3ef081e4111618e\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 178848 24b994d977a4436cc3163f520ba8a19c\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 310668 1f004d684125c3ec9c6ad9b261053dae\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 173990 1a648aa91a0e525680651538eca4eb55\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 158994 e4e487dd317ac3de25cd8d616c960896\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 353318 51764475df51f63c8be96b92b7566784\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 186580 28e27bcda05924a0249bf871cf12d0a3\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 665240 8ff89a9412d3f6a25a16ed27dda26a87\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 201756 0fb10e5773676302bdcd73a72fc02f51\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 914030 91328e507f032ae735a9773ffb18c564\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 274122 1926c797dd9985974597f89c20e292ad\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 1420862 df41dbc981cf7d4489302d0360a1306a\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 194726 1016536dc9abef431f74451aca040501\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 1172724 59cbf0b898ef30c5ae0a0ab92795449b\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 709940 08b1d798dfd5f03a57ab54567a804cd7\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 1030044 190294b09525830f3ab472af2897476e\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 181960 17ad84470965d14fd4f9e40639d6359f\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 359530 9f5f5f932426910dc7b14a020323b871\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 198862 78c7c9d9fbb1c4d0ef7e8e13c3e927d8\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 327978 9f3c8a3f30ff02717fbd2e9a66ee6816\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 1540006 0c13e5544df60e6554b90335dd7805be\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 245206 c14b3b1f7be4c7f188b19d1b031956ed\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 172568 21f6b9cb8554f75e2e79c2f0d2d87524\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 208564 99ea0aab97bec2eee3895ee0e526845a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 914642 305e4acc25cf8eb56bd2d07a88f32fdb\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 335756 71a49f1d58b2adf7237b3b3df64170ad\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 43865200 8fe54f550473db730f9278e39125b9ef\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 175152 897a98405c9c2f56f0558cccdc30130a\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 569458 c6d177c1bf9be86e301acebc6bb42b17\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 459348 243f6b38ffef0093200b4f80d1218b0d\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 440622 72c2e5e30162d45f0bed86565a4288e7\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 413818 0ab3dbd6dc98dc9f12ebb89685436f1e\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 159040 3da5d9f15024095480ed450d3dacec1f\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 238200 9d2ed6d389421dc13b7482f703c7ad1b\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 182126 4c46e7b9db649b07e66a0b9bfa8cbf9d\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 257696 ad4c1b8133720a314b1400dace413c96\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 512088 84a851bc24a43dbc00bfd8aa9a97df45\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 208940 c5fe8b0fd86af03fe8d98c2d754e430d\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 179944 41d34706f273b30f029baeb63d2f2ec9\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 507362 cd18270656f74c06610f9b616c92d06c\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_arm.deb\n Size/MD5 checksum: 172006 9abda9047f1aea44176545bf0784b78a\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 230776 58c677b2cf366aa400110475b1aa8b2f\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 212750 847855458e2bf8d4cb559e917b3de8a2\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 188010 c18bfb41d0086f443ff30a7f3a3c906a\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 194382 0f1b33118229dbd83ee3fda0768050a9\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 1203210 b905e2c58769a43fbf25846bc36a1bf3\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 367868 ed160d9e76c7a45ec1274750cef694bd\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 455134 d3767480cc46536debe66297aefa565c\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 337796 c4fb79654af59db08c430990c250ac7f\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 239678 eb68520eedf8452159c436706a5ba827\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 4101050 9c8575571bd04fa7482581aa8db40f0a\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 250918 32ba4ad6b87fec43b421e6b6c6ffbd8e\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 176736 e461e160d32b356c7a437fc31325c1ca\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 483262 1722f69240aaef49f9e41bd25846af0f\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 173174 c5d0a95059618cdbcf9b105abec2b68b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 403962 4b00a9412d6ce798b6ae69e9e060e750\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 164340 7b5aa05dca8f4c31381e084d60eec1a7\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 182390 7f0f76ad950d33b133b7c32b5cbe9243\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 524984 8d16fa71f73ee17c9cf8eff6e1b1e2fc\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 254072 732f444527e427ce7d6489c04bcd8066\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 1970008 460bb28e531a86796443dc25acac791d\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 173222 989b6f902b266fee36ae545dd56a50b3\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 1443622 eec8f824d148677c1293e313247de3ec\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 265130 74de7712dfa294f763fb883dce91524a\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 2117524 9feee9a58906dc51ddfe7ad688b49885\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 158904 26df9ae9fb4ee68357308aff3e2221f4\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 1176252 8011f976d8b82a7960e4e6127839e45e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 423136 30a86538d45359b5567b53d9feba5a16\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 280110 6ee7c5d3011865c845f30046a31e30b7\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 773368 5704e1882fa7e0bc7c6072befa70368e\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 977618 43fd0a6773e7c62e7f7c88324c352d9c\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 547054 2a35804f06d5b14b0d197a54b9e9bd13\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 317550 6916e628e2212e90bb42b62e60d6ce64\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 205892 9d8b6438345eb71a8821022afd41d281\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 455040 7bccc48c2d077da195bd4898ef58d7d1\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 207974 8325543c7fad9539eacf4e91880a5062\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 45028538 9c453093478ad5f6871c704df79ad565\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 927130 95a1f9d15a3e7a960f2e11e2ad3eaa3c\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 956698 52d3861a976fe5c17373011782d38cef\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 665490 9c456c181ee489e401d7765464d491d2\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 411300 8dc3d182981586e129541673ec25a1ba\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 173004 e497d9c954dd03b9b94de2bbaa879132\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 578282 bddb94e93b946e4e1dfcb0fcc2ccfcf8\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 306846 6c9d24b868a25309052213a27a58d7e7\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 359010 a7a8c57daa0802fe7ef14989e81874ca\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 159100 162ed8a9a201bf5f6fb90682497d4c5c\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 193750 8175c0f683b01697765761d04f7e86d9\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 174482 b2001d108eb4ce9cd718116f06dcec2f\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 814040 b00b509c23d3a0ea452a13d791573bc8\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 9906656 87dab0da7489e3eee5c04d077b3d44d7\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 234176 811bf0ff9916af0a191a5e5b13204d79\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 182864 7c906fe2132c5a296b2745afbf2ef8d4\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 1071012 43597f43f98d2bb1da63f2d9cc1ef67a\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 183900 8164d1966a4a5f8dd8dd05aa2650ae69\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 184216 647434c0af03213b54a2fcf4c4f5be06\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 290668 87ec61161419fb1ba3d9e960dfe134c4\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 181944 6ad9570294bc7021d8710746a726d73f\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 1570242 b705b4434301012660c5846c7ca47a55\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 183316 ecf3fe830ae6d4f8156e0f22a7ffddb3\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 1261582 5d79534c720e22f2892cc0df0598041e\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 216496 a875d2363961362a3c6cfe5ce4a95540\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 372628 c0a24ff52461cb4b06e14fc7edd5b8cc\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 202316 5cae5c40311149c98f9869a279da5036\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 178858 b788d17f5b3f46aee6e9ce9d005a2d6b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 497596 62efa1f25824e5b648870c9aba38cafc\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 210724 c0016d64b88ecced2b0ff1ca2ab8d0e3\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 182888 6197875eb972314549dbd2ff71b63ba8\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 207258 e5626ed443e65eaab5fe0447a624b3d3\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 780614 8ab7163754846c6e9ca32a96f66a0377\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 530522 797ca7ba0a7185898e6a277ed977968e\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 192534 019cc5a00bd7bc3ae33a7e6a5cdd91ae\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 339674 02387e71f900e50c7dac9bfa5eaa09c1\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 684542 b8dbda4cec32de4cb4f83fe37c1c33e2\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 172708 97a5721cc7c015faba64b9673829b20f\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 201826 3646997f08154fd8ffd24c972f59c83a\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 159148 7404ee5ecb24ec2e7d9e301b15d52c7e\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 1804500 f93563abb0796e5dc61b1b1b884882b0\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 237910 4d37d21c8815d6b1af7b23890a88ef99\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 202580 403eec9a751d19a361698ce375589cb8\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_hppa.deb\n Size/MD5 checksum: 307398 c8838d0c39e27a29b4c67cf9db638938\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 309954 8fd8f6cb787ba622d5e315d522d4e5eb\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 1231390 ceff231127f89ddaf50755231d765a34\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 470248 ec25072877c5fb945b8091f89b94d8f9\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 49485792 ce853b97d2c290400809f4ccd3f10831\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 662448 744087289e351fad899f7f95872500e0\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 329712 d0cb991bbc5729db3648a322eb9ef99c\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 338974 f7796713914b21c3f8f68938f93ca5a1\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 783154 2e70ce1f3094f94f4f160d3147d61eaa\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 286490 e0d28757e83e75c50dd8bdf33d86eda0\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 4580280 294ef3eef56dfb0a0ba6f73472998aee\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 188804 72c2090536c2f5acae6422541387ffc8\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 1530824 e1b794ad1a5682949453aef0d40299f0\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 177044 ca9b24d93b16b050a8526c21ba93a40c\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 245644 7407dd8df582a9cbe79c0fe93eec1f0c\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 218728 40ddc63d619ec20f4d579028d86eea5f\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 179908 b40856653668cc17b5fdac985416c42e\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 210178 fa62cc9fb923e5540585a0d25e519a6b\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 1025966 d452a8424b224e8cffe4bed4fd8ac953\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 227300 9612709903c16ac270279b904ef64cf7\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 509734 b915170e002065f380eb7c66c0f430b6\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 283776 1041b1458901a621835c3643e30ca4c5\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 790626 164da63c0df714a6fabc1c1146220c60\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 285764 4fc1560679ebd84a94d61c16669245bc\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 414496 d9152b91edb3712b619eae7e57165817\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 174820 a5f0c6bc0ab2fb0ea21b08e367ba914e\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 181612 e7c2ed23c83ebf64e18697829df911ef\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 366382 0188d361bf162796fc332f6cdb8ba780\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 1167058 5b7eb908347e9741b3f8d2ff569eedbd\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 660294 9ec755c7031d32263f5aa025507b887b\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 194010 da4a7c33197cb980ef0fde5ec03ee419\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 172952 5693ced244c8630acceea44b48bec88c\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 247218 c4195473ddf952360f9426e83af77192\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 435420 4f25cab80d0afb06cd4d51d685ee5cb9\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 203856 690eb13b3f17f120b890ff0559c15c1c\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 179358 212a4c1d88bb9510155b286f2f51ae82\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 286584 c58cdc3aba9560cb34788a71aabf5a1b\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 183088 7d0af5a8703ccf2304f787d7a6c19b02\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 890896 6253824027a7ece252143f793b5f4e1b\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 913338 ac676713b971436552d992c12eaf5056\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 507962 814440397da3ea9ec9daabc4d908e7e0\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 410602 91ea35e4d38d87b328ce64ee25b0443e\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 1358730 40f8b1b286e962e34c2eda16ab497a29\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 5009478 996296c8c1bb7868b37c245bfad1d1f8\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 614600 4f58d32507d65665d59df357cff5e56f\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 337168 6e72f524179ad195bd8b91b5af7e34ab\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 172102 ab9fdd27f28b3fc0826a4a60c19598d3\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 159126 de245706ff75e5c9e65f7bbacace69b7\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 54939144 b38c2cf6d35ed61ec2fbd1c29d13c216\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 705504 0c059aaf463693e7b5e6bc6a242249be\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 725532 8834490599c00c735950122261e15270\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 191120 54c1354c84f8cb7f1a33b0ee33b93a09\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 171856 f5c2b926c8cc24efc241f238e7b01637\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 196218 4b4ffc7c7c1bae1b5ce18b73e03e4fd3\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 236830 7d2ca0cc54ddd8956e6920427f7ab9dd\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 163440 f848b4f237a54666d8925133014ffe5b\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 250560 4b8c13fb97990b2632be5b67d7ca8aa9\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 185220 9b3e71d51115a9daaa7693e3e2aeadd0\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 205684 75d8cb414ac27de72aafbd8a818dbb75\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 208846 3305c93e931b2bf7b94880f2d53b811a\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 1467818 d6de8dcbd022f8e23923b63cc2b835bd\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 565664 b01c23b4c30d2fa44efaab625f0f5852\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 203416 aaf10813e867831655cdcff99931709a\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 342602 a95b50f2497acf71218aa1981d6c97e6\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 855476 db192f6bf945c4a6ce1cc0a911297f83\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 158922 ba0540b75bf0de82fdb4391866bdc147\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 159178 bd9a1de39d2207f6c6f799253a8bcba8\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 190940 d48133b39b3ed4b146be95e887ff79b3\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 179036 8f05b5eb457d654a3e7117cf6ebd816e\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 5744584 658f08f71489ca2ec50e5f48b351f8e6\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 205702 d9d564a7bbfc6ea6c3a084365a3169b8\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 497560 c11a20784fff3f34cb1d8ef5e399d56d\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 171424 3dc25a305fb80e8c0e5387b82350e8d5\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 231462 3e6df025dfd2248a6528e6268cf9e3f8\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 1111416 47a34c53149a4f5dd18d9a311fab12f0\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 180902 f3166cf4b6a60900522d106abe17ff68\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 1941886 0dafbf601646e6c85d253bbc7831ad82\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 1604238 4440a62ad4bc9883c93145f406e21232\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 414592 d40610c8c9e02575816d7ad60624c379\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 170244 60cb0c435ea9e0a6b9ac8965ef04b3a9\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 384842 b386ba9182563f57d6d7257aed2a4692\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 200670 9f88d335f604453304c943d49f533bdd\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 180892 23562d357d670b7f9c9c506b17ac4709\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 265472 cb60736d4d8b0be81f4dcf8ee8d86048\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_i386.deb\n Size/MD5 checksum: 9602510 fa0c68ee00c5820c34e727ae43c6bb68\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 188658 c42190f1851debbdf82cbc6141d49576\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 248262 c9437c5a7dc7a249b4b5163dbc1e5620\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 411172 238715e4593b98b91725b9657d6cb88d\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 525416 b9206245cfbaf0338a8a279ec6a6b471\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 577830 49e3b08095b47ab107dcb97c8397928d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 1081374 2726b73376a8ee527b3c508d265f56bd\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 1185294 dd1550fa943eed247a0a488902123cb8\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 188976 8fcd90e78187de05485e907ac596eb8f\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 1627942 e6271efa1d8da2659f070927ecb91006\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 264920 40013b646ca0900b5d06708eb4305823\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 241724 36a915908f07d192fe6e2103fb22af1c\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 971644 e1e969373b4bca89449bbdcf7d411854\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 195112 969215733f195089fb3b0554f9f9f80d\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 159108 420abdf5ada7aaf5d4ee98a7ecc6ff57\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 230318 4feb2a859bd03c046c7a7e979dd4a91c\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 192896 c51f326ce1855552377af24cb6f45a72\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 415528 f00f95da2ffdaeae807260a59b4a9e31\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 307332 364ef399d6aa04f90bfec504acb350d1\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 173972 2dfb7e253afcaee9ca7d8bd0eb758d98\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 56518326 c391c8d4865c9a947fc0e80ace75dabd\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 1606528 e932f4ffe654be5f6dbb9307f2a37935\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 208224 8bc523abc8504fe839ba051d1bc59faa\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 335662 c7c56c836ea1fb113b231699be809f82\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 338916 786a77143243dfbf632b0a25172bd370\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 2384736 29bd3087e8ec7c167e5cbb4cee98c7fe\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 837066 cf335e14859508fe4602e5bf58063518\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 1155812 38b55b02a1320f73cf75f85315084886\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 302200 dd35e843abc73f0b10a1ef7427ce833a\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 1133996 691ade7cfd7a23e7ea863ce87d5d648a\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 174908 6352ad58c30e8eb83808946074aa080f\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 180370 60220a4a2334d0239a48fc16e6ec34e6\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 174828 4ffd8b5c846975412e2669f381a9dfc1\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 312652 57c73eaa38f94bc6d3078c029594727d\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 204706 b48f6aa2f92e110cefff6e27090d70e2\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 211026 482d120884913323de24a7a18927c13a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 494918 e192edbb74b29fbd04042bc81bed33c8\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 350034 f23299d6d08be0020e6bb69166ce68c3\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 437480 b13b33766a0d0dc138374dbea280c2aa\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 582252 eef6794c925331ec73d4744c9d91c13c\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 2774690 ecf61481d92899e3f044a2d7471a9eee\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 1201300 3d3c2bfd6a5e3bdafe1c26634b7241ac\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 165272 25042c13e1497ab15a11d723b83a7c95\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 9888288 667f02dbafe2d2b8053bb6ae28145eb9\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 211942 75eda9e121089504b896a8d874e159aa\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 545640 1f65192d65b6242788cc45200a4f6642\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 230402 f71647f2edc9f5fd035221ddfff4fabf\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 447848 8828657e55c1f86a08749e794253f72c\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 177174 b42b3ed52f7fe353de6c54b47035011a\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 690124 691c153057dda1672329f65df5a3d747\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 214418 adb0044a6b62da8f53cec92ebf2d70c0\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 355762 d7fc61953a0e27fc9879796b9e0f32f3\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 201656 92202c879f01a7968c6058ed7ea71a12\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 176622 37a98c379a32dc94915ccf24483be1c0\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 348240 208ee558cd7331638f2f2e276cb071a4\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 947014 801862336d50e4df0ea55f923746dbf3\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 545730 ec2754e50c7e2ccb6fa421dba3f56cab\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 159160 909b27b45dcb16cfc7a6e35291d59a92\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 553818 13b3292a608d6dcd7d83940157b092d7\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 797462 40673e33c30e80f649830cabe5db7c76\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 158910 1f9657597e7007ceee13470332836839\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 187234 6e169624e0ae6e9e9a371e8d2008f939\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 1166226 048d16efeb6e958143729fdbd92592f7\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 423930 76cb8ab4d21134db0e503346475ca3d2\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 185560 1150cd1560cb9a8cec10e0c063aee430\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 51595514 a54c19a9e5bd337468173b362fe85961\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 188198 168f29f2701db43104f189df33eaa1b3\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 212760 91cc7d209fc73436e3888bb164705bab\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 261940 01bb263d763bc394275d4e9a0ef0a086\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 694052 91d9b28da0aeb9c0a5a8bad85919a370\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 8458814 10c97e65a30db298272029ac4d32681e\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 485194 db16c40d9a140990a929edb09fa1852b\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 735014 da2320867d85ccc5d242d488637ceb9d\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 242530 7d37d23798da4ff7d11cf997dcfe8ef5\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 8122072 c03fed0f2988586ff05ec1082cffa28a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 4773996 6ab6a245c373d3ee78c4481709ac1d6f\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 187052 68d7ad98b6f3bb711bbaa4f8aaa43380\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 906656 0ba6da2ed074762c6f81c2f1ebfd71b8\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 201176 adf18a13816597a7c5b8ef9b01f84277\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 2611800 58d52349892da83ead040ed722f060af\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 184112 7f22a557e7e6e6b7a24cc1583a1b1ae2\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 260588 5eefafa48dde3d0820c7d1ff6054821a\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 189194 171f65509a8256c4eed6f7ba23f17e42\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 1324852 61d7dcb2cb6273724b166b530db74a0d\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_ia64.deb\n Size/MD5 checksum: 220852 1a2d9a7016e5e0cee723415137003786\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 173192 c35ac9388e460e889b5c8c1f14f16b9f\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 482020 5a990bd79808cbfbef3c83a32691b374\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 269352 b88e1798afe885b60b7ad22bc7dd917f\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 172754 6e5dee8e1c614791acef154cac703559\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 175596 997e81dbb71fbf2766feaa71f34fa763\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 204584 833373435e2c0a6961025d8bb101eac1\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 229550 a6f13ce8f06d5b99c3a60cf481f660bf\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 1737930 a8169e10665b20d7a654eafeb610d7ad\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 383982 68a67b8ea6781f1ac6e1006a24734b72\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 915024 8d7cc450ff7a1670713599517969f1e1\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 172214 52dd5dc945022fd64cdf660b19059d05\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 2107672 3d5afddaabbd3cc1eab8016863b349da\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 1144518 c94a81e0f95a46b7009e988939cec0e8\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 4022092 f13ccc65ac5dc902b00defe21c6cc6a3\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 279242 bb7dd7daf564e55e7a775996f62eb0b4\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 172292 c84b415e93ac2ee088f4d16e149b79ab\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 753404 6e719005ca5984f018f80abda5ca3e6e\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 202002 81ac5cc8ac9c95320ac7e480b2d6ea26\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 164118 c4c7f56f21c6f11b9bce27c4bf956c13\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 239196 80c7317d6c51c992bcc3296a05335b13\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 173452 feeb28ad3a2261dc753aefa3ad2a8cca\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 658758 a96fcac75686cb6f1ac0e1c08d9dd885\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 457408 268c5d4ad6710eaa52e470d73598fdfc\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 741468 f31af57ceba3e0d12edff216674cca7d\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 246410 fc3cc048a0e08408574f16cd7a660c9d\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 795210 6f21a1c1f7a401a14caa2bf853bcefa7\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 206096 67f362e85e3c391207f6fb389229bfd9\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 345818 29babe1c8b6de3997bf9574daac7b810\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 234668 03a58f671b8b6eb29c3090bd8a43426a\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 519876 3e1b8abb92965492d0fddd4cb190c907\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 1448936 b28b91594fe52282cd486cd3d2e61018\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 543418 a7941dbf247f943eefb98696490a6ea4\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 209804 8551eaf5502b6ba826591ba8fe8537e2\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 283592 7ffb1437adbb4fd56146ee8952205061\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 158904 5845a7d23e2763e695ede440476c65ea\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 1205496 a9fe347f8f21c963efde4de8fa26dde9\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 181270 b6f9656bfbf271d833bef07d21bfb9f0\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 240014 8a25fb6a45ef468534ac059ef8d6233c\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 406332 ca71cc404a4403a21293d80874fda97a\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 1558758 206d312f6a029424c49bc68da3f43c0c\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 983642 57a4712c01c29674af3d295f60e178af\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 1054166 f0a9215b4c14cacf96a11c687ff925ad\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 182216 ac9532bb72365f36bb6504aaf2bbdfaa\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 679326 68075491893fc8542b933c6988b5d567\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 576768 ec2bc96eef3a195d3f01943758762e4e\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 412270 7aba39181dca128f5760a3163341c69a\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 159152 8c1ab02aac5785918719cc922eb19667\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 286376 c6e1e62ead1c2a7616bbd9bdacd21f18\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 284160 90c5fd1e31b4bdee9f261d3f8a1ef783\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 337806 6f6e943061798c5d2feae58b30cdbe8c\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 188386 68a7a36b59af68b55ff9bb886ade0c02\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 9875806 ab9175cdb1123f0b6197f29f12af2bf6\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 210546 0c24eda1d995fd14ecef8ebc9bee7246\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 180636 d9a808f261e075c9a247662e2beb3f8f\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 1201038 40f029d82426828fc2acf069c166909e\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 200806 b419207b2a45117323d079f6c601063a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 497380 3aa6526251af7ed483fe850b4c86b332\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 181184 8954b0268faf5c99d9e82aed4f7c6791\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 178632 ab4028c06e3871a7a495434b0be55b9a\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 159100 3988a4fb0b600bef5234e2057c02db13\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 190974 9e709bf4f71063926f10e4b82544e441\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 45544174 2dd9c664614c807f265746f4d11414c8\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 192348 627742a9ac4b645aa3969067ad9e4095\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 530596 8e72b858379d9106bd46a70a351c271c\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 183974 724709366a6d4df26e1ef86da32188bc\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 373722 f8563511250b8ca29e7ea0de81092fed\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 189718 63da03700a708bb92d9cfe28c86e7882\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 934134 306a3eaf389f98ed2cf020c62f5c8f40\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 178938 6b3abdfd09a9d6371973d7fcafe144d4\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 457500 bdb3a0c0d25e88fc5b3e3a7c2765c024\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 201322 a48ef77b7f4e98ac4b1dc906fa8da87f\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 197224 2193c5aee6abdc4aaa358386b1bc2434\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 212764 46d8c84da9a0ffe3c80ae573b224c223\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 292224 65e8297da5c6eb3e67ad0919eba5d863\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 182948 19ce6bcc0faffd91d07bfaaa5ca20ace\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 1899286 6ab7026f70fd55194fa2e72068782eb1\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 253782 c84f3139c6eed33b3d72cdf19b6c706a\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 337790 947bbef4ecadffdde60123a55aaa1faa\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_mips.deb\n Size/MD5 checksum: 316710 5937be98f80306cbff343ca9d624a49a\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 904176 6a86515dffe7598e06bc5c2daee964e1\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 2104472 145123fc2373e5aff9e34de937512bd7\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 668046 8c06c86f1600b199e3a78fdc76d21015\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 183012 e7dbdcea0819797bc77a768da9b09681\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 182276 37686354ec4799854a6975f5868bacc5\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 4016380 3a44f300957f87e6488fa812d47861ad\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 405398 4a6cfca34c7f26537fd0b2363c2de815\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 44833076 b1dd588a8544919a8de161fe5e5a5f05\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 278756 e158909f4aed5f679aef91cd75279c4e\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 240168 095fc7d05c500a74f309ccda6bd116e0\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 290770 92f31fdd003ec6cae992df96230493c4\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 1735552 680b5680391a0c8211d61834f41d609f\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 282614 641b21004cae13956c062a9548dd7b72\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 344338 59903dbaeb69c462343a5bb6291c0c4e\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 739956 7ae1d36494653001f452b3fb93c441e5\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 457904 e0adbd307273294c480f28516b9f7999\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 175648 31d77eb6e97effab2875c5819cccfae1\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 178976 b5afe8b87073c3e5958976fe7f27de2b\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 201594 db535fe124ed791cd52f07f75435154d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 930044 e5e605ff23c838ad72e8471b24f5380b\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 164122 8304afd9a463f1875e3593964d0205be\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 159106 c06c0b98273c429dd3231dbd29888043\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 189606 ff22ac062bf853f383b5d7855fcb5dc0\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 229752 70845ee509ee680f8579dad27287aa8d\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 511784 b5d529b0562d26bf9f24b157d0881ba2\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 201450 0a6317ff08351225dd6e042a6767b8b6\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 209250 73ced6c5e7cc1ba4a3c225afaeee3e9d\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 180670 02e42850006386a119900c38ad5977db\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 542346 cde243e941a53733cf21d89a6d49d800\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 173566 18804f03d38c5250803d2f04a43a163b\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 972350 95d91c0f27aa559e2118711b60195485\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 1173156 54ad7f693af45496cfd3a67f87cf5fe3\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 172788 9bde73ce2da6e89cd97b8b56c29935f4\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 1895374 7006823844c4cd145ace35b431b95ca1\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 172178 d6b19155f5bc5cda866ee73f92f01867\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 210620 72d68d1dc6f5052de66f1336f9cacc61\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 1556604 b6719a6f3484988d959a6457308edf4b\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 192412 15f31d149eab982477ae11142ac99642\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 158908 16e8df5f960eb604cdca57fabb0da2cc\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 316542 4691eb6dcff0d8a221fec37e413ce63b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 1123962 d619af501659e8949ddc9853b1aa18a1\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 181096 13cf0379d32b0134e8ae875e3cd44476\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 9701118 480b1903c752f282b216d222670c5cab\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 337354 680cd3bb41f754979585bb314f19adbc\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 1449078 8669f5ff69b54e8516035012752b9bf0\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 458008 6d7faeca36e8753a91fdc9e4735fc1ff\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 180960 d8794732cb2db05d421fd1fc4826e1cb\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 238352 7511fd4c5facd3e64f232ea0d98e29cf\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 529166 31af11a4fdcbe990a951faeb4c8b4ff5\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 285554 453a9ba904eff18bbe13e33f2f3d9eba\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 409682 061c8c7a4b48e6dab02a57f0ea73447e\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 188384 026394f74d6437e1bc624a765fd11f2f\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 253744 8824dc278f03dc9097981f1e6b8c2d42\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 190850 4e4e53d656125853ce0eda60445abec3\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 383802 08fe2534e96cb0a345013d21688403e6\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 337834 744f70b435a21a4e6ed2bc5e8c411da2\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 269042 e9aee1d6d1d43b0067090d3e14dc54ba\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 373570 a6a32b6a99c1ddf3f2695d10d04ce929\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 740796 2d4ae7db1411f831c3617ceb4ddfac6f\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 569634 b4b1e78841451adf1c0fafd3496b25e4\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 498700 d55395b96d44be740244082123e8f0ee\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 200806 2c5425f3525d0a79c0c8ae3810c5088d\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 658844 7da1ddceeadfdda6404237e4f913c10d\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 784740 18962759163464cc5b11de7e6e6c2d87\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 183988 bc88891e0eaefb01d4d7f27885dd3975\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 212750 bc3444dca88d48857f565794fd190c53\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 178554 8a2d2805dff3e1a10005272ad7dcee08\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 205786 e382d10861a253b4125f449a53dc3af0\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 172278 c7b4d48dacb22c9d468f18e9fd315ab9\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 204118 cec6fdd8d800e3d38c5ec4044ff11f2d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 1181486 9c9636347e2659ed9c0c939ce350b28e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 280358 caaf1fbb23a364334f72fe7432f24ede\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 1041652 6a8933f426e41cf097a5469c2ae8c3bd\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 474474 1ac68cb3b3b8ad6849b1e166fd8e5e8d\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 159156 e69c843ed1c17142d4148b5eb85d9bca\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 234754 6090338a05743fca31899bf6a3ab4343\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 173200 efb1b8365f260548320eb9a37070718d\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 197264 8388b17dfe166b9b70ab270c6c94846b\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_mipsel.deb\n Size/MD5 checksum: 246252 fc9169e4fd0fb3f6ffff97b7bd59e947\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 441392 45912ac4597fb5f337df4c51c28a87e1\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 225430 b525267cf421821534d222d04f202fe0\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 181192 7f007305277995c8083a28b1efae9e77\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 259560 4fd91fb4fc6ad4e1ca7fa68fdff3eb0f\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 190838 119296f0f48c590f1bda66bb7fb7d93c\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 724526 b31d97b06e6fdd22a9167c044eb9f1ac\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 46812384 30005c6e797ec7b06f947aa6e54fc8ed\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 212134 0c781ffdb879b844c6468967f89b82a0\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 235522 6ebddd355d19a67fb022bdcac93bc6eb\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 1613448 192e47e52003fcdf87804885e5dc73b4\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 515918 7db1af2e5073223690acdacccfed2b56\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 941870 ac4758bb8147627ee3666d876d92a9a1\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 288604 e113ec59c869bd42c72b87d37ba5ed21\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 690526 b236f4fc3d1ecffe29779853ee4128bb\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 178464 ce6302b98e18162cc3598028b3506a73\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 1401030 4fb1918dda6b2303f57ad6c4aa2ead4e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 372700 d6e3058e5e8f1f09faa5f20bbd6bfcac\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 272996 92b4e981d18c2f0fcf4cfd2d4cdb9ad5\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 177154 f2db0955706b011c13d62c16bd1df2a9\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 159158 2b1a95a7dda353425bdb8cf3b9b12a37\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 1335834 6610d9a768cedf0da94f0019dc4a257e\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 184582 6f4bc4c238ee4d03042e663db69cf7e8\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 886018 30b829f7b8055c645e4ee5dbb1920cbb\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 183222 fc680a42f2d8fe3b59d5498c0124ee79\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 1514938 2156813bc70367dcb552e2833040d32f\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 15238266 c615257396090ce1a30f033f36b54db8\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 1904978 3cd883fce186fa21f1eec1de03314575\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 232980 8ddf865dc3479a3372e12bc212f1ca1d\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 221670 73d423f5b93e40c0a4b7cba2e4dd7e13\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 42024570 7c1de1fb255087007fa436f367780c3d\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 363670 8f50efe1d2016cc235c37a74e74f7ea2\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 315280 4ab99f1857e247710f9f0dfa3b571af5\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 199192 013fe175382a3c7c8be7d2ea4b197216\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 192346 ef173f68b86ba396bdbe4b23f49e2c99\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 1007574 19748f5483e8271009db724c0b1bad13\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 174794 350a958cfe4c4feba0a9771535f070a6\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 468924 b4c6d72f6f8f0896de70d12b5076460f\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 199196 fda128811bbe3a116c17e24a4f7b87d6\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 173652 33c57ccedf263ffa1fdd2416dfe5d572\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 337350 cfd9629ce3ef875214266e4b26e4c65f\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 181070 7fee6f69cef1fe7abaa2ae32ae1a682f\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 832348 1b2bbf0482e925f7278133f01052909b\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 171980 46ecb558284d07b0fe9ea9042a16ace8\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 739682 c07382eb24085fcca1fd1237c16d71a7\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 159112 61347a6cf0b35ce6d1ffa6a44bba78c2\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 183046 ac012ef11999593eca8b44d083a9bbe1\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 2113172 3459088c8024e14a4366e0f5325797a4\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 173946 074c60310f5d9d56bb2181637ba97f0f\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 250568 527d0a706d124d94b73a6ca77a7483d9\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 182064 5f547ebca088fead9e06b1c8ec95e1e3\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 1859458 47b1902e81dab43991e2951707b57f04\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 158908 d61fb09c20bedaa406e4fc6ad67eceab\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 5796820 6bde56a4c8d28d9e49e0464d09a6f7d8\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 164046 d344cc340bc186d65a00f0922e7d28ef\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 233336 1cc9fa78047612d2de2307cee6bf18ac\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 1730148 b78c671e9807c86862348be05c25e257\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 249908 b58bd8948718c6e7f29fc97e7b041d3d\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 337668 14f88941e8318ae4d08444fe14b48f50\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 1134844 55f78f74207099adcc9f339f2ffbcf10\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 3084308 6f29476fa83cb30ee814648159356896\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 296204 4ec882ee0619a2894d309fb98103e459\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 172214 c92bd2e62f4814019a17783e7b3711f5\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 279770 d5ea14ee68cf36172b20b59f9f134f7f\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 645664 f4ad43fc5f9c8e5362ca9625c7b845ec\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 191608 df4b17d5bbd52af6b92b32b0fcbf5bf6\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 693152 2438a0ebc89c2c04f7642790972595c8\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 441482 8ecb96aabe23f163c4de32d134964b59\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 1584408 5cc584f94b080c72443c7b9bcf1bddd9\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 553994 09b72b64e565ea96f3fd7a1122338bef\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 405058 a2c37b9e3a5b6997ea0dc3d839b7fe6c\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 808358 fb99c4f1500372e13d2a9be09f73c328\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 6682742 344fe4b3f4c3a87141f7331b70755aac\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 390478 81cb4050502211e35bd3ed5582e55765\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 297266 a74db79f1a25585fc994c25df15b4b95\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 343616 66de92a9f3917552dd968a7404245334\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 210206 1fcde6fb621ce68804b5cbbeff1a6903\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 187034 39056ac3beae5173c27b915cae09735f\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 464338 bda597e4dabd7d759af1b761d412f51b\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 225534 c5b97c212a415e3e3db29874c23be063\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 734428 a100ae593026f66ddbd24528fbd14b07\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 509220 4058717f5201d92389f46d17d8a3ef2c\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 2249220 e1c86a69c4c3c2dc92ba48ac53d4c89d\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 204766 112162993967424688587e442059ffdd\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_powerpc.deb\n Size/MD5 checksum: 182558 a21e3f150dec1e9f2d435ea302b4fb65\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 1716506 3fb1c6099d94dc00ee8f028438a7b015\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 1767734 dfca1a9dfd2ea2f457dfc3818c5beb12\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 1203742 1d1447d23d00e68e6c5c4dedca57918e\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 191532 b05bc07a9f699c1ba793bd98dfdc974f\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 171832 11e110aba7604eb560b277dfa2788bab\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 369060 2ee8bfe0a82b7c96a59be4cf23e9c660\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 164350 f6f3f329e0a6d0912a3b824835c4a38c\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 240140 e1866cb1f8b7e8070d0debb658233acc\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 198120 e3be0e02327ceec86d0072361db55498\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 276938 e225bc23f8393b790954b71a83ea012a\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 199266 73ceb04687ff36bae3ad6d1013f1597e\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 1197462 e75170a707713bff7bc8e788be7bd032\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 526966 64c6370876405a8bc6df4d2ed77f873a\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 175708 7c28fd1e6be7d8597ae8e8a3220fc06d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 851402 9b03ad8a0888206778f50d9e5b38fe9e\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 317218 611a5038c04b6493a84c40e99c4fcbdb\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 950576 4d3d1b4aaa78db67463003b06e6e1be7\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 337530 79590bedac60a08719c93d0770cc8192\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 206228 2ebf3713ea112ca9d005a2de591ba822\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 209514 5aebb5b985821f7f0890ab46aaaf96bc\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 298554 ff262b7c2c76c04aecd4d7dc66dc7e22\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 159096 78801fad20189af952d62ec3130f79e9\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 731244 1f1f141e25e3379d151d645ac222af35\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 173622 f0163ca89f57ab21f5d12a3e695128fd\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 862236 6cd2daca1cb515da318d05da803e5028\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 261340 9a03238d9ed75dadb716303926ae2276\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 356666 4f282eb6d4e9b528c413d7af05c41154\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 191508 3045539d8f0da2c00f2daf8fa619d8cb\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 205368 0c1e71f87075101b94a3409895ee7530\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 358896 d9f0cf6e22bdbd7cd42b878a4f4d5695\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 530456 af37c4468a3b222d219f9ab7e8dccfe7\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 183648 5e8fe721c57dc2a0169f36d52a9f662b\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 214630 55a23d8356d75a6eddd8da42a594c917\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 577200 899806b85bb8e15365accd171897c3a2\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 235392 14e8745cd14f57e0206ed92fa9974c03\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 182892 39b5a5673868ecf627399e5d9f0b58b1\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 1311112 017e4f9ade3e97f8c52e279ba3549c7c\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 224658 19afabbb7ae493059f6a4f550a08891a\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 9935610 6f2c38d24f9e52f054b5e0e814e55280\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 231510 87f75ef6a332ade25aceda8b0d1c76d7\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 180448 d535aab3f346bbcd8794c2fe5f0d287e\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 489000 686d810d747d59c7b1c690b9d80530d7\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 438686 01a7f7384522992a5d6b214afc2827ed\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 180880 3033ce4b63b8eab27926e735bb917a59\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 183762 e06238843f2a321b59c4108186baa424\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 687528 72edda63c890adc4705c2eec24c63bdb\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 180780 193d9aa2025b17948fa41edff9c3bf8c\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 636628 aabc639d0e951023d7352fda515d6d37\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 250220 11929d7b9e331ab61087879040a56309\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 180042 6c3f5b8c13a6fcd230eea9df7f949ffb\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 434960 3bd28706663a2282c46e9be0ff6bdf27\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 755252 f90cc7f90fedd6f8f8461e87cd22d990\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 158904 5253ec86faebaf54b392e42f26f26a7a\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 806858 8f1fe3869f537079fc8f2a2a5570d3bd\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 210224 e86ffc72fa92d82d51816262c763a6ff\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 182668 f619a278a91c392dd1008c2989a2e70f\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 522200 40c233c78839d2d309b2cc7df0c13716\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 1386246 954c96af76bf740a0ab37acb12364155\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 435050 1ed856cb1be6d72090bac033cd0e7caa\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 258064 1ac11ce9c629a25cccb359bd95f4043f\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 159154 8ec7222910db6e366272c6f5ef1fc289\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 207758 e680da8082a90ee645cd0e2d68428a0b\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 1624392 8f375c8d12f558c8552fb14e8714ed46\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 188096 3ca3bbeb9ee2e4d51d0eb347222573b6\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 299942 e935c8925f87126db724d0dffb7a3d6e\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 413980 4634278bbabe2fe2623f9aea44b1f95d\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 1593696 23c6e96efbbdacb39449584ebd0c0f20\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 172028 7ce6aac84b5a5bc56eb0ff813347292b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 354716 0eb29b3aef93ab72b8cc75df1b23d426\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 349884 a3d23f3d79f6ca4c5818cebf5d1014ff\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 172606 9bf30320d7ac2d41e1ae4808c7680103\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 194136 b995be3ae9e5be07addfae98ec17523a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 331176 d92dac9dcc7e163a9d6ed41bc2c41be8\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 1106320 0c0e3b45aa6e9e5623e8357de8ca9ab1\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 172696 89b32bb1951242a5730d9693b973ea9b\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 202746 b0045ea89141a4e13507c628e87ad924\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_s390.deb\n Size/MD5 checksum: 301852 30ef7a0dd324e47d103f5a8f9641a0f3\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 1199058 fb47c2401413e2f7ad80d2a0cb53a71f\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 171634 b54e1d7f86129b4fa0311157bf3372eb\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 344458 b0ae074533aa0732d56a354d95e1169d\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 208670 47198295a8b71f278ce4dfd76fff9de4\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 247938 6a40b2b53505a0acc2525ff2bed33258\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 179994 c9c0e7bb2061f512961de9cdaf82db67\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 200778 aa486465625ab97c6119a90f69233054\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 159162 097f5f1e3c06bbeda8242f91aaaaad49\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 206494 d8d6f0a026ef2c69e99569b6e17e77f0\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 696266 5893a37496c31d6fd51f18a84172d0d6\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 706548 77852d6223e5c2526be2294b22f8e8c0\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 517106 e712628e13e0db45b351c09c231720e6\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 188308 a9fe9c784fd92ca641b49e41141942aa\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 285574 a110d2048b33c9e86fd4dea8295cf563\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 179008 1da9b77d888ad6c46bf776581e92973d\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 5432950 8e75c69b969533dbba0c7c3f67bf90d8\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 194650 6da589cbf334c6a6c92e20e615a60095\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 185412 626a93a3db0fbad1ee92d77235bdb692\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 190340 7118a552b357f1b266062db020ca0fe3\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 251626 e1db1bb6b0d1d454fce940e0288818ce\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 478606 a772ac7424c897e8d518ba80291b3d6c\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 203336 9d14395da0b95caa9fc33b93d27cd92e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 5584168 f319934ac85d2b00243a4e8c356c0bf8\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 1533770 23f89e8aa9b2dc3556b6998b342713df\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 287594 4920e0929a6d010095a172bd72803ac5\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 182200 bb3adde4ab1c379cffd44ad10dc39d0c\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 174708 cccfb2d41766e87d6219c7c559ea7d8b\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 226780 816582ba4dea7b6be6561eb22b9e4bca\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 1935378 640561b1f944e699af677add8626a3e3\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 180958 2cc34e3fe26e5be31126b4d2deb5a197\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 280194 f7268de6434ec3cba4f2c24fab4b3458\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 892536 e2551593801a5dda8345af889dadc0ac\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 707234 d722dad507d25a055abbfd61da00a45a\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 219580 9e575109c75117098d1c7929d9b0c404\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 190752 891832266f899220f4a71f088940815c\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 9812374 e51f6b9ba1d2179c857efa26f8f071fc\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 163688 bc552bd22cad85325161307e4d9bf686\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 787344 e7228f3f017ccb4e84ffca963e46e21a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 863580 fdfc352d76afbe69ff75542d4252c9bf\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 230982 44100687fac22e8452952bb0b1a465cc\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 237494 ba9edf322bb7ca683c63389de4db4bf9\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 205328 8c5f3dd05b3b4f334b9018cb81692f7f\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 201076 17c5ad281e013eeabf77f58c0994d220\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 509246 a0d1baa502480783cd31343d871a91d2\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 283972 3646fcb1d81fc9bc59a33d97ea27df9b\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 627700 b987e3bd935fe36a9b1b0d4110402e9c\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 410720 05e409a012948eb0ac9f2ec82fe39f6e\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 1495472 34d5961dc21a8e2af806c84a4f4a16e3\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 1110766 9650b96fc7d08f8acd69e01a113411f6\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 712364 66bb52f36918639f4c5d388492932363\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 181344 c1068078f048b650c00c7307a5c65310\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 1253780 d9464e998d757cd6b39da6812640af0b\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 209472 55d8939e629add91db37e8748389f724\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 241856 e06e0c0807027f38c68dda32665be134\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 1366466 171160a4ee47f678291a639167fc8391\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 172228 e4cb5a5ecbe4fbf2b6eba807f2f9786b\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 330944 b023622fc0c34224a4d0724305ce342f\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 179442 4052dd5ee80a06cf9b73d0f3bab5975c\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 499454 0ea348c0d660a0be4297a10b83e1012c\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 673664 a257d761b47f58eaa4cd2fe347a701fe\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 332140 591caef1a355f9ccce18942ddeb6744d\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 1026838 c3a8b40ed61b1d86237dda4c6bdcfa57\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 387988 26ef35265aab52d60a74922d424a4295\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 921344 6fab55963a88f82c41c2aafdfc915d58\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 358300 c10cf134670ec0482d3d2e871c1c76bb\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 4596572 1efe3f2c521e6c330aaedaf87b78d450\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 823522 5701a8eccf22b1d7d0265e2b7efe2f11\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 172494 6b0554ab0b79ac1cdfffaff88b6f09b4\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 178040 1d7f437e8e93883a9ca48156f9a9490e\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 1626928 d5a4b742b653e15796c172c9aebd3bd6\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 49732342 be96bc8484c0ac83ce14883b2c2f8482\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 170930 e19a8896fb293a2a6d2239d7d4180df6\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 177416 1201e2682216c6d84de3df87d020cc85\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 268726 5f7f9e298fbcce59bc7dfa4e02e3f0d6\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 171880 2affe0a339fa8cc47b066fc016b0de60\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 417816 162bb411c75fa2717d6842ac3a16f5c7\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 417910 bd0e0843c721d35ba8146708d8461afb\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 574262 ca7edb35421f29a19fca3d0fc4628484\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 308316 c88836a4057e114f12796e2da97af5e6\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 158916 63c77d5cb8a54ede993e6505372ef011\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 442652 a04425f78a430b87fcf007c94f99a931\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 159116 33329cf4c886f6fe3dab7cb3187dda96\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 337140 bd5a28ca3b8985cd84b9ffea438b97bb\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge6_sparc.deb\n Size/MD5 checksum: 195650 a180536062619229ffa9fc408bc067d4\n\nDebian 4.0 (stable)\n- -------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1-21etch2.diff.gz\n Size/MD5 checksum: 627248 e2eab18228db61351cb0feef9a79a067\n http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1-21etch2.dsc\n Size/MD5 checksum: 1989 566946e373c426de34a9b05bd1c18828\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont_1.2.2-2.etch1.diff.gz\n Size/MD5 checksum: 20952 daa0d3a2fbcf51a9dd35b940e4f38208\n http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1.orig.tar.gz\n Size/MD5 checksum: 8388609 15852049050e49f380f953d8715500b9\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont_1.2.2.orig.tar.gz\n Size/MD5 checksum: 822326 4c6c079cc66a9c55b64b149d24a6446a\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont_1.2.2-2.etch1.dsc\n Size/MD5 checksum: 915 17b2fd7a64516bc33f8deebb35d1b7e2\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_alpha.deb\n Size/MD5 checksum: 136964 240af85a94fefb0f41b9193261f728fd\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_alpha.deb\n Size/MD5 checksum: 389112 b819f95c6a2c6a9277a774258ab3b171\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_alpha.deb\n Size/MD5 checksum: 4454430 8cf0d55ea7009de28ab75f002f38ec98\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_alpha.deb\n Size/MD5 checksum: 357532 8c964513b242731c6f81e644784c850e\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_alpha.deb\n Size/MD5 checksum: 272122 eec2f6ba33afd21c94462c254472800f\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_alpha.deb\n Size/MD5 checksum: 1029106 5093f4e1c6781e779d7b4602496edbb2\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_alpha.deb\n Size/MD5 checksum: 352712 551d75cf9c4316558ad9c5c462021177\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_alpha.deb\n Size/MD5 checksum: 1929096 284fe2be423f088bbd3527a4df7a2ccd\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_alpha.deb\n Size/MD5 checksum: 1763188 c2e120c67646111315e325bae774638f\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_alpha.deb\n Size/MD5 checksum: 1961102 f2070313fbd24afb7bf5152f2745153d\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_amd64.deb\n Size/MD5 checksum: 294618 4e2e78e169a7c96810994c9ad4d447a2\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_amd64.deb\n Size/MD5 checksum: 1622382 638564253d1f0ae0e4012d0bc2e6689a\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_amd64.deb\n Size/MD5 checksum: 1471976 d0900b5ca5eaa815ba2ffa418551ae46\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_amd64.deb\n Size/MD5 checksum: 1653586 c144795aacc209b689b882b481e3c64d\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_amd64.deb\n Size/MD5 checksum: 350494 71899ae87864503b8ba765e6192acc03\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_amd64.deb\n Size/MD5 checksum: 859516 bf45a00ce2093bbb19aa9aabd625d6d9\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_amd64.deb\n Size/MD5 checksum: 232324 46da054ff8ce1b99caae6281451807af\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_amd64.deb\n Size/MD5 checksum: 354204 5783f97f2a98d7bed20b51ef3ff5f5ae\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_amd64.deb\n Size/MD5 checksum: 133660 84e6c62282d7c00f945a4ed36512bb48\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_amd64.deb\n Size/MD5 checksum: 3918476 fb5b4cc22f7ed95e63b25dceb58fcd1b\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_arm.deb\n Size/MD5 checksum: 333662 aa72b7dda31078a7f1db2b9860dbd153\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_arm.deb\n Size/MD5 checksum: 1622316 1bc3176fd243036b591ae364313e4405\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_arm.deb\n Size/MD5 checksum: 1598116 e6e57e6b75174958be2644d37b14189f\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_arm.deb\n Size/MD5 checksum: 1445474 ce4005410b81a6f797ea4c262534cf5a\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_arm.deb\n Size/MD5 checksum: 3777420 d02f1294d3e84440c17c1d202ab2672d\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_arm.deb\n Size/MD5 checksum: 232334 a7460b1a2bd61c94aa45dc3e2959d068\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_arm.deb\n Size/MD5 checksum: 293616 b0eb9080f071307fe7a72ffa943fcd6e\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_arm.deb\n Size/MD5 checksum: 351940 c98b666fabb35b336bf6266881becd74\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_arm.deb\n Size/MD5 checksum: 125202 9cc7196f2b6270ed95a8056d4c7cc05f\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_arm.deb\n Size/MD5 checksum: 853914 7c0961bf12d2c8c978e083431130d3ce\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_hppa.deb\n Size/MD5 checksum: 131192 87c7b203624012f847119aa6df775df7\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_hppa.deb\n Size/MD5 checksum: 345274 70013763f782c3423b5e68032077e892\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_hppa.deb\n Size/MD5 checksum: 1851628 5f04d3e1e47f1b0b5fd9870c9e1deea0\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_hppa.deb\n Size/MD5 checksum: 252942 4b18d51841eb2148b703a1bd82cb0784\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_hppa.deb\n Size/MD5 checksum: 351822 5e752118f2098e94c32573e9be62676d\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_hppa.deb\n Size/MD5 checksum: 4384742 c7cf4f5355a0a0804eb4a794ead3315b\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_hppa.deb\n Size/MD5 checksum: 1659880 eeefdb0fd6fc830aafbffd04c6993103\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_hppa.deb\n Size/MD5 checksum: 909760 3b1d6488cb68a995ac9714a8642a9974\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_hppa.deb\n Size/MD5 checksum: 1819694 f802acd85df6772f01be3124f0f4d2d9\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_hppa.deb\n Size/MD5 checksum: 326314 ce8dee6ce3125f8f21a76724c48b7357\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_i386.deb\n Size/MD5 checksum: 345240 08b8fdcf2475a9076a69248576f2ac3f\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_i386.deb\n Size/MD5 checksum: 1388236 49a8c26e7ed61d537ca990391e1b3441\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_i386.deb\n Size/MD5 checksum: 1537730 23c89dfb2a4eaba3d7b618de16f38f4f\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_i386.deb\n Size/MD5 checksum: 121516 50f2040d957afb312f18667287c0f761\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_i386.deb\n Size/MD5 checksum: 284708 10213432e5ba581ff3a5bdf56d6794dc\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_i386.deb\n Size/MD5 checksum: 340528 f8dfc3522a050b5b8b7c4f54b1ba5804\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_i386.deb\n Size/MD5 checksum: 3654528 313ffde7ac007a0fe8dfd4ff613a2f76\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_i386.deb\n Size/MD5 checksum: 218480 d2e3caef3d9293bce53058ff4b4cd691\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_i386.deb\n Size/MD5 checksum: 808000 0c85e4a0731973a6b4a0890d9d6fb20e\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_i386.deb\n Size/MD5 checksum: 1563094 52350d64f834c793af7627734a45999c\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_ia64.deb\n Size/MD5 checksum: 2220110 1f602e1babd3d8953545cd3619389c8d\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_ia64.deb\n Size/MD5 checksum: 343974 c309d209666c42777c8937a607b1e1fb\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_ia64.deb\n Size/MD5 checksum: 2496230 08e8a64ea860f878a555d925b9499b65\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_ia64.deb\n Size/MD5 checksum: 2448080 866bbf92b384b559e7e592fd49b2b932\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_ia64.deb\n Size/MD5 checksum: 161390 ab68c83bc01a771305d39f10f748cd02\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_ia64.deb\n Size/MD5 checksum: 5491242 4bae54f406677bbeb2c3a7b14a67cfbc\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_ia64.deb\n Size/MD5 checksum: 347190 881089346804f6135bfc1c411c844cbd\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_ia64.deb\n Size/MD5 checksum: 1306278 ec5f0f3fcc70f2d82dc20aa85cf6df31\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_ia64.deb\n Size/MD5 checksum: 345210 41666c1ae663597445d70c3bb338a48e\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_ia64.deb\n Size/MD5 checksum: 426476 5ef237571087cd68e806211c40f1d35c\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_mips.deb\n Size/MD5 checksum: 363198 7a71dab324e2c048ae7737c834b73058\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_mips.deb\n Size/MD5 checksum: 318346 a6e81ff4826c07d84224d29104defcde\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_mips.deb\n Size/MD5 checksum: 229170 cda4a2c092356d4c393512d0fdfcc30d\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_mips.deb\n Size/MD5 checksum: 134452 056706a898de8aa1101c44ea92723ef9\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_mips.deb\n Size/MD5 checksum: 1714828 08ec2ebbd0eb00bcc0fd20cc06210cd6\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_mips.deb\n Size/MD5 checksum: 1682028 dccdda9ef14d5ebe8de0dd5f0a59206f\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_mips.deb\n Size/MD5 checksum: 1536846 4c791982b1d0d276f0772c64bdad762b\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_mips.deb\n Size/MD5 checksum: 861910 4f031dfec3b76b94a403d12635974399\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_mips.deb\n Size/MD5 checksum: 345244 21fba166e49f00d961daa777fe75619c\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_mips.deb\n Size/MD5 checksum: 3827336 8d98a29efd6fe900816dbde3143fb087\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_mipsel.deb\n Size/MD5 checksum: 317190 36ff339bf5096aca7a693a7171e8b609\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_mipsel.deb\n Size/MD5 checksum: 345280 5939099dd8d08525ff414c3d536e4868\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_mipsel.deb\n Size/MD5 checksum: 134648 2202ed104ea0eab87dd926754f252ad1\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_mipsel.deb\n Size/MD5 checksum: 1708668 5c0c0372f57da0c99a5faa47c280eb9b\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_mipsel.deb\n Size/MD5 checksum: 1528356 22b4ec00349e0f250c063bfc59606f79\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_mipsel.deb\n Size/MD5 checksum: 1674278 ba040b5fd47e8250a9d71f215b8cff1b\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_mipsel.deb\n Size/MD5 checksum: 3710450 ef4a83ee8a46ad3654dc85ad35c7b28c\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_mipsel.deb\n Size/MD5 checksum: 228400 ec5823c830c86237aaad563d0b319728\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_mipsel.deb\n Size/MD5 checksum: 861954 fffedd6d214e1de7fc7ff8d6c0b454ca\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_mipsel.deb\n Size/MD5 checksum: 353758 7919d548c79bcc2223039bbb8b9de170\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_powerpc.deb\n Size/MD5 checksum: 1587186 a91a702361fc32c0a7e661b6e6060070\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_powerpc.deb\n Size/MD5 checksum: 1448162 324a02471a326315fff4a7355deda993\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_powerpc.deb\n Size/MD5 checksum: 136696 bdd00dfe070fceec83fe4d47c59934c4\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_powerpc.deb\n Size/MD5 checksum: 228150 b61740228f69986b2efb3ffee354304c\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_powerpc.deb\n Size/MD5 checksum: 1612068 16017b40e54213bb451741330b3233e0\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_powerpc.deb\n Size/MD5 checksum: 345284 c5b78ef9beadb56729229d7506a256e6\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_powerpc.deb\n Size/MD5 checksum: 286140 816841dcb379962d96c6a87745766d04\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_powerpc.deb\n Size/MD5 checksum: 3983016 e6b91ddceabcc1d7f12b82209d9da004\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_powerpc.deb\n Size/MD5 checksum: 355072 2a01bfa07a0995eed4d98b725f8b0fc6\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_powerpc.deb\n Size/MD5 checksum: 842228 e1b3925ece5d1d84e83d07a45764ba61\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_s390.deb\n Size/MD5 checksum: 304660 b56b16506ff662e0e9dc539e0752fa36\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_s390.deb\n Size/MD5 checksum: 1566286 d6a26b3f0e62f7c0826eaea5abb7c8da\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_s390.deb\n Size/MD5 checksum: 1740222 2213404c7249d6b4683091e62a5ff3f5\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_s390.deb\n Size/MD5 checksum: 130446 9586346a5a26c76d7715cdf76201b4d3\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_s390.deb\n Size/MD5 checksum: 1709532 6217ec406925932848ba214ab7171629\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_s390.deb\n Size/MD5 checksum: 4132414 1ba1b0fb73dcf754743ec5595e61393f\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_s390.deb\n Size/MD5 checksum: 884708 eb4b2861a9d8d01b26f8cbb71c491e78\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_s390.deb\n Size/MD5 checksum: 242372 0691b5d2289bc4a7bf75e4df63294766\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_s390.deb\n Size/MD5 checksum: 345202 d34663b1553d6311ffe1445e629cca38\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_s390.deb\n Size/MD5 checksum: 354982 1dd316c88475d86d9ae3b1a50b5f82cb\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch2_sparc.deb\n Size/MD5 checksum: 779062 ee6ece81d7f54bde871839f81896b862\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1-dbg_1.2.2-2.etch1_sparc.deb\n Size/MD5 checksum: 321392 e150728038c473c99457fdcd9d1872b6\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch2_sparc.deb\n Size/MD5 checksum: 345708 f684f3288ffc8754179559d9f2227117\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch2_sparc.deb\n Size/MD5 checksum: 3697490 0eede0902e70122b61a63c3b5cbe729f\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch2_sparc.deb\n Size/MD5 checksum: 1548444 9f713f0feb3be171d71bee8f43a6e704\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch2_sparc.deb\n Size/MD5 checksum: 1391694 ef0c9f847f2e35e17f94191311453180\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch2_sparc.deb\n Size/MD5 checksum: 1524276 d16f1e6ca68a40684e18e58b2f61a345\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont-dev_1.2.2-2.etch1_sparc.deb\n Size/MD5 checksum: 293386 607b2ed61837a7e078bd6266f4f607b5\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch2_sparc.deb\n Size/MD5 checksum: 119774 fd5c840ae1110ee37aa64b09fc452537\n http://security.debian.org/pool/updates/main/libx/libxfont/libxfont1_1.2.2-2.etch1_sparc.deb\n Size/MD5 checksum: 223572 ab217c5bebb4555ab563ad4e9738d32d\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>", "cvss3": {}, "published": "2008-01-17T18:55:05", "type": "debian", "title": "[SECURITY] [DSA 1466-1] New xorg-server packages fix several vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2008-01-17T18:55:05", "id": "DEBIAN:DSA-1466-1:58066", "href": "https://lists.debian.org/debian-security-announce/2008/msg00025.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-05-02T17:21:18", "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1466-2 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nJanuary 19, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : xorg-server, libxfont, xfree86\nVulnerability : several\nProblem type : local\nDebian-specific: no\nCVE Id(s) : CVE-2007-5760 CVE-2007-5958 CVE-2007-6427 CVE-2007-6428 CVE-2007-6429 CVE-2008-0006\n\nThe X.org fix for CVE-2007-6429 introduced a regression in the MIT-SHM\nextension, which prevented the start of a few applications. This update\nfixes this problem and also references the patch for CVE-2008-0006,\nwhich was included in the previous update, but not mentioned in the\nadvisory text.\n\nSeveral local vulnerabilities have been discovered in the X.Org X\nserver. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2007-5760\n\n "regenrecht" discovered that missing input sanitising within\n the XFree86-Misc extension may lead to local privilege escalation.\n\nCVE-2007-5958\n\n It was discovered that error messages of security policy file\n handling may lead to a minor information leak disclosing the\n existance of files otherwise unaccessible to the user.\n\nCVE-2007-6427\n\n "regenrecht" discovered that missing input sanitising within\n the XInput-Misc extension may lead to local privilege escalation.\n\nCVE-2007-6428\n\n "regenrecht" discovered that missing input sanitising within\n the TOG-CUP extension may lead to disclosure of memory contents.\n\nCVE-2007-6429\n\n "regenrecht" discovered that integer overflows in the EVI\n and MIT-SHM extensions may lead to local privilege escalation.\n\nCVE-2008-0006\n\n It was discovered that insufficient validation of PCF fonts could lead\n to local privilege escalation.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2:1.4.1~git20080118-1 of xorg-server and version 1:1.3.1-2\nof libxfont.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 1.1.1-21etch3 or xorg-server and 1.2.2-2.etch1 of libxfont.\n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 4.3.0.dfsg.1-14sarge6 of xfree86.\n\nWe recommend that you upgrade your libxfont abd xorg-server packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\n\nDebian 4.0 (stable)\n- -------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1.orig.tar.gz\n Size/MD5 checksum: 8388609 15852049050e49f380f953d8715500b9\n http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1-21etch3.dsc\n Size/MD5 checksum: 1989 119b43cf5228da9ad961872deb2d0c9d\n http://security.debian.org/pool/updates/main/x/xorg-server/xorg-server_1.1.1-21etch3.diff.gz\n Size/MD5 checksum: 628625 9c0630bfcbb71de0dfea84e68ac456bb\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_alpha.deb\n Size/MD5 checksum: 4454468 60f2b9ad7ae4566d510b6c0b50204362\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_alpha.deb\n Size/MD5 checksum: 352750 b0e52131018b7285e4c114bfa016e9f9\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_alpha.deb\n Size/MD5 checksum: 1763170 dd54b9946db4631ada943eee0364c925\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_alpha.deb\n Size/MD5 checksum: 1929118 5ec9778017b27ab173e2251938b61220\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_alpha.deb\n Size/MD5 checksum: 1029150 966b29289f512ef793d203ed31262ee4\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_alpha.deb\n Size/MD5 checksum: 137042 7e22737acb2aa983b069b814feb7b81e\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_alpha.deb\n Size/MD5 checksum: 1961118 e9f4270dbcf83c911d59352efa2a1908\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_amd64.deb\n Size/MD5 checksum: 1653614 d3cda50e7c554cd016993cc841c71d75\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_amd64.deb\n Size/MD5 checksum: 1472080 418d9f792aa9adfe914f157a45825222\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_amd64.deb\n Size/MD5 checksum: 1622416 3e40f3065f4ba487d1a08e0ccaa065d0\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_amd64.deb\n Size/MD5 checksum: 350678 48a83d1eb1a695c9352b6c628713d9b8\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_amd64.deb\n Size/MD5 checksum: 133718 f9b35dc0bcce4c2ae91f90cb4f93bb9e\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_amd64.deb\n Size/MD5 checksum: 3918472 8431290ddf457274980a211191903024\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_amd64.deb\n Size/MD5 checksum: 859466 ea9b9091c11d6054e56d4f913def0d55\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_hppa.deb\n Size/MD5 checksum: 909802 b21c1f8de6dc4807206b39cba0e91220\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_hppa.deb\n Size/MD5 checksum: 4384724 4cbae98cae61b969e55ba5c37357f663\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_hppa.deb\n Size/MD5 checksum: 131256 033a1de1ae8814a9426837a73f48e583\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_hppa.deb\n Size/MD5 checksum: 1851644 be73a338931d6fa4c90303a1b648f399\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_hppa.deb\n Size/MD5 checksum: 1819784 a0af7f9fa8e9047f286c88f74120c1f9\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_hppa.deb\n Size/MD5 checksum: 345320 8ac5a0dbaa98a5f82ce261d5ca91f767\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_hppa.deb\n Size/MD5 checksum: 1659928 8eada093e360830443db1edebdead01e\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_i386.deb\n Size/MD5 checksum: 1563004 69f6360fb08efaad149162ce9a778897\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_i386.deb\n Size/MD5 checksum: 3654526 71dfc82c68f371d2896dca3398bfa5a9\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_i386.deb\n Size/MD5 checksum: 1537800 e09d61914b5ba848fe0c3836096ca047\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_i386.deb\n Size/MD5 checksum: 121584 399cc7a3f9a8f804ab8513b32954ed18\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_i386.deb\n Size/MD5 checksum: 345290 33f9335e9d5ee15e2b75c039e6bee60f\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_i386.deb\n Size/MD5 checksum: 807980 d792de8900e686ac39bde7a3ab2b74fc\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_i386.deb\n Size/MD5 checksum: 1388142 cb3c394b77f895cc988ef371ad6f5631\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_ia64.deb\n Size/MD5 checksum: 1306300 3bb166a30d0d069b04c2ebd513b82b97\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_ia64.deb\n Size/MD5 checksum: 161446 d26106fc6fe4af224d9b8df24240dc82\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_ia64.deb\n Size/MD5 checksum: 345268 ab2bbc074e5a5ffeb6bc6f323960bd0d\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_ia64.deb\n Size/MD5 checksum: 2220124 b4f01efed9b68ab50ba7e988e3e71678\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_ia64.deb\n Size/MD5 checksum: 2448078 cdd739a53011c833d963516857e296f7\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_ia64.deb\n Size/MD5 checksum: 5491246 3e58ff551a8d468572324cc72de4970f\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_ia64.deb\n Size/MD5 checksum: 2496210 dfc8bf018f2feef8489b0f68944ac400\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_mips.deb\n Size/MD5 checksum: 1536954 9d4cab19fe0c9e74aa54bbba89019134\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_mips.deb\n Size/MD5 checksum: 3827444 55bc181d66441e1f3a2060ef1f710336\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_mips.deb\n Size/MD5 checksum: 1682048 287625ffab364f59e9fc6b195e5a77ea\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_mips.deb\n Size/MD5 checksum: 862018 888827ac92b7e3b64be2e282d96c89f8\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_mips.deb\n Size/MD5 checksum: 134500 87ea99dba65c9ce99ae4980fc9f7e46c\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_mips.deb\n Size/MD5 checksum: 1714804 6a6667ff271d4c484504d65605d51bae\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_mips.deb\n Size/MD5 checksum: 345334 85bc6af2bdeb7a23d6e5aecff5d4cc37\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_mipsel.deb\n Size/MD5 checksum: 345368 7a958b0f22afd9871f6446bba4b3cf51\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_mipsel.deb\n Size/MD5 checksum: 1708774 33ce39e063c99fffb62a109e893bf931\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_mipsel.deb\n Size/MD5 checksum: 1674422 963fce8b933bb7f263d316385944251d\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_mipsel.deb\n Size/MD5 checksum: 1528380 f3d43ecd546e19c29b374a947f913079\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_mipsel.deb\n Size/MD5 checksum: 3710574 b8e618cd02cd73f1f53d03528c55d4ca\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_mipsel.deb\n Size/MD5 checksum: 134708 3754fea84213a6a114e0cae629ddc633\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_mipsel.deb\n Size/MD5 checksum: 862086 59564b2d93e31dd1e9fc03f93d9ef714\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_powerpc.deb\n Size/MD5 checksum: 1448230 1e6faf8eae4917726ea7663f34d220f9\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_powerpc.deb\n Size/MD5 checksum: 1587198 13581984ebc724c169ffe0b9300d65dc\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_powerpc.deb\n Size/MD5 checksum: 345356 52752d72eacbeaa1d9d3ec89e4863c86\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_powerpc.deb\n Size/MD5 checksum: 842324 0ae4dbac3f72004a88110017cf3c5eed\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_powerpc.deb\n Size/MD5 checksum: 1612102 7120d310a9901aead6849c1a7ca950c1\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_powerpc.deb\n Size/MD5 checksum: 3983080 f9ea8fa75a5584200a9d3617dc99902b\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_powerpc.deb\n Size/MD5 checksum: 136746 ce9d3866a4f1ae384c76371143c9624d\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_s390.deb\n Size/MD5 checksum: 884868 4fb034b61177acb516d4f4096849d9fa\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_s390.deb\n Size/MD5 checksum: 345250 a8bea7bf8c643fadff197f7121d27b06\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_s390.deb\n Size/MD5 checksum: 1566278 bceff0a927797661f5b4a0c755e19475\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_s390.deb\n Size/MD5 checksum: 1709626 9b9344efb4f95676404b39b4613c1841\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_s390.deb\n Size/MD5 checksum: 130492 617803f3b3e9e9854ff850efb834bb37\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_s390.deb\n Size/MD5 checksum: 4132406 36921a15aa88e2c33552425ff7b408e4\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_s390.deb\n Size/MD5 checksum: 1740222 5d39b517eaa72af8e89521a240acbaf9\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xephyr_1.1.1-21etch3_sparc.deb\n Size/MD5 checksum: 1548492 6226fe67b76f3b53c1eefeb5ae6d1dd4\n http://security.debian.org/pool/updates/main/x/xorg-server/xvfb_1.1.1-21etch3_sparc.deb\n Size/MD5 checksum: 1524274 84a62d94a293a95a5a8a720a90553f38\n http://security.debian.org/pool/updates/main/x/xorg-server/xnest_1.1.1-21etch3_sparc.deb\n Size/MD5 checksum: 1391724 8d3951e962c0d9cb4eac8f44f1668d48\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx-tools_1.1.1-21etch3_sparc.deb\n Size/MD5 checksum: 119832 d7808d2f3ad69513af621c24a64864a5\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-core_1.1.1-21etch3_sparc.deb\n Size/MD5 checksum: 3697578 45501c7fc690f8130f2cccd97014a3ca\n http://security.debian.org/pool/updates/main/x/xorg-server/xdmx_1.1.1-21etch3_sparc.deb\n Size/MD5 checksum: 779216 bcceda76a9461e9a6633513c46fd3365\n http://security.debian.org/pool/updates/main/x/xorg-server/xserver-xorg-dev_1.1.1-21etch3_sparc.deb\n Size/MD5 checksum: 345748 2eccbc2e531b57c15fecad72f3ff44ac\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>", "cvss3": {}, "published": "2008-01-19T13:10:16", "type": "debian", "title": "[SECURITY] [DSA 1466-2] New xorg-server packages fix regression", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429", "CVE-2008-0006"], "modified": "2008-01-19T13:10:16", "id": "DEBIAN:DSA-1466-2:DFB61", "href": "https://lists.debian.org/debian-security-announce/2008/msg00027.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-05-02T17:21:04", "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1466-3 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nJanuary 21, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : xfree86\nVulnerability : several\nProblem type : local\nDebian-specific: no\nCVE Id(s) : CVE-2007-5760 CVE-2007-5958 CVE-2007-6427 CVE-2007-6428 CVE-2007-6429 CVE-2008-0006\n\nThe X.org fix for CVE-2007-6429 introduced a regression in the MIT-SHM\nextension, which prevented the start of a few applications. This update\nprovides updated packages for the xfree86 version included in Debian\nold stable (Sarge) in addition to the fixed packages for Debian stable\n(Etch), which were provided in DSA 1466-2.\n\nFor the oldstable distribution (etch), this problem has been fixed in\nversion 4.3.0.dfsg.1-14sarge7 of xfree86.\n\nFor the reference the original advisory text below:\n\nSeveral local vulnerabilities have been discovered in the X.Org X\nserver. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2007-5760\n\n "regenrecht" discovered that missing input sanitising within\n the XFree86-Misc extension may lead to local privilege escalation.\n\nCVE-2007-5958\n\n It was discovered that error messages of security policy file\n handling may lead to a minor information leak disclosing the\n existance of files otherwise unaccessible to the user.\n\nCVE-2007-6427\n\n "regenrecht" discovered that missing input sanitising within\n the XInput-Misc extension may lead to local privilege escalation.\n\nCVE-2007-6428\n\n "regenrecht" discovered that missing input sanitising within\n the TOG-CUP extension may lead to disclosure of memory contents.\n\nCVE-2007-6429\n\n "regenrecht" discovered that integer overflows in the EVI\n and MIT-SHM extensions may lead to local privilege escalation.\n\nCVE-2008-0006\n\n It was discovered that insufficient validation of PCF fonts could lead\n to local privilege escalation.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 2:1.4.1~git20080118-1 of xorg-server and version 1:1.3.1-2\nof libxfont.\n\nFor the stable distribution (etch), this problem has been fixed in\nversion 1.1.1-21etch3 or xorg-server and 1.2.2-2.etch1 of libxfont.\n\nWe recommend that you upgrade your X.org/Xfree86 packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\n\nDebian 3.1 (oldstable)\n- -------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/x/xfree86/xfree86_4.3.0.dfsg.1-14sarge7.dsc\n Size/MD5 checksum: 2642 44c8029d3d2404aa86eac248e785a2e4\n http://security.debian.org/pool/updates/main/x/xfree86/xfree86_4.3.0.dfsg.1.orig.tar.gz\n Size/MD5 checksum: 59123696 8e6990288c8f1a1d1e03f7c36d7185ee\n http://security.debian.org/pool/updates/main/x/xfree86/xfree86_4.3.0.dfsg.1-14sarge7.diff.gz\n Size/MD5 checksum: 3704201 e0701dd82a7ae2bf1a187a03d82d3055\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/x/xfree86/x-dev_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 216860 3c2794f97767185bda2eae75f6961388\n http://security.debian.org/pool/updates/main/x/xfree86/pm-dev_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 159824 761397e35647b1255e216628a0ad07a9\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-100dpi_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 4363482 ac82e6164ecb08d89d20bfab7fe182fa\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-pic_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 158934 a34f0dba035f3ec1a3f2959f83775bd4\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-75dpi-transcoded_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 7073334 a197e50c81aab52ce76209955b1af169\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-data_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 907322 46f161142baca3c6a5cb3fe5068a80aa\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-scalable_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 901462 7e43f056dfa076ed86430c953ecdbd79\n http://security.debian.org/pool/updates/main/x/xfree86/xfree86-common_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 815982 61cc68f92c774a57f32dc68d45abdc15\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-cyrillic_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 541626 bf424e0a2c4b90e67f84b9512f488ba9\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-100dpi-transcoded_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 8196456 add82a2b7398350ff6f6b234ceb9ce9e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 427124 f517d5e7f63e447079aadedd78b8b01a\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-base_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 5491086 5570bb2354c974697a54550498efd22b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dev_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 159026 3fb023592959ac5eed228b08a5f1f226\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dev_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 158964 8686146ce6a114151a63edbb32713edc\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-75dpi_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 3841236 7c4cd43cabb41b3d234300422ce47eaa\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 159120 2682ced6a860cfb2fa2717c33e2ffdb4\n http://security.debian.org/pool/updates/main/x/xfree86/xfonts-base-transcoded_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 1204330 ccd33ad78bc17d3e6f4e097ccd899c06\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-dbg_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 159030 4055854a053a7d3429194f482c742463\n http://security.debian.org/pool/updates/main/x/xfree86/xspecs_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 5836114 e67208edca691eb59f40900aeca46c58\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3-dbg_4.3.0.dfsg.1-14sarge7_all.deb\n Size/MD5 checksum: 158980 2659f087364da01e8ee850d2ee396c97\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 204896 cc29dda966a8261db12502c2151a6414\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 481382 99db585d2d32732dbef008ba2755e054\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 178332 306528b4705de97aea13f3129e388d84\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 2089790 b7be230375e6450ba4445ef0d02f98f1\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 1150954 8da0ba58e16b36893b0c26304923499b\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 184816 6d7481ca44483e77498f6585eb450eb8\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 159048 842c78043bea3d4c64d41f9cf2b26445\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 33948500 a7a7ed4f918f814718f9bcc99b32cde5\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 173770 67e4d30bbbfd015636a1ba12fb6d807a\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 822556 c4a8e71df3b0b79f7b62cdb12399a7c0\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 1007486 72d0a227336eff1d3a742d1da202010f\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 523288 6739565b5fcdd36d11e7897b5be41dbc\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 241176 bac67d20432bf0b99c17737d7a6b0f29\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 490354 2746734c1739950b23c69b9f504b71b8\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 1587422 f67c15d64d75516e3c900ad544d4e83f\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 165062 b30e7fb5006317a780b86a3f72f0a069\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 212474 56cf524cdb239210f593190b84426ead\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 289942 c1a7298428d7b2546f01eee0e8b21fa8\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 441470 e40b528295bc52e5b4a38afa481484a9\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 1183146 6df49c160f3ee9c17cd75f315652699e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 4641240 cd719f57cc8455c9879ecaa9dfdedd26\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 817090 e9fff0a77e21ba84e1c33085df739233\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 186626 5241181cfaf3c5168d10abd4a2e49d21\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 523190 db2ffff2f2b46e03fff2a3125139a763\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 241850 542fe3e3f83648a6127ac8dd30ca9274\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 9805412 7a17a6c45f80503f12bd80072ce12abf\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 2272356 1e66a42725255e9bbc7f3e11fc825df3\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 185270 7031fb1da557904fe821a5c289e54dbf\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 176842 8831bcdddcca039996f3fb0e9cb2471f\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 313752 d25df8b772eb46adadaa7a0608361c5c\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 210328 304f74fd9b3ad556384237c33068aeaf\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 393418 ed44d1e5a052fef614aef97d5d2c62bd\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 254140 7d60cd0625cc339de78f9cc528ad7ad3\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 680476 84cdf3c441270dd3c69304c377eeccf5\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 537820 8eadb5c31afd3466c2270333592b58da\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 188218 5493b0d21a80b05b3e2e7977fc64da4b\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 601180 8281785f5ce14389661f668614739c6b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 351560 ade0599a69749ead840930885f6f24df\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 196006 22a1878cff1895c39bd89dd826bf0034\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 327512 c0b4d32ce70fc4698aa053ae98e5153b\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 220056 7c02456068af93613e87467df35c427b\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 6597308 cbb72b6572d59166ec41e6d346a53773\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 172940 89eebf554c87ae0430fb5851f52c1b0a\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 1100974 c0398c6e385a8a4c27e6dc1cdba48841\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 194064 04fbd32a8a5017fb6f856c0a5234b3a0\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 1034542 8787e4ad54666a49da0a52dfec7f8f68\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 158846 c9ccc7dad1906744cd83a3f13e628a82\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 522726 6fe0bd4160a994659d1e5523e0d37e53\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 1576644 cae33ef0e09c6aa63440e1faf78d0719\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 174796 8dd8cca25658d2c312e630857ca35971\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 1114936 a57d95a1514c13b0d9bbcfb48f7fdc1d\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 203448 63411451168bf844e773fb43b3935400\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 361566 865cbf75bb9b8ec17b5bd266e7cbc910\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 247308 1596c1c8d61addcdda02e2e983b379c0\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 811940 73eb53a624083c093b8b6167d1deac1b\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 934456 f368d98f4a733d7ad6846d9b7387bb2b\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 332108 bcd58c6eb66ead7b1a98799fb3070114\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 318022 c214755adf3923732ae537ece98d423e\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 383070 3dd6c0e395e369d4df9a3325e8974184\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 184568 a73464682a753a86882da22f3113d5f9\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 1339800 a1cfe841d71080e7db1b15a292c73bff\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 45042284 857d2bd872fde9d6d0988c8e877239f9\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 412302 afe52b268ec0035913a28292930d9ebe\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 295878 87d4cd59d091dbc4470c446009bfe00e\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 184798 2b55693f3f5e3b97987b9c6353964322\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 550388 f2d8972bdf1ac78f15bf47e8fa5da7ba\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 206560 9d2cc428cc34b405f99fca70857dfca8\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 159100 be35cd460f45fd5357d979892da7423f\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 285306 ad19a3611262d921e8c8394f4c098142\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 183432 128679b6406516761f0e5ccab6456ef2\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 816418 e4238e74be5aa0f380aa61816e0b2f39\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 265538 a9e186b0b95b4cbfa500b5902dd88de1\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 576466 3f22d4f3c623b343892b8fda797de225\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 185338 687c116de80a5fe7f030ac18fa3cd4b2\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 210240 722134a3da3f10011d4ad0b43e370f27\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 173248 5d3c8a437a8c44dbb975b91838d818e5\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 230922 25d481ec4d39f52642781f3de32d776c\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 4559274 5ebcb42b768a01a47ef2662aad5c8663\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 192104 792690e490c9107d0b03503459bedd0b\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 210466 d3a22185666971eac44e7b8f4a7ec003\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 713404 7b8ff53e3823b4a57e3977611dc50417\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 245362 5002d111412e43dfe0da8f3e61d76184\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 196778 9266e26c7625990322bd3e9e3803b6fd\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_alpha.deb\n Size/MD5 checksum: 2376700 b71558e8174f2f4dccf3f7850aba73e4\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 208200 b9932d94b0dccb9fed31aebd358201df\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 210236 f50f155aab34182ddf1cd164aeaeb908\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 187598 373be65f37cf081e19e18c2ed30a9d0d\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 318618 a53d1dbd30091c9d97e6cfbda65d2238\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 205774 bd56752e811684a0a529c6ab638e1c39\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 295560 73868f3f301d365b99cf6026b586637a\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 289370 c28b24f741df4e957beb3b76ea91a1f6\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 182806 805721da64e288ca657c61b98b89c96d\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 236758 444735afe9470bea708848908eea4a81\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 209338 12885282d59f6e5d2924936d96d532dc\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 413522 1fcea891e52affb27304889ba6260a1d\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 1764708 77d350e9a729c7197c858306d4022153\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 521926 98e0aa765b082b74501d67cc27511e2d\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 172500 5926d5ff02deee38fffcd463e0ee2044\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 1422266 9aededb10a34581df710b027e820d073\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 644702 6558c5d9f307b6d931db18c5dea747d4\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 247894 3c307d92ee9d6f382b840d4f68b7d7e2\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 962746 725b50282c20abc376512cfb47aa05ff\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 212670 ff8186c1a0e4aa7d528a828ef1ae7226\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 6039594 2de798c199ba56435e2577db2bc4a41c\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 749808 093d24bbe24076f612460d3b09365097\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 172324 4ee31b502d93e7ef65971d0d25ab4898\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 4203274 18a344f4e461e10196984a966d63a9a5\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 351288 0929c16974fe767132fde8426a7f1705\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 201702 ac7c54c3704eae10a453d03fc2094fe0\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 204836 6dcd4a8607e2a29cbf8c3936c2bac999\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 2084348 f204e5e81af18e942873c08d1981af16\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 1168692 546bab2d80d4d0a257d02d58785a47c2\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 159176 df384c9ae68f29148f7a12d23712aec4\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 5696618 10caadb29a262953664c7be36e2fe055\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 441096 bf905de735f9e1f9a7a921e71ab1db3e\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 277772 baa0fde3169e1323f5111e1800bdf128\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 798486 8caf91d1870fde7032893a6054e7547c\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 173930 49e6c39d7fa52b141ab92b85fd2c6667\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 38019130 e002b57b90655014cdb170605c4ec01c\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 513012 9a4539003aa3a1a06e981fbc13bc0d51\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 337540 ba7696ea67fdfdc4a79d15b91e33a736\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 476878 9f2143f1dc9f18c5c88e7964321872c8\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 569858 ddda122c4c22e645cbc8b0d356d9fa9b\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 182918 20b874f12403dea7d69b598017d913c7\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 1123092 7ec5211f1bf92507780bb8a36746db75\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 1552510 7a179cf2a6eec26017bf8c1291233870\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 1044864 082bbe5f19f7e19c59358822f2a2c3e6\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 789554 3231494bb777bbb83788ebc2ba81d9ef\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 183848 0da8c1f4a6dcb5c40a75fec7969c88cb\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 9651732 8e6fb7b901921b90b914c543095083ab\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 400688 fa26d447c215fff2ae22a533f5f9d73b\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 233480 457370d3ce202ccd007ae7df85a22039\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 367648 11b447d3972398d027310bb898fcb490\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 663236 759600127ae26b3c70962bb2146a385f\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 346444 b44687d662c8e153cf575adfc70e107d\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 159232 b6aaa8afa0c0ec8821b9c5da6b5b8de3\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 181976 1e114441b3fd68a5d902adff385c8b10\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 158982 b74ee8181ad8d582a4b37009a023bf61\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 198334 8ae59ee2419248eb109ceacbcafa5f53\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 441004 9cacbd32858a67711603e9d456ba190e\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 197698 bb34173414ea7a6838621d977b43b118\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 517000 11bebb11495669a6abc73d33067aab48\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 299682 8989f744aa3211b41b3c4701093fa3ee\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 1317294 f4e0c8e81a7a4f2bb6fcb3f13e6b516e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 686998 300300d29182775f10b65bd61d4bd41f\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 890062 0de1344da65766a53a1239c6f843a752\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 184068 17c9faf6ae79d5e0e0e5cae7306d35d8\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 193334 bf10e73854fdd8e0608ca1bd09992727\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 175816 3c350f7c6c3238b02157bc1c16e173ca\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 180896 96a6bdb4d0bf30a6ba5e5b9980ba05e6\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 180870 f7be5629445190527737133cabaef0fa\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 262688 203587193a3a0c624e63d1419e2ad8e5\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 238022 c695a2a21f1f34cda18d573964213c90\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 904158 0d9351ebac3aa0265071d47621c0a4b9\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 172486 a6ad7aa84f9b4a368f707ac33c8b2b42\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 735636 f8c5085fe4b0cec49c1db2c70578fff5\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 178792 b22d619db9346dc591b4cf77a16f1246\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 163844 8e8a45b69c4d847d232705860cb926bd\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 368712 f08eb78da51d13c6418cc7575d799f1b\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 1621132 ff06f3621fae14618731fd3ebd271cf7\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 4490368 4c1ced4b9c9cbc27c1b1ac89a35347f6\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 251784 e8226dfaf653f62a12fab03246ed63ca\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 460872 d60b54d7e536e9695ac5eb2481cd3d44\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 192076 1f164ab9f0cb637008f229ccac42028e\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 191540 87a82ff0b024e343983ca2a641d7bb3c\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 172382 a43e4fb557c8e850dab781fd100cda54\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 226418 b89bf7f6c4f211e04cf78cdfedbd235b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_amd64.deb\n Size/MD5 checksum: 333946 046eb71cbb688b74f48489f9dd68bab6\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 180018 2b40e6151c50e6f49cf7b42ce5ea926a\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 257732 88cb3b69ec54749c5bed216ee8020564\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 1700780 a33526630725b95cb22dad9afe819e35\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 440588 421f33efa8ecd42f9c57264ee2a47c26\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 226566 33d282ee24a57df03fdb094e071238b1\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 181168 1674899493ab4e9dc7b20362b97a6d32\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 1540064 2f1d7ab600336157a111d9c4c828c633\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 175228 ce5aeb0ca2ac47e4f238d3861f4d9483\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 1030122 79d06eab408da844573e7733d7d22fe3\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 238242 39a577ad92e9612d60ac7d936d494bcb\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 180190 4f5d554cdd86ed7a11bfe3bf6e85b83f\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 276326 4d002e80de5d218e7a0b2645b2706dc5\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 163638 6b8abc1bdc000a5d526fd073acba1450\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 281416 7b3b715b31b0655bd007289a6570878d\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 274186 d1e30802678a0046d767203894b56452\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 512146 113c128cfd8e657abdcff6f641e4f949\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 895634 2748daec3ebed602fdffb67a39bf71bb\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 158844 3b231973fd09897bbb4bdb84f27380dd\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 1953356 ade022d36caf2a2e003a273ca4478024\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 198944 2519c5ca57136c3370a8e495e4ee1e06\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 1098940 409df2e41e437825e1d30f866205bc62\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 569528 c6bac338b62d33503cea5c9a08c9bb4f\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 189220 a7380e7196ab1f3241a68dcfacef450e\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 172050 1b6d8661824e48b4ba356fe8cb19be7c\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 209010 526ad60941812965b5fb7954a5920bc3\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 172014 a9190a771f8efdc2c12fa47f6982b8eb\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 159094 28dee3b716a91934cb06b6b7617e5e0b\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 205278 bfbbf15beba55ad44a79a415320322b0\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 732058 d01099d85aee311ed80f5d00935cb78d\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 337856 9b25481ebc48037754b189bc59527d90\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 192254 7788add37808cebeb85db9f74d9f49ea\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 310720 e9e141cf580f9a965917567b19d6bf7a\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 440686 ff3a1ce037b7803fe8d6abb02c75ecdb\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 413874 436ed7211ad8f1ec224c97ff3b345c66\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 173210 2ef9b04b1b3621bb4a39b70168151675\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 665292 86b4c6150d3736ebfdfbb3acfbe4677b\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 189374 423938f52a2ca71ef6d649c819d76d00\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 174046 4f16ed67f9c0294fd1984ff87e87abf7\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 285890 a8c5233cf3943bbb5c0264746fa2f7d7\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 182028 96149b3132649f2ce6424d97b669800f\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 353344 d036cec4cef0b27eb5ce8874376bc859\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 914656 bed648a04b1538c109ac2dd025b6c252\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 507512 e18c1f5390c87ca1338424145753437b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 412082 12285c02bd68ab7f740bb452e62215c2\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 201818 ad266de7b2ef8732f2f92e48ef2b3c0d\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 182186 b715dffeaa1477437b70f9ac890a948f\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 178916 2138107db240144e0da53f64a64fe37a\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 9662800 455775a2e114aec11e44ce1aa4f68a60\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 471614 75c6db532e87f5dbf33f65dfebc8587e\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 201216 825592f02f2321aa252fc53b8e1de2af\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 209288 c1a4f14009308dc99b2ec2f461356a01\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 710004 e09c27d757075f76be04878dcccb362c\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 194796 3789d70bd6669deb225b5ca1c996690a\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 328036 a6cc918290750757f1b275b2ee25a3c9\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 180986 e79aba785649bd111c298a5674f897bd\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 459398 129d28e56606b8bc5a880335487c5b4e\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 224610 6c42b6adc67255f310f5251144ae2a6e\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 255318 795acfc95c746bdfa500bc13e1a216ec\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 1192072 4c6211bd101e779f4136d4d7e6b83be4\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 204624 0eda4bcfe6481c2d3ac9e850d66ca398\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 500316 dcc92ef9a18049ef0ed2b9fc85252ac8\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 1558236 fa8bbbeefaec6c5557de236eadacbee5\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 43865320 80aeacbf4c708743264dcfa4348953fa\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 648650 95767af9bfdea319d6bc5cd1f0b4812f\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 1172778 2dae6a8fd20ecbfe282b957763cda1aa\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 208626 d0ad8b0571b9b4ba4bf1b3ea680eab1d\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 172652 ccb6c5c4596ff24fc34954d2194d75b9\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 359600 680f1e2f6716c2ab842320442049bbe8\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 178448 982d4a5db5569027779402fb69d59361\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 914116 a390c8ea4b9f5e790c0bc276ca359c98\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 284370 45979f63fce4c142c493b5c80911d41d\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 159048 28419ea455a241852e588737ad9daa2b\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 335820 6adf3fc810a4dce30916bc4b17342f9d\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 245282 a7410d1ebe5d8f0bacc30c68b0df3639\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 186648 9676b2899fb3e04f60c1381ac2a939b9\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 5534438 9de57b8a74600a4d3fb9fc4d511abfdf\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 779836 5a3caebdc3af3e4f2bda5c9067510545\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 1421038 50b07e36a5a7f989c394349ad77544eb\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_arm.deb\n Size/MD5 checksum: 234118 93b0cebe16f933989ffca3de03ae2e9c\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 780680 6ceff4bd4f4e9b634130463a74f49ca6\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 1203294 03513c2987e0c2f5cb0188002f37ee1b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 1261654 158fb61ee3aff3c0ec9d3c5b42cccbc9\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 455132 7d8fb98a29646f9e49eca3f10747387b\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 202394 5a9cfba11e73f44c4f8db8931d84422b\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 159226 d151fb4a3e9a44c6e2f2ab0d64360015\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 183390 f71451ec0b88dba29881ddabaea83563\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 404040 137c5c3a6f95dc661e35050303da45be\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 210806 a4a608f68a4b74cfb28352ad4510920d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 773470 387bc64c74c8d3eb10368ed1ba6b1f8c\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 251002 498e9ec45ce41f544b996377deaf1c82\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 547140 4e7f463bb105ccf3f127e24d8671c001\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 814132 1d01d28c66e7a908977c4f6c2a756fd7\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 234262 355a28b1faa7f2b1f0f31a5615076f37\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 9906732 88aade59c22190d85e9536ac926b81dc\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 208050 d17bc027aefcb269d9d3ef3bef135d6b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 1176332 a88ab026f7b6ea4f6c6de72239236d33\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 193830 fde80a036cbbf6ed9286c27b10d1719b\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 184308 542c9c841d0f4b9ec0f70e68be9b2ac8\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 665574 f45897e33ef0aa5c087828eb57ff71ab\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 4101186 8b2461bdf3e05ce8f2e4dca5df65e00f\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 530612 dcb24fc0609b06332a9187e9edb11df5\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 216586 a947f1d708f057ca2c7f0c3a6dcb5e52\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 280180 8b2ede1321f7db254ec02a9a1b65c69c\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 307476 b01d4c5191fc4ca09a57a469cbe0de0f\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 1071084 74ddd7f38f512c96af560e74dad271bd\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 194468 82b44817a27449f2934793a76568ede8\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 254158 1b2e2ee51cc037e2eda42a304eedd762\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 237984 a9f23414f736b1709160e859c7a802ec\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 45028470 611ac05e54fb136593187270ae453301\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 290744 c9b1bed2d9ab6c56824cb81d0afd34c5\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 265194 1af69579d4454225a891699cf97a31fc\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 455230 12ee53c9443e961be7f0d737b7243edf\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 182946 bea1fac3b6c8e5f6582277868cce34d0\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 525058 5fa97c9c3a8efe5a579248168c44785f\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 201920 1b24f9d70c453c31601b5b170d166bbe\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 339760 140b96f4f10a7c310fa65f1a2980ccec\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 230852 25c05ed50cf002c24d7342b3877700dc\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 182466 6f0ab716ff867c8948faafbc2bf8e173\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 497672 15689bbfe74298458c288a22060f6516\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 207338 e9e45e48fbd09582c47eea5e9a7ac5f1\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 176814 2ef23dc645998eb8a9f2c4aa8aba3a12\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 182026 5b56c34cc55d00edf4e779e063286b1e\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 1570322 3c614e7e1c3b3035ea9e4a7c92a9077a\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 192614 3be6c332b1ac704088488df28b7eff7c\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 183994 d79bdd3e074d71eb17a5d7c34507bf37\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 173076 6d92086e52f5c83842b50daf28facfff\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 173294 403e541b2329da40692f4728b6fbdbd4\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 178942 44a6fccb735e74fd1bd3aa8e2ef30af0\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 1804706 ffd44666bab5733951aac7505d6e6ebc\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 411384 78ab19e46485f3817af7974feaa9b55c\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 172788 101013073c519dfa07e5807d0d1dc0bc\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 956778 c87d2713396c185dac51e64e001f4851\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 1443688 a7d0b6c0905b3f6d1909a270f58c4d79\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 188086 8582e1f7c5b40ad3137e8df5eff54e11\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 159180 4164565c2b63d831141ff01eb9fd8000\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 212834 94a29d20c1fcc2d54116800f282c1ce8\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 977710 b3cb72cc3b27a0ee4f1960a1c1e7e436\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 684630 5277573279f7171332d64f2b14ac7c19\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 182960 210998226df0137214df40015910ae0d\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 367946 8b007518b810b53d8d3e30a0f9e6fae3\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 337888 0052206996a0f1d8643782189ff78e77\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 174548 f0839c33057f03ebd4d3cf5c1cbbb76f\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 173256 8107e808e0a1d5c62cf0455689c1711f\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 317618 371a8cabf68003c07c602f12c939f82f\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 483352 afdfc743c250a786cec57cdbb9403767\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 1970194 dc8cd3fdaa1d2e475081bd12bee5fa57\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 359082 e1cccfc611efc650663ce065ca68eb66\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 306938 0d448bde28b329f33b67fab613ddaf4b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 158980 d8467b14c26b77e567be88dafcfcfca2\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 927216 a9b05f12dbc99fac9b34e0f54e76335f\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 423164 815bfdfe2485324fd2dee02f0afd9227\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 202690 3105bb95367540c6beb2b4979219724f\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 578354 8f792a77777f01455d882b982a795553\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 205966 f4a5859f905069d226ef761c118dab7c\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 372692 acdf7ee2be0becabe61d35a9e8f82e70\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 239756 116fdca5f623e146757a44792dd9a4a2\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 164416 1b30c45358a5c97046a4aa9b937c7022\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_hppa.deb\n Size/MD5 checksum: 2117578 8756bf82e14b6e587743b43c45394244\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 163508 060746613787b0e3e1836dbf95cda458\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 236898 7db2a502177139d79e286bb3c853e173\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 286636 5c181138c570fcc57361c81171478956\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 1467900 c9688e4631f40a55390a66f72d8d82c4\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 662506 24657dfccbee487b514d41d418bb3a49\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 508024 74fa8ddd1dd5398eb16afd45f93c07eb\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 180956 b64dc413f65af959e73267e4b75c0b4c\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 410676 121256e9af1fd76bcaa60bcc5b2c8722\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 250616 1f074ebd29928b1214a5a428711dd55c\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 205762 2a3201487e5bb6b034fa747b0660e0cc\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 171926 8514aa6a7d7d0e7b3a8dcc7910a12cdb\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 218788 05383e61d19a72e536ddca5c1812c0cd\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 1026030 ce219a379c8d7d0a4d25223be87f29cf\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 196282 79abbabec8f54dc89113ad7649e9e683\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 208916 51c8839ace23ac8b121ecbd8e2972f93\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 179432 3386bcc0b6e3e4a17f85f7c421340013\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 435484 ca05fd83e1bd91422cc1fb48df1e8645\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 173014 34955f680d244d187e677d3932b48ff6\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 366446 d7514d171428192c6879bd584904ab6d\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 177110 6f8af03d2d36162d8e3ea80dacd077f9\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 181666 0777d6fb04858b6c4d69523a0f853caa\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 203488 cbad5e9f722af2ae43b46279f0b91f9a\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 414670 7d20d837941d3fa926c9748d96dcf68e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 283842 05fc5b0535766b7f31058d69306f8199\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 185278 a1725be0bb4be9be6e6001f639b03420\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 614772 adef23e1af2a3e9b3905762514c3a225\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 245708 a4d110acc26f1d2e0d164debf8949ff6\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 285804 5e6bf8164f049c51837211194dc8b971\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 210238 add8cb3792b05b5ce6d210a90c24c540\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 180972 6b1a91af77669361dcca6911a1e9db73\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 227374 442b4be680e8b353ea955cf895efc7b8\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 5744636 037bf58feeeace9a772de266b84b0c09\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 174878 934f5db88c9ac7fb49dcae4bd1c30405\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 1604314 7d55c4d1edd8c0f5606e715cd073738d\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 1358824 e78aac5116f5b816b68784e6e2e95f9b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 5009554 e709909365f9f311d24d28dc17590076\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 913494 e57ab1055b208e0ee1bfe9779850a920\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 188854 a21736d831443a3d768f074c46bef369\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 183164 f9d37b1dd1e520846ffe6bfe5021fbed\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 1231458 04eb55b25359b36fa185ec3139aa48a1\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 725588 f2c13a89ba61202e9a59de3da9c64e28\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 1941968 5925fce80c1c0172b4ac30a164d0fdff\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 9602572 2421effd6d76b0321cf6752e2a516e97\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 231526 f2485d452f18d36d40476bd5a349e6e7\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 1111502 734dac68852c6c76a8323d6d05aa54f8\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 191184 1172fe8d615d608245c7e489b4a846ad\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 337256 8c7e6147573859bae59c0b29633ace72\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 342658 2e0ee0b6fd4322141e1e9897db53b479\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 1530894 2cd959d1633aa604c90da7f9ae04af93\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 200754 082db72edb8f32e4128b8fd354cb0147\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 172164 d2d2a7c76b9055f12aab6cfa4bd5eec1\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 384924 d13fae2aac7ec9f9ca7e4355dba6f48e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 790704 a9da1472f4f5a25e7e374ce7f3404df0\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 265520 48cadcaf99c52e1c119280899df58603\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 783222 7a98b639919325c3892edaad56c96872\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 54939310 ef82286b8afb684a5ad7ada09dda1fdf\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 190982 57e7e4ce26d1a1cf749be995655e5cdc\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 565728 0ca17ffa0777c1e50f0ef54217884c2a\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 470306 cdd7ef5e4137fe41390dd29f100d5cf8\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 179102 8a1d85244d5b9dafdc39b56ed2f9481d\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 1167120 3512937781804c15e4e85135cffb8763\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 158992 4d88f7d41c1bc2b1eccb96bd99b188ab\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 49485866 6a219f6adf8517f7df616093fc3a727a\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 329784 8ea582a72666facdc33be2a084f08dac\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 171496 578570a38e90db17e89ec7da138f983a\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 205756 a8d42295d97d8ba15f81969c849f46bf\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 286556 1df4a99e52a56daf4c2ab941dbcd1e6c\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 194066 46db4e0477d5c8cc0d9a1ab57c92ddee\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 203910 77b520ed661a68c92f1029a625a29465\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 890962 58ffce5b5b972f99a27cb9f1a5e22847\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 4580342 28d5806e16c5dd94a0610b553943a022\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 497642 ae9befd0da77123bed8d4f0f936234a3\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 179974 ff47d37cf91e957be6467c02a00f0aee\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 159192 b36faef04091915c3db2a9a2e21fcf4e\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 660372 85ebf82e6703f328ec98ecf3a8194495\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 247262 693680339faa5a9f1cdc93b656d5f81c\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 310032 7d863534b438e3b386ade04012751b8d\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 414570 1c0b3557161abe33715e0924da10f2b3\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 159242 368713e7da83a0e3eee4e36fa0225c50\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 170304 f55fe4469353814a28d88a64d783bc19\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 855570 a3743faa69655370c24fcc81e7e94559\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 339044 f158b46a2b7788371a6a5d552b53874d\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 509808 ec0c5a1f2dee7ac8ae9358f5cad15d78\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_i386.deb\n Size/MD5 checksum: 705510 0e67e028c50fc2bee70d6149b2684e10\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 415592 d7111641dd7eb41615ce262fd7a73d2c\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 553912 8b6f4a2dcfda697d2cfc1fd3dbf33f5e\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 302258 428d55263f04796d05a5e8e58c8c46cd\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 582302 4d0a9d2e141a20daf5603e538c6ee64c\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 1324916 fbd750dd5ac4f7bb4f5e9877f4a4e0cb\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 1134040 e75a18457a04a6a4c3ebe1c9793b6915\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 264952 913f5b4a856457bb2e02d8e24d4fe472\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 545798 d1396b7675ae36a041e1e33549d996bd\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 188256 477602771d931ed333cbe03eee030234\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 350092 3f56ca1b0d4e29dcdd8097fe1eaa52d7\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 262004 f366e92c3cf5929bd6071ae1fb614df8\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 411224 295c15d76131b5e320c5269d9cc3dae7\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 208284 30ce096cd26436748d1a2ea5bfd71672\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 165334 b084861423623435b8fab3d21df4f785\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 242588 c0e3f1bdc9eca97222473c8733548241\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 184172 ffdbc41a0d0dcdf44f37a76be3ca4d80\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 201226 d9ae56353dcd99a7ff222a3534a54dab\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 189044 348a3ec20ce08f997107f81a2ca72863\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 797470 75dc331e3ac9df485f8acbdcac975738\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 204768 b7a855b13edff8fc052b01b9cf39c246\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 307390 3849181a136ff4051ff7768ef35302e4\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 525476 c58c3a83bd6075a1b1a5cfb973ad7c51\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 185634 74ddc491d82944e4bf4d02ba73077b53\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 174870 a4c86342aea603a7742e5d2d5e82df4e\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 577898 9b5fabecf1d13d24542926670e5c7dcb\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 176670 c30defa2ad978bd5052b921c4a0b1a0c\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 4774070 147526b58ffcd15e83a4fa93ec62789f\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 837124 bbb0c1ab0430d03c48926aaebf27d751\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 335732 4292cd46a5e295d7ac6591736dc43d97\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 485244 fb7b111fa4e16c4af9701b23993ce7bb\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 187108 81accf922558c6f6e91787c44d14f779\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 2611892 12d3debb872dd2f35039fd30bc65f90d\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 241804 a477c64111281bcc774877780aac4195\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 947086 1f362e8f86038933ec849eb807a3a6ca\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 212006 dd59b7e8c76dd3ce5c322c0a17237d48\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 9888340 36a0be23911b15d80837f346483bfae3\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 174990 81b03b660aec83dcdcde6f0a8991cd91\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 1606550 092460c71c5c487af7d37764977ae029\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 1201354 25a2dbec4c00ba70382a7ad0685df679\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 2774764 5979ea1fadcf9406e427a5bb1b28c939\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 1185350 2223a59ef33d947c77b0c5973f8a7437\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 8122158 b00a5fcc1ea2f63faca3dc8ca2cd8f3a\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 424016 ac488f6cf23e961a8b8f023964bcaa19\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 734986 fea827145e2e838016f70e004b926d94\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 2384832 48ac37e39aac903d4a5ce0f77c7b451f\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 971704 4611dea0967c555db6e9b115c99d47ab\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 312704 4268b4ab17121b73fad57bfa363b365b\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 177230 415174d1b9f565a4769b8490908b923a\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 348286 af3902e03332f560ee9ec37a746693cf\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 220912 e9581cb9b831e77ab7882bf0d059e8dc\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 159230 8fbccf7c3a110ad73f24ce88fe57a268\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 8458890 8b41a40630a9aecf1b1e8ca313069da9\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 187296 83a864840a7eab1321264ee1e957f9e0\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 545702 74af655d42ed4759016ebb5ba8f48b11\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 355822 ac1acd804028e7e4c333296851893962\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 494956 b8d6c4ac4e4576266f66071ae6d2679a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 447926 9b400e5a5b902495b8cdb6e5ae97b0ce\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 201706 6a4a584d0aee626884f2ff12a01dd83b\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 195180 900ef5aacf6068505cdd87dadf4076f3\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 437552 a0e629fd870f9eead723787f5896a702\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 192954 d8eeafdab420ad44ea0bb0f0469d0fa9\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 189242 97f024909b26016abf0351abc67468d6\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 1081488 9c08f289c95a00aa79986ba95d022699\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 180434 19e7916b1ac86db086aedfe81659a627\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 906730 6e6000da430a4ce07f605356ab02af2e\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 1628016 20a48b8da5f46990d6d566e5d5ebf59f\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 690184 2cf9c822f82d54ed6272946cb4ee26ee\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 188720 26d7b80fe90b143335b25b4b7d581a67\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 248330 71829a6728bdbdeaf535a03283dbc4e5\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 230388 7180ca794d71fa684abd423a5c3a655e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 1166286 4fc7e7d33759acbfe8484b6a9dfd11d1\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 158978 8378b435536dbb705f73de9739bcef6a\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 56518400 f8d3d1d8e82a74a1ff38c9a3778ac4f7\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 230468 d7768d3cb637b9c916946cbafbb61709\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 1155880 86a264c92ffaad2d07344f9563468e81\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 211080 89d160317cca3aa38a1eba3f8418fbef\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 260632 866306a50716b75489ac08a279af35fb\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 338992 c92d85c5bebde6861981719847aad29d\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 174032 99c96156f7b8ee20063a7a9a5d9e6f51\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 214482 3055cf637a70492f8305a6f2e6a757ff\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 159176 b5dc95df2a86e03a4760c058ed9c8224\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 51595546 48d27821d522dbe53b445a08339ae412\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 212826 8e1dca6938e8e58091e2bfadc12e2370\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_ia64.deb\n Size/MD5 checksum: 694118 0dd7e3035547dcf117419f51c6822979\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 210642 63a18a3678ee6abc948ab7f22fca656c\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 576844 aab495822f040f6958260becae434826\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 1144592 ab6e49fd27979ac807911ec3fc15744c\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 658828 f8a3af8c80566e8cadc26f5fca395e35\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 2108124 1ae7088677511f9e1011ae15abc1f704\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 384074 9d85b2fc563581f0275f59ab6aca0c22\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 279330 3f5330b88d78ff2556e96ed4a683f16f\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 337880 1587455139948d1a64b6269a496f6f0c\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 679396 44b50390183ac7859774a9e76d077179\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 192416 e34e4b2e81c5bfe84a95006f60f723d0\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 316798 c40720272f008385fa907e0060b33681\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 45544012 107038f5aa3a6165080eaae85a334a96\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 173536 e3ad893e63842f469d3b16accae571e6\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 209876 63ade102254e3b724949833824d49e49\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 246482 cf271d3c6c2894016434303dbdc0dd2a\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 189788 6f8cd51845a5d348b21df6a1546fbbb5\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 795292 97d05429c1c3de6c88215018ab558592\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 212822 9ff89143ced823828d845bcab3a9bb90\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 206164 d25be9a365e5d98535e8f0c5f403531c\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 4021920 1ecc97cf7e00553b3117dd7e62a32828\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 741532 7096f8ba274f1e082c3fdcf012f7dada\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 457570 49dc59e77e9a1a2728aa3524442c09b7\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 180714 1277e8d82ea8a59d0d1449f3ffb04300\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 1201116 f2721931779885aae9e3bfdfd7c2dbe5\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 1558828 3eb09b3bf617c7e5fbad5f25b9e2d042\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 337878 74e20262550a9cf491efe3510e7fcc7b\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 253838 784a12c2814ad7c9fb984df93b9e04a4\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 239274 4d926254134fb55cea84fbf1bb3706c6\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 164188 72b61c8e4ed1b8e65602a408ce233331\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 175660 49f14f60ca900537f9047712a7cce21e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 406396 cdc82aba3f5b4998f7b2a773c988e50b\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 482090 80321c6bb7dd4c6c310bd0605444cbe6\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 519944 bff54db022c43898c84504ec1c2181a3\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 530670 e96d33dee2edc75447c1821233ed00ec\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 240100 2c0ab2fe362cc4d423dfa4d06059e4d4\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 183018 f73bc88050943b9f105de9590e467a43\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 182278 c811bd46c063f08c3bb94f0bd37849e3\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 292304 cf2554ce86dba7ad8181d3e9d905f274\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 159178 0e4864576bb87c113cc03ae2c8f65400\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 284228 8f50b191974c8752f868df34285bc346\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 1737994 99af9eb5548a11b92b68fb8f6a59ecb7\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 229614 b1024fbd4325c68f8922012a46d71552\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 497446 df27d5a41a55396b034b30b1a21216ba\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 158978 0d6101ace2585783c1eda30cee37a0f1\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 172822 b37a1142c15724f88f19734b8059ee9b\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 286454 e8a23d8b2b90644c026fa8938bacb576\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 412344 4e01c3bea92379c61ad8dd7c088d624a\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 159222 18dc8b65d8d68e7fe913a8929ddb1b36\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 173248 d19002f755ae2479c93af4ad0549eac5\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 345882 70a743f25a6ce55890dee23af286f4c8\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 204660 0b878f84bbb0b8ad15129c01c59f8f32\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 201404 6e3c09ad9ae2b276e44a2200dcc4cc34\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 172368 2719862b147e0150874ef1778b79834e\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 269420 d06395641c15b36c674d66b6fcb11a9b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 934226 63357e7331884f9c6cfad3f49a45e59e\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 172282 494f98c0f576cc01a7e064f344bc2751\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 178708 8bf3aa3375b5b34a00b42570794206cd\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 200868 71a8a4874401cd806d47ed87111dfef1\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 188470 061730682fed5d09743aa617028d928f\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 184062 16be18731a1ae7846e3443aab5e5637e\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 915094 42076f86438f5c420ad4b7941f9fe9ef\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 1449004 bc5e85d6f798f4ae6839dd995636ac56\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 181340 15f09eb68958017c280233cff675ca07\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 1899402 830d59633824cd842fdde9a8c97418a0\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 457456 3673c66c5da381d4f621b1a055c1bac6\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 179014 9c1b67c52cf233b70f39d4e162f2ce62\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 181266 235d0851779eb5e6f74e8b5a32657579\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 1205568 cc7c9325a0db9e324a4b270140af7d26\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 373804 07dc66f94d2170fd60300c1fc5179b94\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 983772 39f06db20073758a5551629d34829571\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 753504 d70516df96ef12528fec8c48397a7656\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 1054256 1c0fa82c65e5b0ac865cdbb3bed19ffa\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 202078 326c04a196de2508675af9b564722115\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 191040 b7f5f297b29317e7bb28db6a8ba2f149\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 234762 71fb612c367f68e67fc37c764147be13\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 9875888 1794b38a4b7e5943cff6f371b552f3de\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 197304 02081e5162e51a6e70a2305ee764e2cd\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 283664 c6d9386c95d8973cf8aeea7e282fbfc5\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_mips.deb\n Size/MD5 checksum: 543494 33159727c69ae042e9a506f69f9c4ebf\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 1895452 dcb2dbc8d38d880479549d4d3f0d42c1\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 569702 7f07b8060f6adf371a416dd44edbbd38\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 658930 470e80ee3dcbabdbd326786eea9c740d\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 229826 02bbc9824e0d736683b2d2ac06c757d8\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 182340 162aab331da485b001486bf72e88b966\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 409766 9a3dff21452ce6134a6fd3eaec794b25\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 668108 f69f594ce5b5a43b7cf6c12fa09c7315\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 285612 d14e13fd8b88c2eddb1314dfb0bae38b\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 188472 6ba09d0f65c0b0975bf9af23a24ad261\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 209310 1ca6a26237a35133a9d8dae236add9a8\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 458050 9866e353ef447d1b197da6a9650353c1\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 337896 ebd6389b7ddb85cab5e2a9c420fe0a58\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 190906 8381df60dfb46f8da7f6f1ed502437f5\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 269092 35cbd66be1f525a8e72b3716b1758116\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 972392 eb558ce87447352ef7003ea429a07b01\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 1173220 b9902c65f46f9eddd9b3f231a74c89aa\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 930144 28b3465f9bfac4ac7b71d554f28b3d9e\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 457960 c055b5a207eec5c6ffd7c79be986faf4\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 740850 3ce2f2cacdf1a3e92bd1568980639422\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 474526 214037bb709c29f04f66c44aab0b0fd5\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 1181554 9404049230f2b748e13ae96110b595fd\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 201520 926451d7d1ba2a14f22923400d4fb508\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 159174 2a27cd724995636cab007949d3ba0aa6\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 784810 c052d239d456903dff0f2ff91967b3d7\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 904252 9599270228fe7230ee77a02f9815d23b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 498766 8ff3a780cf60139d2e781481d5f13b03\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 205842 a74a1b6dd7f21e199cc561c7e0d5f425\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 290832 bc281b05ef4cd61299bddaa6cd49b85e\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 9701168 5d8c04c1f9ccdfe0f3cb5813fce89358\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 179042 5bf8cad3a4a2abd47aaf4572af68d20d\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 1556670 42203f458a69fe4b0d0fecfd2df8b3d9\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 383888 3d96f26bd580c4a437af4e6bb69e7b20\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 234842 76c6926d6193a614f0df0fb66d26b1c4\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 197336 52cbc7b5dc4a0e7a059eca163aa0a696\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 175708 a7776c035f5b98b26cf86a3caa4ed373\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 183082 0367e11361b6556bbadba1f4e3f71f62\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 240236 c670ea20a900459aff79bbf1a3fc6f8b\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 173262 dbb8602694416ac4e912d8b6609d4fab\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 405486 8c4f6c1ca9a2d1861a1c433ef0eb13d3\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 181028 63a2358189cd1fbaa450dfdc1a7c9275\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 4016478 3347404bdd253a790adb10e47fbab1f9\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 201670 23397a178a71297ced87817d7253e83d\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 164192 3f7022c8a4c4fdfeb36b5b9ffcd82cc1\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 238402 3cf6b8c3ca71adccc55650203ec7763e\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 542390 f65ff5d7e6ff90777d5633647a61b170\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 529210 f568dff127083cedf5f34239edecae45\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 158978 b1952df0694135470f4c27c0b35da1d0\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 200864 5e0d53a16a79e2baf2c026e9f7e090ff\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 181166 4541843bfb6597b111ef54979c1d2889\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 1735580 8449d125d172c01b8aff49a2818394ec\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 740048 f88a542cd7096c0741200eae8bb11c60\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 282680 984196a7264af66a9defd24b23dd588f\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 316596 62b8681811b6f17efa7d0142e47e8b91\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 172846 69d9593a1c119b42ad36fcd9db3914ea\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 172342 f33b1a6b3bfeef6ae3bcfc22ebbce342\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 189666 be4aac7b51928bac3d35a4c2bb7451ff\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 246308 e0cd25444cd7fec2473eb2c487bc08c3\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 178620 d0157961428723a79f7f7aa11dd110a0\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 1041722 50e86ac640df8e59eb958bd3990c0b15\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 172250 921110120b8f30733f390e681e527094\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 1449150 9876239efab90e74ffe2852c55259081\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 44833150 1815e59d26bf4dfa7f852371c0c4b665\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 180750 8e561ad429d2db63194c92ff06be807b\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 212824 85056e8f104704f1f7a587172af8d9b5\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 280418 894fc09600201e73baf103632f12abed\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 253806 401951b52d9c428008f2ba41ec8c2dc8\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 184060 049b8c8ee0fc9dfac9b3a16f1358efc6\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 337430 9a42df78515e7e91def7086ffe5727be\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 1124044 0cc0313a69f1a17ab1fd1b5028267f03\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 344412 c616639e13b9a364fbf113c4e42b8935\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 159224 e17fa4cfe5bc2eabc1c07e38e06a615a\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 192472 29f923bec9299a2149c95b20e1fbd6f8\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 2104418 dd386afecac50c080e795eb4e4d0873a\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 210700 c869a280432d5f1f619c7a767ff6bf2c\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 278806 3cdaa8d5be4e5e0a87e071e8a0bc3b8e\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 173636 61b4cf2dd866a93477a9d694eafd126d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 373626 0476fb61071a895dd4a26772b0dfc49e\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 511852 3091fafcfd06199fb06085a789fde12e\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_mipsel.deb\n Size/MD5 checksum: 204178 07904f7b66b90cd641a253fc97e6fb02\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 441540 1e1775d95fc0a682bdd8d99899547db0\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 183300 634c2b90de62a26be98d014b6a960526\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 233396 105fa5cf314f3892ddd6a789118f2154\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 204840 81220f082dcd7de8e89627e581f57c05\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 190892 0913c2c18cbfa55a7f2bf5d556371b31\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 296272 84a7026816da47e6c4ebeda3249c03e1\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 337730 7b6b673edbe1e8c498f6efc47c33954f\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 174860 5658872fa7ffbeab62cd2dd0ca039a0d\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 693214 270ff9b2f83945dbde22403f99b7f08d\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 173726 648b50aa77e3ba1f9c867024a2bb39c3\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 441452 7b042b8a5c6ee2f7cdeaea8848e5429a\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 178538 19e7608b2127b2aa4e2a9913492b8741\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 184666 b6e7db48d1e41b34284981e0b714baf6\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 225598 e0b293bd6c74e7e18b5c8617e0d07d29\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 886142 01f2ce6419c1124c1b18afb78fdcc3b4\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 177232 6306ec7b484b3aff030041681d0bee14\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 212206 eec4a1e60b1b1e5f0238d599b700fedf\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 363728 4c3a2632f904a837253a0f79d76ea1b8\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 390548 0f5b554ae9cd50111e84df3bb6188ba1\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 1401048 8b648d1907638d26eee655778878b206\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 191664 ae517b0aa7376caf3b216b16096417a8\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 645778 8161b2d6af0073f5feaad8e4b2c0dd28\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 941958 b70ae8fed8f51c4e69769c43ed8d455f\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 337438 f4f67bdc7fe64268f3d99069a5e16c1d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 468996 312f3d823825609cf87ba6bbe2dc228f\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 808462 2ef4270d3b6257033f3f3459f14e4307\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 159176 b71729997caa02cc9945007d15e5bf7f\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 315352 df8accac782aa3baaf3186bd7a4b687d\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 174012 3efc223109aebd0f359aedf4b48218a6\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 739750 7969999917a479e8a4cfe2a250a35f60\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 3084374 f1e0de4762a372b64886810f2687b846\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 181264 649411dda1f05740eee4f6493c024e53\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 1134898 4b4e15cd3ec2d6fa18f946dfdd534527\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 181138 77eb98636815764ba19e7987946d8d96\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 172056 ad2834dca4056503bff2d691cff426cc\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 199268 fa742ac1fe509471163ff2d03fda24e1\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 164102 d76ed125d130d5e027bd052933fa3857\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 279828 25d9500c8fa2faed70323fa94cf0209f\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 832410 8a2d80d1d985ef04139505d016b9277d\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 6682802 903a12432ec28efa883177c510deb096\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 1584384 0ff910f206bda7c2514c18f36693530b\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 2249300 d041b2256c910cf445eb693162e57859\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 1335892 0c7171b0bd88cd93f054b2cad2f6af0c\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 158980 61c60a9d8421e8b265287eefe6dc82ef\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 159232 b4015b850c280643c694383b29b45d2d\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 182644 c01e838ea7404f7dd9e8c3196a7f6952\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 182142 df52eaace98860a52abe7f2e563d3013\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 250634 4745f4a4cf51772d0dddd8dbbedeb859\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 187092 4d38acc33f8174fc81d96421063ef551\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 1613528 f0ce422dd7470e180e676e2af764d852\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 1515014 07e4ebcb969b2296321b18749da29b25\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 1859520 551c54354120b5416cad19b7e83d011f\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 1007632 95a383ec270a419ac994938fe8cc67ee\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 192426 32431107f500834819b0fee309de3d60\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 372768 51600c32d4dac748312ae0615b099357\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 288666 934aca30b37301cd360a4ed96aa50c90\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 172294 d379c891497521fe4741aa61103b768a\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 259632 e142bcafc34491eab1a3b68b97565eca\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 221744 3db324e59567f3903201d5e07e3d4f1e\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 5797634 df8b798491953e1bf3cdec0eee03e565\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 210264 5dfa898b45a63ce506131bddcaca1c89\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 225512 9552c9971960613077e0df8a43d3d53d\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 405118 4ffa9d8db5dff476fae1da46c20d962d\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 554068 f77e19a24877fe092975564d5c24ada7\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 724586 a2d08effccf780f1a0d992aad61427b2\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 235586 cb3afad450f81f94932fc3bbab745f8a\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 515962 5221670176ff5514c5b861e2dc20ab24\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 199274 2c220504deb0285f2b43481d4e91ed05\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 690604 2123f9f86faaa84530d510e3272a252f\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 509284 1a0bd49b7c6e214a55da6ed490ff6ffc\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 343696 ae43d412c3a7cac81aabfe85709271ae\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 249988 78322dc2f5b338e041abc08638d1d840\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 1730332 8e8f1e28d80f8997265550724afeed27\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 183122 1335b4cad9c09913adaa37a4383c3506\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 734514 10f64f0f37edc79bafe3be94404bb1aa\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 42024658 8335de97409e67935fbd1398094b25d7\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 273054 3b7e0a7d9d1312f750fdadff50e2c2d0\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 297340 2bc8e906c38f183b500864bef26b5c28\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 233070 052d02e08d8b3fcebb8a621af06ee92f\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 464392 67713050a248806ac22ed454bae67729\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 46812064 4e16800474b007ee4a0961c02f93c49e\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 15238340 a7a99192a30572761c4de37d16d5f726\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 1905034 eb3de6fc1ca4383515c6161607a4c25d\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_powerpc.deb\n Size/MD5 checksum: 2113316 8806ac5b27ddb12e28bfca23d04c262d\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 731332 b56713403695898c1d720d94793d0749\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 1106378 6a144e2a6c3b9be7956b5a435a9804cd\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 182962 0ef33ce23c7492372666b53e45e7f174\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 356718 9e2f0a1f6b4035e1a6485944e71bde9a\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 522262 9fe3cfad94e1424a03a37daa8e06f9a7\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 183722 66bdc7710ab0d652410af327ef7fb247\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 173694 9385b37e326890cede8c1bcc6a343a32\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 250280 1ba3221b11c69c9e1be9e2522ff0d36d\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 527024 9fe3ca26a45f4c82456f1e89672d874c\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 1624504 7110c4cf467ef84f7617aa8c8df904ee\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 180858 503c810d1ce713ff2ca2d642bf11be9b\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 159224 1e9e7c19853f5113a248530c90467f0b\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 180956 643752ec409d05e40f9e04ba862fd516\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 258118 df61dba0b0db636cf102e2f3936a53bb\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 1203816 54163d853405e3d71be516ec652dfec7\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 300016 cb276e2899fc2c95d1d8eefcb7667f0c\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 1716614 9f6eba343109f04549c228e50cee0ea3\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 277028 17df9d0684c0fa62f5d70d5dc44e0ce1\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 191566 543f5fbce35ad6792c376322e618c37f\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 1197528 31858524cb5663c2f0cae4ae9d349c71\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 172098 6b126aa7fa53a21c48bd077131123139\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 862298 9c7b8ddf85607df4f4b727c62e50134b\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 369120 a392b6df6bdc5e3c645f822dd4a1c60a\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 171904 fd6be0b164feeda222b015d65c0f5a7c\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 180520 f44e5bcaea54a569dc612f46dd499ff7\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 331244 6b863c6d1809f504781c569498f876be\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 224738 db62e6e354c0671f829bbea46a7b0557\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 354754 fef56f01ac97264fe38bfbdb9729ad80\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 159164 2282176fabe1814314d1a966c2375a7a\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 202828 0ddb338b945e0c91e4067f7364083c4b\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 755326 9cd84a5f2f41eff6452df90dd1e9d9aa\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 158972 7ec6035216f639edb68e6663074266fc\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 214684 bc0ac8e5caa07131f7dfa092f51eb4df\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 210288 340c66bbcca03a8da1b605eb738886c5\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 191596 1a78bdcc8b376a78c9f5cb912d09c86d\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 530524 573526c3d41bbdc6ebf2075af55deee9\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 358962 a0a9d87e550dfc9345a0499ce71b5057\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 1311180 b5626665f2973f566aba344316dee690\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 489054 509c31aa25f48a0d6593140dcb0c0327\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 175766 816e6c31580b0b41ce01eaa873c69930\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 414054 872126405e421fbcdc885e74b9e28a73\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 198188 800349d84e02ff19c6d6a3d6381a4882\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 806844 714bd3cc6f19f3aa8b4909766679b798\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 349950 e0588b9ad9bfb837f7213a3667f50c5d\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 317278 9bb8d6438fe3cbe3d548e495bbdc7e37\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 1386094 31bf6b03a8ea53bc70c7bb19a4149f27\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 851454 8729ec95a937be4a60967d8ed16c4da4\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 235446 35e2ae3ae503ecf7996d45a9f48eae7e\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 182740 5d323df083055ceb238cf48e06c91364\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 438756 8f47fd57bd981c6c146cb7bc173a91dc\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 164410 f54d7ab5fa7636ef80d9fb499b9713eb\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 435112 ea5c50e07dd203d28b735201064cfbcc\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 636696 faf5413a74607bd5da3bd15519b2222f\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 206290 48a9c12072535a70d29ecb9cc2312a62\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 950650 b6d63c9548cf8b544833380b36139aff\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 209590 6bdabeb9ee3c3ee402e11026bc748fb0\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 337606 8a68988d634a420bf45841c7a876dffa\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 194202 1b337446f031d19492280b076912d7a0\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 261416 9d592a27153c2ffd5084e6845e738079\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 687596 29e375be0860d0098e3e43a4388c9487\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 205426 a6a3cffb932967310cb14807597bdae1\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 577268 3eb8ed9506329e839dd719a5bd09eb13\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 1593776 3a0887b636f5dc3aed53b7605601f001\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 435006 bd75e886e289384e468ce31a2de80d30\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 301912 d5d0fd5f372eb4a9388cc7a4f2a73fe0\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 188168 0bd6acda6f48ca8fff5be6007eb84532\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 172674 44a9ce8416691b651f1fff5352035e4f\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 207816 d1be17370f2b2f28b139ff85e14175b9\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 183836 1bdbd88f926d5498e06929fbb0959bf1\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 240198 716ba2989d1c89c0487a269badb6e515\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 172764 c24d9d53675d068f015853755e01e8e8\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 298630 e5b4ff4d19cbbfa648bbaa50f02d38d9\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 231568 e945e1d4a9ac0d7ea1398253151da0f3\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 9935670 74add36c050d39884656e0affb71e304\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 199324 6a3056c615e5cd770e539b9b8df9687b\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 1767848 1af479b7b6a20aed3c1039c58fb40dc8\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_s390.deb\n Size/MD5 checksum: 180106 10452cbc82aac38870ec462bb2bb43e4\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 195706 ac871943f1d6fc9868b61071f7e49dc4\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 1110834 e3b3cfac174167abe581a13714c02fa8\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 163750 9c85395ddf48edd5a09ccea540828907\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 219614 c64a3cb7047f00dda89952f8a32f08c3\n http://security.debian.org/pool/updates/main/x/xfree86/libxv-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 190836 724d8ad2ebc2507d9077e9885985c741\n http://security.debian.org/pool/updates/main/x/xfree86/libxi-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 231032 16cacad697a60e4bd15ca16a66a0d91a\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 696330 3720dc119639fa6802519a99344c0c5f\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-common_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 337232 fe94cd49c333373c79c5b8d755878561\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 9812442 927a08cdc3ee3a9fbc7aebac4ba70002\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 332198 4243ded339a211beb71684ef7e4b5898\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 673724 ee491cbecc1c71ec62bec9d786e8faed\n http://security.debian.org/pool/updates/main/x/xfree86/twm_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 268770 9622a4636d022a5318aae81b5b7be3af\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 181394 4cf83dba91993d54c51c07fd6ee191ca\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 170992 9b83f05896699594076cf899f00400e4\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 237564 180166d58e9aa04b952e6e1210dbb529\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 172286 b191c284704fd388785b8b2545ec127e\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 358362 b13cc4ab7d2fc055bae4e49fd234e68f\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa4-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 4596636 e0d9117e1fda020f1a676796917f59b8\n http://security.debian.org/pool/updates/main/x/xfree86/libxext-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 248030 c9bf1d8fc0983a593a9a72a3ab12f57d\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm4-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 241908 820f210b7b1cde7ef553c1e86bc5c78f\n http://security.debian.org/pool/updates/main/x/xfree86/libxmuu1-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 209536 81f345c3f1a38f76aebb1b0a1cbb7700\n http://security.debian.org/pool/updates/main/x/xfree86/xbase-clients_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 1935402 883b536e0c0bc44bd6e0e3562c1b4124\n http://security.debian.org/pool/updates/main/x/xfree86/libdps-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 344524 e3fa9f4454c78556c887108a141f8408\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa3_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 158970 41e34146b69d2d6749f8b5079bace05a\n http://security.debian.org/pool/updates/main/x/xfree86/libsm6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 205378 da8da2b01569e0dcfef168eca84791b2\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 49732240 41e5e473a8db907be8ad49455d4122ad\n http://security.debian.org/pool/updates/main/x/xfree86/libice-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 206556 fcf23ac74dda2b720e720d675ab094b9\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 1366510 e925bb3ca24658707006a4838dc48929\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 892590 e3da325290cadcc0932e328be058ee1c\n http://security.debian.org/pool/updates/main/x/xfree86/xfs_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 499506 edef1c25f481bd22052ebc3704fd9281\n http://security.debian.org/pool/updates/main/x/xfree86/xutils_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 921406 93259ae26b611392ac49c709d93cbea6\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 706626 b37928eaeb6a6a5a42399a840abd372f\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 188364 a6e00632d866f83991de2a639db547f8\n http://security.debian.org/pool/updates/main/x/xfree86/xvfb_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 1626870 a7a260e78c4552cee03c0d217e8ead2b\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 1026904 74e6f485271cbd94f555af46a75b8df2\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 180054 c18a034e3d79f4431860bb641c595f02\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 179066 a1a5633b4c2865560cc37ab85bab0ab2\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 203402 495e96c44370b2e7d95f20b08ff10d16\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 280248 67071099524b17270ea3ff8484a87bef\n http://security.debian.org/pool/updates/main/x/xfree86/libxv1_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 172550 c4874f77537ad8cd052bdd59f5140cc9\n http://security.debian.org/pool/updates/main/x/xfree86/libxext6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 517156 6ccc7feb2db2ae4884473e3e3567e485\n http://security.debian.org/pool/updates/main/x/xfree86/libice6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 200822 9b866d83f5369d0237cb51f29831585d\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw6-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 417968 0d3ecb643d4440beaf8b0dc1a21862c9\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 159226 5906f1e22b2e5f5eea2f9f18bd8f1073\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 707198 aa48150c7d6dcb6f82a88f01c694bbb3\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-glu-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 442710 e56c2665ae69aa37c3ad33118efa2fd9\n http://security.debian.org/pool/updates/main/x/xfree86/libxtst6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 174756 a498907b7cce0b1f7d8c9dc57a3ddcf5\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 574328 bac50a0cf8d2c7e37e6e88bb5973b9c0\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 185468 1e8c3e569c8af7e3cbe0ab49a8720259\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 478634 3f4945936947b0d111221cdc674037c5\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 1533820 b7ae24344601f4b772becba24be401e9\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-dri-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 5584226 6df80639a053bf08afc1ae5c44bc6990\n http://security.debian.org/pool/updates/main/x/xfree86/xlibosmesa-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 823574 5cd8036fd17d077cec2f8b7903ff74c0\n http://security.debian.org/pool/updates/main/x/xfree86/libxp-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 179510 81227f6bd8be9e41c1aa2725680bc2bf\n http://security.debian.org/pool/updates/main/x/xfree86/proxymngr_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 182258 dd9f41d63a9be5de3ae304c826795ada\n http://security.debian.org/pool/updates/main/x/xfree86/libsm-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 177488 2765eebf56913137ee4aeba7eb6eadca\n http://security.debian.org/pool/updates/main/x/xfree86/libxp6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 178094 f64cf1bfd55182977e103f31ed4f7c42\n http://security.debian.org/pool/updates/main/x/xfree86/x-window-system-core_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 159172 7c9a98d4bcc8bf5b1a0e659dba31487a\n http://security.debian.org/pool/updates/main/x/xfree86/libxft1_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 190388 d79accc79d5d2876e642133c311aaa00\n http://security.debian.org/pool/updates/main/x/xfree86/libx11-6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 712428 f4dc666aeec60a5ac21d7f38726f3231\n http://security.debian.org/pool/updates/main/x/xfree86/libxtrap6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 410780 6ed904cfcaa45cb85e83f5c69438f190\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 287668 0453ee86a9205c3240632046c1b71aaf\n http://security.debian.org/pool/updates/main/x/xfree86/libxpm-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 194680 1e11e2b1bc284c0480213e259a1391bf\n http://security.debian.org/pool/updates/main/x/xfree86/libice6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 284034 5128fe71afdb47d1d8075514e22e9af4\n http://security.debian.org/pool/updates/main/x/xfree86/libxi6-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 1199132 00dc72db8a76e5ce14e21704693c813d\n http://security.debian.org/pool/updates/main/x/xfree86/libxt6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 330996 3077cdfcbbe949167eb1614d1dcef955\n http://security.debian.org/pool/updates/main/x/xfree86/xdm_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 308364 245256a1fd6509b5836623b0992349ce\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 863624 fa5c1091bad7b50379334e849ee987c7\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 171936 93b5410c2ad24e3cf9a497e7cda6ca38\n http://security.debian.org/pool/updates/main/x/xfree86/libxmu6_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 208734 28e268457795869f93fddd4636a8b105\n http://security.debian.org/pool/updates/main/x/xfree86/libxaw7-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 417870 2dcd268e275a6494831d1e53e63b5933\n http://security.debian.org/pool/updates/main/x/xfree86/lbxproxy_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 251676 6151fc07b10361903d42b97ca4a39804\n http://security.debian.org/pool/updates/main/x/xfree86/xlibs-static-pic_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 388056 ed0b63beba954828ea691c0cb07e6704\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 787398 9f74d8cd1064fb9cb2f94be4125b487c\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 171698 4e0134da09e4a57183b55246f75c9155\n http://security.debian.org/pool/updates/main/x/xfree86/libxrandr2-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 201140 1ec88a3ea2be39eafb3e246b0e885bbb\n http://security.debian.org/pool/updates/main/x/xfree86/libxt-dev_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 627760 fdceae16c5abaa9b5470ce3b93bc404b\n http://security.debian.org/pool/updates/main/x/xfree86/xfwp_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 181018 6104e6290fc074b5cb84955866b2be0e\n http://security.debian.org/pool/updates/main/x/xfree86/xterm_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 509316 9417f3680caf6edfadb4ced8a68d6570\n http://security.debian.org/pool/updates/main/x/xfree86/xlibmesa-gl-dbg_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 1253858 122c305c79cbf6b609c5d3339dd8c2bc\n http://security.debian.org/pool/updates/main/x/xfree86/xnest_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 1495594 70a813ab4c3ed16f8fecbabf0ea86044\n http://security.debian.org/pool/updates/main/x/xfree86/xserver-xfree86_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 5433158 c6563b3429835a48369faf82facaf74c\n http://security.debian.org/pool/updates/main/x/xfree86/libdps1_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 285644 93b7a87c7a396a2afa20a7c2cabf4bbc\n http://security.debian.org/pool/updates/main/x/xfree86/xmh_4.3.0.dfsg.1-14sarge7_sparc.deb\n Size/MD5 checksum: 226832 a4188f70971ffbe4d8b5229a34b23bea\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>", "cvss3": {}, "published": "2008-01-21T18:53:21", "type": "debian", "title": "[SECURITY] [DSA 1466-3] New xfree86 packages fix regression", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429", "CVE-2008-0006"], "modified": "2008-01-21T18:53:21", "id": "DEBIAN:DSA-1466-3:2D9E7", "href": "https://lists.debian.org/debian-security-announce/2008/msg00033.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2023-05-18T14:26:47", "description": "This update fixes various Xserver security issues.\n\n - File existence disclosure vulnerability. (CVE-2007-5958)\n\n - XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427].\n\n - TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428].\n\n - EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429].\n\n - MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429].\n\n - XFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760].\n\n - PCF font parser vulnerability.", "cvss3": {}, "published": "2009-09-24T00:00:00", "type": "nessus", "title": "SuSE9 Security Update : XFree86-libs (YOU Patch Number 12040)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE9_12040.NASL", "href": "https://www.tenable.com/plugins/nessus/41182", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41182);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n\n script_name(english:\"SuSE9 Security Update : XFree86-libs (YOU Patch Number 12040)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 9 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes various Xserver security issues.\n\n - File existence disclosure vulnerability. (CVE-2007-5958)\n\n - XInput Extension Memory Corruption Vulnerability\n [IDEF2888 CVE-2007-6427].\n\n - TOG-CUP Extension Memory Corruption Vulnerability\n [IDEF2901 CVE-2007-6428].\n\n - EVI Extension Integer Overflow Vulnerability [IDEF2902\n CVE-2007-6429].\n\n - MIT-SHM Extension Integer Overflow Vulnerability\n [IDEF2904 CVE-2007-6429].\n\n - XFree86-MISC Extension Invalid Array Index Vulnerability\n [IDEF2903 CVE-2007-5760].\n\n - PCF font parser vulnerability.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5760.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5958.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6427.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6428.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6429.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply YOU patch number 12040.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 9 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SUSE9\", reference:\"XFree86-libs-4.3.99.902-43.94\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"XFree86-server-4.3.99.902-43.94\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"x86_64\", reference:\"XFree86-libs-32bit-9-200801062003\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:26:47", "description": "This update fixes various Xserver security issues.\n\n - File existence disclosure vulnerability. (CVE-2007-5958)\n\n - XInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427].\n\n - TOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428].\n\n - EVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429].\n\n - MIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429].\n\n - XFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760].\n\n - PCF font parser vulnerability.", "cvss3": {}, "published": "2009-09-24T00:00:00", "type": "nessus", "title": "SuSE9 Security Update : XFree86-Xnest (YOU Patch Number 12043)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE9_12043.NASL", "href": "https://www.tenable.com/plugins/nessus/41183", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41183);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n\n script_name(english:\"SuSE9 Security Update : XFree86-Xnest (YOU Patch Number 12043)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 9 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes various Xserver security issues.\n\n - File existence disclosure vulnerability. (CVE-2007-5958)\n\n - XInput Extension Memory Corruption Vulnerability\n [IDEF2888 CVE-2007-6427].\n\n - TOG-CUP Extension Memory Corruption Vulnerability\n [IDEF2901 CVE-2007-6428].\n\n - EVI Extension Integer Overflow Vulnerability [IDEF2902\n CVE-2007-6429].\n\n - MIT-SHM Extension Integer Overflow Vulnerability\n [IDEF2904 CVE-2007-6429].\n\n - XFree86-MISC Extension Invalid Array Index Vulnerability\n [IDEF2903 CVE-2007-5760].\n\n - PCF font parser vulnerability.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5760.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5958.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6427.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6428.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6429.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply YOU patch number 12043.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 9 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SUSE9\", reference:\"XFree86-Xnest-4.3.99.902-43.94\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"XFree86-Xvfb-4.3.99.902-43.94\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T15:44:19", "description": "Updated xorg-x11-server packages that fix several security issues are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\n[Updated 18th January 2008] The original packages distributed with this errata had a bug which could cause some X applications to fail on 32-bit platforms. We have updated the packages to correct this bug.\n\nX.Org is an open source implementation of the X Window System. It provides basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nTwo integer overflow flaws were found in the X.Org server's EVI and MIT-SHM modules. A malicious authorized client could exploit these issues to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server.\n(CVE-2007-6429)\n\nA memory corruption flaw was found in the X.Org server's XInput extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server. (CVE-2007-6427)\n\nAn input validation flaw was found in the X.Org server's XFree86-Misc extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server. (CVE-2007-5760)\n\nAn information disclosure flaw was found in the X.Org server's TOG-CUP extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially view arbitrary memory content within the X server's address space. (CVE-2007-6428)\n\nA flaw was found in the X.Org server's XC-SECURITY extension, that could have allowed a local user to verify the existence of an arbitrary file, even in directories that are not normally accessible to that user. (CVE-2007-5958)\n\nUsers of xorg-x11-server should upgrade to these updated packages, which contain backported patches to resolve these issues.", "cvss3": {}, "published": "2010-01-06T00:00:00", "type": "nessus", "title": "CentOS 5 : xorg-x11-server (CESA-2008:0031)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:xorg-x11-server-xdmx", "p-cpe:/a:centos:centos:xorg-x11-server-xephyr", "p-cpe:/a:centos:centos:xorg-x11-server-xnest", "p-cpe:/a:centos:centos:xorg-x11-server-xorg", "p-cpe:/a:centos:centos:xorg-x11-server-xvfb", "p-cpe:/a:centos:centos:xorg-x11-server-sdk", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2008-0031.NASL", "href": "https://www.tenable.com/plugins/nessus/43668", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0031 and \n# CentOS Errata and Security Advisory 2008:0031 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(43668);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n script_bugtraq_id(27350, 27351, 27353, 27354, 27355, 27356);\n script_xref(name:\"RHSA\", value:\"2008:0031\");\n\n script_name(english:\"CentOS 5 : xorg-x11-server (CESA-2008:0031)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated xorg-x11-server packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\n[Updated 18th January 2008] The original packages distributed with\nthis errata had a bug which could cause some X applications to fail on\n32-bit platforms. We have updated the packages to correct this bug.\n\nX.Org is an open source implementation of the X Window System. It\nprovides basic low-level functionality that full-fledged graphical\nuser interfaces are designed upon.\n\nTwo integer overflow flaws were found in the X.Org server's EVI and\nMIT-SHM modules. A malicious authorized client could exploit these\nissues to cause a denial of service (crash), or potentially execute\narbitrary code with root privileges on the X.Org server.\n(CVE-2007-6429)\n\nA memory corruption flaw was found in the X.Org server's XInput\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially execute arbitrary\ncode with root privileges on the X.Org server. (CVE-2007-6427)\n\nAn input validation flaw was found in the X.Org server's XFree86-Misc\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially execute arbitrary\ncode with root privileges on the X.Org server. (CVE-2007-5760)\n\nAn information disclosure flaw was found in the X.Org server's TOG-CUP\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially view arbitrary\nmemory content within the X server's address space. (CVE-2007-6428)\n\nA flaw was found in the X.Org server's XC-SECURITY extension, that\ncould have allowed a local user to verify the existence of an\narbitrary file, even in directories that are not normally accessible\nto that user. (CVE-2007-5958)\n\nUsers of xorg-x11-server should upgrade to these updated packages,\nwhich contain backported patches to resolve these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-January/014628.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?14f0a46b\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2008-January/014629.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e4d004e8\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xorg-x11-server packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xorg-x11-server-Xdmx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xorg-x11-server-Xephyr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xorg-x11-server-Xnest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xorg-x11-server-Xorg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xorg-x11-server-Xvfb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:xorg-x11-server-sdk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2010/01/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-5\", reference:\"xorg-x11-server-Xdmx-1.1.1-48.26.el5_1.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"xorg-x11-server-Xephyr-1.1.1-48.26.el5_1.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"xorg-x11-server-Xnest-1.1.1-48.26.el5_1.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"xorg-x11-server-Xorg-1.1.1-48.26.el5_1.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"xorg-x11-server-Xvfb-1.1.1-48.26.el5_1.5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"xorg-x11-server-sdk-1.1.1-48.26.el5_1.5\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xorg-x11-server-Xdmx / xorg-x11-server-Xephyr / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:41:50", "description": "Updated xorg-x11-server packages that fix several security issues are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\n[Updated 18th January 2008] The original packages distributed with this errata had a bug which could cause some X applications to fail on 32-bit platforms. We have updated the packages to correct this bug.\n\nX.Org is an open source implementation of the X Window System. It provides basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nTwo integer overflow flaws were found in the X.Org server's EVI and MIT-SHM modules. A malicious authorized client could exploit these issues to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server.\n(CVE-2007-6429)\n\nA memory corruption flaw was found in the X.Org server's XInput extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server. (CVE-2007-6427)\n\nAn input validation flaw was found in the X.Org server's XFree86-Misc extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server. (CVE-2007-5760)\n\nAn information disclosure flaw was found in the X.Org server's TOG-CUP extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially view arbitrary memory content within the X server's address space. (CVE-2007-6428)\n\nA flaw was found in the X.Org server's XC-SECURITY extension, that could have allowed a local user to verify the existence of an arbitrary file, even in directories that are not normally accessible to that user. (CVE-2007-5958)\n\nUsers of xorg-x11-server should upgrade to these updated packages, which contain backported patches to resolve these issues.", "cvss3": {}, "published": "2008-01-18T00:00:00", "type": "nessus", "title": "RHEL 5 : xorg-x11-server (RHSA-2008:0031)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xdmx", "p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xephyr", "p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xnest", "p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xorg", "p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-xvfb", "p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-sdk", "cpe:/o:redhat:enterprise_linux:5", "cpe:/o:redhat:enterprise_linux:5.1"], "id": "REDHAT-RHSA-2008-0031.NASL", "href": "https://www.tenable.com/plugins/nessus/30003", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2008:0031. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(30003);\n script_version(\"1.29\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n script_bugtraq_id(27350, 27351, 27353, 27354, 27355, 27356);\n script_xref(name:\"RHSA\", value:\"2008:0031\");\n\n script_name(english:\"RHEL 5 : xorg-x11-server (RHSA-2008:0031)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated xorg-x11-server packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\n[Updated 18th January 2008] The original packages distributed with\nthis errata had a bug which could cause some X applications to fail on\n32-bit platforms. We have updated the packages to correct this bug.\n\nX.Org is an open source implementation of the X Window System. It\nprovides basic low-level functionality that full-fledged graphical\nuser interfaces are designed upon.\n\nTwo integer overflow flaws were found in the X.Org server's EVI and\nMIT-SHM modules. A malicious authorized client could exploit these\nissues to cause a denial of service (crash), or potentially execute\narbitrary code with root privileges on the X.Org server.\n(CVE-2007-6429)\n\nA memory corruption flaw was found in the X.Org server's XInput\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially execute arbitrary\ncode with root privileges on the X.Org server. (CVE-2007-6427)\n\nAn input validation flaw was found in the X.Org server's XFree86-Misc\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially execute arbitrary\ncode with root privileges on the X.Org server. (CVE-2007-5760)\n\nAn information disclosure flaw was found in the X.Org server's TOG-CUP\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially view arbitrary\nmemory content within the X server's address space. (CVE-2007-6428)\n\nA flaw was found in the X.Org server's XC-SECURITY extension, that\ncould have allowed a local user to verify the existence of an\narbitrary file, even in directories that are not normally accessible\nto that user. (CVE-2007-5958)\n\nUsers of xorg-x11-server should upgrade to these updated packages,\nwhich contain backported patches to resolve these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2007-5760\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2007-5958\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2007-6427\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2007-6428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2007-6429\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2008:0031\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-Xdmx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-Xephyr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-Xnest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-Xorg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-Xvfb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:xorg-x11-server-sdk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/18\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2008:0031\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"xorg-x11-server-Xdmx-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"xorg-x11-server-Xdmx-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"xorg-x11-server-Xephyr-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"xorg-x11-server-Xephyr-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"xorg-x11-server-Xephyr-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"xorg-x11-server-Xnest-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"xorg-x11-server-Xnest-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"xorg-x11-server-Xnest-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"xorg-x11-server-Xorg-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"xorg-x11-server-Xorg-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"xorg-x11-server-Xvfb-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"xorg-x11-server-Xvfb-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"xorg-x11-server-Xvfb-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"xorg-x11-server-sdk-1.1.1-48.26.el5_1.5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"xorg-x11-server-sdk-1.1.1-48.26.el5_1.5\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xorg-x11-server-Xdmx / xorg-x11-server-Xephyr / etc\");\n }\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:41:54", "description": "This update fixes various Xserver security issues. File existence disclosure vulnerability. (CVE-2007-5958)\n\nXInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427].\n\nTOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428].\n\nEVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429].\n\nMIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. \n\nXFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. \n\nPCF font parser vulnerability.", "cvss3": {}, "published": "2008-01-21T00:00:00", "type": "nessus", "title": "SuSE 10 Security Update : xorg-x11-Xnest (ZYPP Patch Number 4875)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_XORG-X11-XNEST-4875.NASL", "href": "https://www.tenable.com/plugins/nessus/30040", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(30040);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n\n script_name(english:\"SuSE 10 Security Update : xorg-x11-Xnest (ZYPP Patch Number 4875)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes various Xserver security issues. File existence\ndisclosure vulnerability. (CVE-2007-5958)\n\nXInput Extension Memory Corruption Vulnerability [IDEF2888\nCVE-2007-6427].\n\nTOG-CUP Extension Memory Corruption Vulnerability [IDEF2901\nCVE-2007-6428].\n\nEVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429].\n\nMIT-SHM Extension Integer Overflow Vulnerability [IDEF2904\nCVE-2007-6429]. \n\nXFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903\nCVE-2007-5760]. \n\nPCF font parser vulnerability.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5760.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5958.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6427.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6428.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6429.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 4875.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"xorg-x11-Xnest-6.9.0-50.54.5\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"xorg-x11-Xvfb-6.9.0-50.54.5\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"xorg-x11-Xnest-6.9.0-50.54.5\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"xorg-x11-Xvfb-6.9.0-50.54.5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:41:54", "description": "This update fixes various Xserver security issues. File existence disclosure vulnerability. (CVE-2007-5958)\n\nXInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427].\n\nTOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428].\n\nEVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429].\n\nMIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. \n\nXFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. \n\nPCF font parser vulnerability.", "cvss3": {}, "published": "2008-01-21T00:00:00", "type": "nessus", "title": "SuSE 10 Security Update : X11 libs and server (ZYPP Patch Number 4860)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_XORG-X11-LIBS-4860.NASL", "href": "https://www.tenable.com/plugins/nessus/30041", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(30041);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n\n script_name(english:\"SuSE 10 Security Update : X11 libs and server (ZYPP Patch Number 4860)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes various Xserver security issues. File existence\ndisclosure vulnerability. (CVE-2007-5958)\n\nXInput Extension Memory Corruption Vulnerability [IDEF2888\nCVE-2007-6427].\n\nTOG-CUP Extension Memory Corruption Vulnerability [IDEF2901\nCVE-2007-6428].\n\nEVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429].\n\nMIT-SHM Extension Integer Overflow Vulnerability [IDEF2904\nCVE-2007-6429]. \n\nXFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903\nCVE-2007-5760]. \n\nPCF font parser vulnerability.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5760.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-5958.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6427.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6428.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-6429.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 4860.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"xorg-x11-libs-6.9.0-50.54.5\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"xorg-x11-server-6.9.0-50.54.5\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"x86_64\", reference:\"xorg-x11-libs-32bit-6.9.0-50.54.5\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"xorg-x11-libs-6.9.0-50.54.5\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"xorg-x11-server-6.9.0-50.54.5\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"xorg-x11-libs-32bit-6.9.0-50.54.5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:41:59", "description": "This update fixes various Xserver security issues. File existence disclosure vulnerability (CVE-2007-5958).\n\nXInput Extension Memory Corruption Vulnerability [IDEF2888 CVE-2007-6427].\n\nTOG-CUP Extension Memory Corruption Vulnerability [IDEF2901 CVE-2007-6428].\n\nEVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429].\n\nMIT-SHM Extension Integer Overflow Vulnerability [IDEF2904 CVE-2007-6429]. \n\nXFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903 CVE-2007-5760]. \n\nPCF font parser vulnerability.", "cvss3": {}, "published": "2008-01-18T00:00:00", "type": "nessus", "title": "openSUSE 10 Security Update : xorg-x11-Xnest (xorg-x11-Xnest-4859)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:xorg-x11-xnest", "p-cpe:/a:novell:opensuse:xorg-x11-xvfb", "p-cpe:/a:novell:opensuse:xorg-x11-devel", "p-cpe:/a:novell:opensuse:xorg-x11-devel-32bit", "p-cpe:/a:novell:opensuse:xorg-x11-libs", "p-cpe:/a:novell:opensuse:xorg-x11-libs-32bit", "p-cpe:/a:novell:opensuse:xorg-x11-server", "p-cpe:/a:novell:opensuse:xorg-x11-server-extra", "p-cpe:/a:novell:opensuse:xorg-x11-server-sdk", "cpe:/o:novell:opensuse:10.1", "cpe:/o:novell:opensuse:10.2", "cpe:/o:novell:opensuse:10.3"], "id": "SUSE_XORG-X11-XNEST-4859.NASL", "href": "https://www.tenable.com/plugins/nessus/30017", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update xorg-x11-Xnest-4859.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(30017);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n\n script_name(english:\"openSUSE 10 Security Update : xorg-x11-Xnest (xorg-x11-Xnest-4859)\");\n script_summary(english:\"Check for the xorg-x11-Xnest-4859 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes various Xserver security issues. File existence\ndisclosure vulnerability (CVE-2007-5958).\n\nXInput Extension Memory Corruption Vulnerability [IDEF2888\nCVE-2007-6427].\n\nTOG-CUP Extension Memory Corruption Vulnerability [IDEF2901\nCVE-2007-6428].\n\nEVI Extension Integer Overflow Vulnerability [IDEF2902 CVE-2007-6429].\n\nMIT-SHM Extension Integer Overflow Vulnerability [IDEF2904\nCVE-2007-6429]. \n\nXFree86-MISC Extension Invalid Array Index Vulnerability [IDEF2903\nCVE-2007-5760]. \n\nPCF font parser vulnerability.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xorg-x11-Xnest packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xorg-x11-Xnest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xorg-x11-Xvfb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xorg-x11-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xorg-x11-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xorg-x11-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xorg-x11-libs-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xorg-x11-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xorg-x11-server-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xorg-x11-server-sdk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2|SUSE10\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2 / 10.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"xorg-x11-Xnest-6.9.0-50.54.5\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"xorg-x11-Xvfb-6.9.0-50.54.5\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"xorg-x11-devel-6.9.0-50.54.5\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"xorg-x11-libs-6.9.0-50.54.5\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"xorg-x11-server-6.9.0-50.54.5\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", cpu:\"x86_64\", reference:\"xorg-x11-devel-32bit-6.9.0-50.54.5\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", cpu:\"x86_64\", reference:\"xorg-x11-libs-32bit-6.9.0-50.54.5\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"xorg-x11-devel-7.2-25\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"xorg-x11-libs-7.2-25\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"xorg-x11-server-7.2-30.11\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"xorg-x11-server-sdk-7.2-30.11\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", cpu:\"x86_64\", reference:\"xorg-x11-devel-32bit-7.2-25\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", cpu:\"x86_64\", reference:\"xorg-x11-libs-32bit-7.2-25\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"xorg-x11-devel-7.2-103.4\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"xorg-x11-libs-7.2-103.4\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"xorg-x11-server-7.2-143.9\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"xorg-x11-server-extra-7.2-143.9\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", reference:\"xorg-x11-server-sdk-7.2-143.9\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", cpu:\"x86_64\", reference:\"xorg-x11-devel-32bit-7.2-103.4\") ) flag++;\nif ( rpm_check(release:\"SUSE10.3\", cpu:\"x86_64\", reference:\"xorg-x11-libs-32bit-7.2-103.4\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xorg-x11-Xnest / xorg-x11-Xvfb / xorg-x11-devel / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:25:54", "description": "Two integer overflow flaws were found in the X.Org server's EVI and MIT-SHM modules. A malicious authorized client could exploit these issues to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server.\n(CVE-2007-6429)\n\nA memory corruption flaw was found in the X.Org server's XInput extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server. (CVE-2007-6427)\n\nAn input validation flaw was found in the X.Org server's XFree86-Misc extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server. (CVE-2007-5760)\n\nAn information disclosure flaw was found in the X.Org server's TOG-CUP extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially view arbitrary memory content within the X server's address space. (CVE-2007-6428)\n\nA flaw was found in the X.Org server's XC-SECURITY extension, that could have allowed a local user to verify the existence of an arbitrary file, even in directories that are not normally accessible to that user. (CVE-2007-5958)", "cvss3": {}, "published": "2012-08-01T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : xorg-x11-server on SL5.x i386/x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2021-01-14T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20080117_XORG_X11_SERVER_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60348", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60348);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n\n script_name(english:\"Scientific Linux Security Update : xorg-x11-server on SL5.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Two integer overflow flaws were found in the X.Org server's EVI and\nMIT-SHM modules. A malicious authorized client could exploit these\nissues to cause a denial of service (crash), or potentially execute\narbitrary code with root privileges on the X.Org server.\n(CVE-2007-6429)\n\nA memory corruption flaw was found in the X.Org server's XInput\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially execute arbitrary\ncode with root privileges on the X.Org server. (CVE-2007-6427)\n\nAn input validation flaw was found in the X.Org server's XFree86-Misc\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially execute arbitrary\ncode with root privileges on the X.Org server. (CVE-2007-5760)\n\nAn information disclosure flaw was found in the X.Org server's TOG-CUP\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially view arbitrary\nmemory content within the X server's address space. (CVE-2007-6428)\n\nA flaw was found in the X.Org server's XC-SECURITY extension, that\ncould have allowed a local user to verify the existence of an\narbitrary file, even in directories that are not normally accessible\nto that user. (CVE-2007-5958)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0801&L=scientific-linux-errata&T=0&P=1227\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ce21d06a\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL5\", reference:\"xorg-x11-server-Xdmx-1.1.1-48.26.el5_1.4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"xorg-x11-server-Xephyr-1.1.1-48.26.el5_1.4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"xorg-x11-server-Xnest-1.1.1-48.26.el5_1.4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"xorg-x11-server-Xorg-1.1.1-48.26.el5_1.4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"xorg-x11-server-Xvfb-1.1.1-48.26.el5_1.4\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"xorg-x11-server-sdk-1.1.1-48.26.el5_1.4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:22:29", "description": "An input validation flaw was found in the X.org server's XFree86-Misc extension that could allow a malicious authorized client to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.org server (CVE-2007-5760).\n\nA flaw was found in the X.org server's XC-SECURITY extension that could allow a local user to verify the existence of an arbitrary file, even in directories that are not normally accessible to that user (CVE-2007-5958).\n\nA memory corruption flaw was found in the X.org server's XInput extension that could allow a malicious authorized client to cause a denial of service (crash) or potentially execute arbitrary code with root privileges on the X.org server (CVE-2007-6427).\n\nAn information disclosure flaw was found in the X.org server's TOG-CUP extension that could allow a malicious authorized client to cause a denial of service (crash) or potentially view arbitrary memory content within the X.org server's address space (CVE-2007-6428).\n\nTwo integer overflow flaws were found in the X.org server's EVI and MIT-SHM modules that could allow a malicious authorized client to cause a denial of service (crash) or potentially execute arbitrary code with the privileges of the X.org server (CVE-2007-6429).\n\nThe updated packages have been patched to correct these issues.", "cvss3": {}, "published": "2009-04-23T00:00:00", "type": "nessus", "title": "Mandriva Linux Security Advisory : x11-server-xgl (MDVSA-2008:025)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2021-01-06T00:00:00", "cpe": ["cpe:/o:mandriva:linux:2008.0", "cpe:/o:mandriva:linux:2007", "cpe:/o:mandriva:linux:2007.1", "p-cpe:/a:mandriva:linux:x11-server-xgl"], "id": "MANDRIVA_MDVSA-2008-025.NASL", "href": "https://www.tenable.com/plugins/nessus/37710", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2008:025. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(37710);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n script_bugtraq_id(27350, 27351, 27353, 27354, 27355, 27356);\n script_xref(name:\"MDVSA\", value:\"2008:025\");\n\n script_name(english:\"Mandriva Linux Security Advisory : x11-server-xgl (MDVSA-2008:025)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Mandriva Linux host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An input validation flaw was found in the X.org server's XFree86-Misc\nextension that could allow a malicious authorized client to cause a\ndenial of service (crash), or potentially execute arbitrary code with\nroot privileges on the X.org server (CVE-2007-5760).\n\nA flaw was found in the X.org server's XC-SECURITY extension that\ncould allow a local user to verify the existence of an arbitrary file,\neven in directories that are not normally accessible to that user\n(CVE-2007-5958).\n\nA memory corruption flaw was found in the X.org server's XInput\nextension that could allow a malicious authorized client to cause a\ndenial of service (crash) or potentially execute arbitrary code with\nroot privileges on the X.org server (CVE-2007-6427).\n\nAn information disclosure flaw was found in the X.org server's TOG-CUP\nextension that could allow a malicious authorized client to cause a\ndenial of service (crash) or potentially view arbitrary memory content\nwithin the X.org server's address space (CVE-2007-6428).\n\nTwo integer overflow flaws were found in the X.org server's EVI and\nMIT-SHM modules that could allow a malicious authorized client to\ncause a denial of service (crash) or potentially execute arbitrary\ncode with the privileges of the X.org server (CVE-2007-6429).\n\nThe updated packages have been patched to correct these issues.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected x11-server-xgl package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:x11-server-xgl\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/04/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2007.0\", reference:\"x11-server-xgl-0.0.1-0.20060714.11.3mdv2007.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2007.1\", reference:\"x11-server-xgl-0.0.1-0.20070105.4.3mdv2007.1\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2008.0\", reference:\"x11-server-xgl-0.0.1-0.20070917.2.1mdv2008.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:25:11", "description": "From Red Hat Security Advisory 2008:0031 :\n\nUpdated xorg-x11-server packages that fix several security issues are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\n[Updated 18th January 2008] The original packages distributed with this errata had a bug which could cause some X applications to fail on 32-bit platforms. We have updated the packages to correct this bug.\n\nX.Org is an open source implementation of the X Window System. It provides basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nTwo integer overflow flaws were found in the X.Org server's EVI and MIT-SHM modules. A malicious authorized client could exploit these issues to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server.\n(CVE-2007-6429)\n\nA memory corruption flaw was found in the X.Org server's XInput extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server. (CVE-2007-6427)\n\nAn input validation flaw was found in the X.Org server's XFree86-Misc extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the X.Org server. (CVE-2007-5760)\n\nAn information disclosure flaw was found in the X.Org server's TOG-CUP extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially view arbitrary memory content within the X server's address space. (CVE-2007-6428)\n\nA flaw was found in the X.Org server's XC-SECURITY extension, that could have allowed a local user to verify the existence of an arbitrary file, even in directories that are not normally accessible to that user. (CVE-2007-5958)\n\nUsers of xorg-x11-server should upgrade to these updated packages, which contain backported patches to resolve these issues.", "cvss3": {}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 5 : xorg-x11-server (ELSA-2008-0031)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:xorg-x11-server-xdmx", "p-cpe:/a:oracle:linux:xorg-x11-server-xephyr", "p-cpe:/a:oracle:linux:xorg-x11-server-xnest", "p-cpe:/a:oracle:linux:xorg-x11-server-xorg", "p-cpe:/a:oracle:linux:xorg-x11-server-xvfb", "p-cpe:/a:oracle:linux:xorg-x11-server-sdk", "cpe:/o:oracle:linux:5"], "id": "ORACLELINUX_ELSA-2008-0031.NASL", "href": "https://www.tenable.com/plugins/nessus/67636", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2008:0031 and \n# Oracle Linux Security Advisory ELSA-2008-0031 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67636);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\");\n script_bugtraq_id(27350, 27351, 27353, 27354, 27355, 27356);\n script_xref(name:\"RHSA\", value:\"2008:0031\");\n\n script_name(english:\"Oracle Linux 5 : xorg-x11-server (ELSA-2008-0031)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2008:0031 :\n\nUpdated xorg-x11-server packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\n[Updated 18th January 2008] The original packages distributed with\nthis errata had a bug which could cause some X applications to fail on\n32-bit platforms. We have updated the packages to correct this bug.\n\nX.Org is an open source implementation of the X Window System. It\nprovides basic low-level functionality that full-fledged graphical\nuser interfaces are designed upon.\n\nTwo integer overflow flaws were found in the X.Org server's EVI and\nMIT-SHM modules. A malicious authorized client could exploit these\nissues to cause a denial of service (crash), or potentially execute\narbitrary code with root privileges on the X.Org server.\n(CVE-2007-6429)\n\nA memory corruption flaw was found in the X.Org server's XInput\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially execute arbitrary\ncode with root privileges on the X.Org server. (CVE-2007-6427)\n\nAn input validation flaw was found in the X.Org server's XFree86-Misc\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially execute arbitrary\ncode with root privileges on the X.Org server. (CVE-2007-5760)\n\nAn information disclosure flaw was found in the X.Org server's TOG-CUP\nextension. A malicious authorized client could exploit this issue to\ncause a denial of service (crash), or potentially view arbitrary\nmemory content within the X server's address space. (CVE-2007-6428)\n\nA flaw was found in the X.Org server's XC-SECURITY extension, that\ncould have allowed a local user to verify the existence of an\narbitrary file, even in directories that are not normally accessible\nto that user. (CVE-2007-5958)\n\nUsers of xorg-x11-server should upgrade to these updated packages,\nwhich contain backported patches to resolve these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2008-January/000490.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xorg-x11-server packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:xorg-x11-server-Xdmx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:xorg-x11-server-Xephyr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:xorg-x11-server-Xnest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:xorg-x11-server-Xorg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:xorg-x11-server-Xvfb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:xorg-x11-server-sdk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL5\", reference:\"xorg-x11-server-Xdmx-1.1.1-48.26.el5_1.4.0.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"xorg-x11-server-Xephyr-1.1.1-48.26.el5_1.4.0.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"xorg-x11-server-Xnest-1.1.1-48.26.el5_1.4.0.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"xorg-x11-server-Xorg-1.1.1-48.26.el5_1.4.0.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"xorg-x11-server-Xvfb-1.1.1-48.26.el5_1.4.0.1\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"xorg-x11-server-sdk-1.1.1-48.26.el5_1.4.0.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xorg-x11-server-Xdmx / xorg-x11-server-Xephyr / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:42:00", "description": "Multiple overflows were discovered in the XFree86-Misc, XInput-Misc, TOG-CUP, EVI, and MIT-SHM extensions which did not correctly validate function arguments. An authenticated attacker could send specially crafted requests and gain root privileges. (CVE-2007-5760, CVE-2007-6427, CVE-2007-6428, CVE-2007-6429)\n\nIt was discovered that the X.org server did not use user privileges when attempting to open security policy files. Local attackers could exploit this to probe for files in directories they would not normally be able to access. (CVE-2007-5958)\n\nIt was discovered that the PCF font handling code did not correctly validate the size of fonts. An authenticated attacker could load a specially crafted font and gain additional privileges. (CVE-2008-0006).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2008-01-18T00:00:00", "type": "nessus", "title": "Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : libxfont, xorg-server vulnerabilities (USN-571-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429", "CVE-2008-0006"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libxfont-dev", "p-cpe:/a:canonical:ubuntu_linux:libxfont1", "p-cpe:/a:canonical:ubuntu_linux:libxfont1-dbg", "p-cpe:/a:canonical:ubuntu_linux:xdmx", "p-cpe:/a:canonical:ubuntu_linux:xdmx-tools", "p-cpe:/a:canonical:ubuntu_linux:xnest", "p-cpe:/a:canonical:ubuntu_linux:xprint", "p-cpe:/a:canonical:ubuntu_linux:xprint-common", "p-cpe:/a:canonical:ubuntu_linux:xserver-xephyr", "p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-core", "p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-core-dbg", "p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-dev", "p-cpe:/a:canonical:ubuntu_linux:xvfb", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts", "cpe:/o:canonical:ubuntu_linux:6.10", "cpe:/o:canonical:ubuntu_linux:7.04", "cpe:/o:canonical:ubuntu_linux:7.10"], "id": "UBUNTU_USN-571-1.NASL", "href": "https://www.tenable.com/plugins/nessus/30019", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-571-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(30019);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_xref(name:\"USN\", value:\"571-1\");\n\n script_name(english:\"Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : libxfont, xorg-server vulnerabilities (USN-571-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple overflows were discovered in the XFree86-Misc, XInput-Misc,\nTOG-CUP, EVI, and MIT-SHM extensions which did not correctly validate\nfunction arguments. An authenticated attacker could send specially\ncrafted requests and gain root privileges. (CVE-2007-5760,\nCVE-2007-6427, CVE-2007-6428, CVE-2007-6429)\n\nIt was discovered that the X.org server did not use user privileges\nwhen attempting to open security policy files. Local attackers could\nexploit this to probe for files in directories they would not normally\nbe able to access. (CVE-2007-5958)\n\nIt was discovered that the PCF font handling code did not correctly\nvalidate the size of fonts. An authenticated attacker could load a\nspecially crafted font and gain additional privileges. (CVE-2008-0006).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/571-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(119, 189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libxfont-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libxfont1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libxfont1-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xdmx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xdmx-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xnest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xprint\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xprint-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xserver-xephyr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-core-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xvfb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.06|6\\.10|7\\.04|7\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06 / 6.10 / 7.04 / 7.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libxfont-dev\", pkgver:\"1.0.0-0ubuntu3.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libxfont1\", pkgver:\"1:1.0.0-0ubuntu3.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libxfont1-dbg\", pkgver:\"1.0.0-0ubuntu3.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xdmx\", pkgver:\"1.0.2-0ubuntu10.8\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xdmx-tools\", pkgver:\"1.0.2-0ubuntu10.8\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xnest\", pkgver:\"1.0.2-0ubuntu10.8\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xserver-xorg-core\", pkgver:\"1:1.0.2-0ubuntu10.8\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xserver-xorg-dev\", pkgver:\"1.0.2-0ubuntu10.8\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xvfb\", pkgver:\"1.0.2-0ubuntu10.8\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libxfont-dev\", pkgver:\"1.2.0-0ubuntu3.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libxfont1\", pkgver:\"1:1.2.0-0ubuntu3.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libxfont1-dbg\", pkgver:\"1.2.0-0ubuntu3.2\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xdmx\", pkgver:\"1.1.1-0ubuntu12.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xdmx-tools\", pkgver:\"1.1.1-0ubuntu12.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xnest\", pkgver:\"1.1.1-0ubuntu12.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xserver-xephyr\", pkgver:\"1.1.1-0ubuntu12.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xserver-xorg-core\", pkgver:\"1:1.1.1-0ubuntu12.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xserver-xorg-dev\", pkgver:\"1.1.1-0ubuntu12.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xvfb\", pkgver:\"1.1.1-0ubuntu12.3\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libxfont-dev\", pkgver:\"1.2.7-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libxfont1\", pkgver:\"1:1.2.7-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libxfont1-dbg\", pkgver:\"1.2.7-1ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xdmx\", pkgver:\"1.2.0-3ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xdmx-tools\", pkgver:\"1.2.0-3ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xnest\", pkgver:\"1.2.0-3ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xserver-xephyr\", pkgver:\"1.2.0-3ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xserver-xorg-core\", pkgver:\"2:1.2.0-3ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xserver-xorg-dev\", pkgver:\"1.2.0-3ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xvfb\", pkgver:\"1.2.0-3ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libxfont-dev\", pkgver:\"1.3.0-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libxfont1\", pkgver:\"1:1.3.0-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"libxfont1-dbg\", pkgver:\"1.3.0-0ubuntu1.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xdmx\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xdmx-tools\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xnest\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xprint\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xprint-common\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xserver-xephyr\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xserver-xorg-core\", pkgver:\"2:1.3.0.0.dfsg-12ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xserver-xorg-core-dbg\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xserver-xorg-dev\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.1\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xvfb\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libxfont-dev / libxfont1 / libxfont1-dbg / xdmx / xdmx-tools / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:42:00", "description": "The remote host is affected by the vulnerability described in GLSA-200801-09 (X.Org X server and Xfont library: Multiple vulnerabilities)\n\n regenrecht reported multiple vulnerabilities in various X server extension via iDefense:\n The XFree86-Misc extension does not properly sanitize a parameter within a PassMessage request, allowing the modification of a function pointer (CVE-2007-5760).\n Multiple functions in the XInput extension do not properly sanitize client requests for swapping bytes, leading to corruption of heap memory (CVE-2007-6427).\n Integer overflow vulnerabilities in the EVI extension and in the MIT-SHM extension can lead to buffer overflows (CVE-2007-6429).\n The TOG-CUP extension does not sanitize an index value in the ProcGetReservedColormapEntries() function, leading to arbitrary memory access (CVE-2007-6428).\n A buffer overflow was discovered in the Xfont library when processing PCF font files (CVE-2008-0006).\n The X server does not enforce restrictions when a user specifies a security policy file and attempts to open it (CVE-2007-5958).\n Impact :\n\n Remote attackers could exploit the vulnerability in the Xfont library by enticing a user to load a specially crafted PCF font file resulting in the execution of arbitrary code with the privileges of the user running the X server, typically root. Local attackers could exploit this and the vulnerabilities in the X.org extensions to gain elevated privileges. If the X server allows connections from the network, these vulnerabilities could be exploited remotely. A local attacker could determine the existence of arbitrary files by exploiting the last vulnerability or possibly cause a Denial of Service.\n Workaround :\n\n Workarounds for some of the vulnerabilities can be found in the X.Org security advisory as listed under References.", "cvss3": {}, "published": "2008-01-21T00:00:00", "type": "nessus", "title": "GLSA-200801-09 : X.Org X server and Xfont library: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429", "CVE-2008-0006"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:libxfont", "p-cpe:/a:gentoo:linux:xorg-server", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-200801-09.NASL", "href": "https://www.tenable.com/plugins/nessus/30033", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200801-09.\n#\n# The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(30033);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_bugtraq_id(27350);\n script_xref(name:\"GLSA\", value:\"200801-09\");\n\n script_name(english:\"GLSA-200801-09 : X.Org X server and Xfont library: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200801-09\n(X.Org X server and Xfont library: Multiple vulnerabilities)\n\n regenrecht reported multiple vulnerabilities in various X server\n extension via iDefense:\n The XFree86-Misc extension does not properly sanitize a parameter\n within a PassMessage request, allowing the modification of a function\n pointer (CVE-2007-5760).\n Multiple functions in the XInput extension do not properly sanitize\n client requests for swapping bytes, leading to corruption of heap\n memory (CVE-2007-6427).\n Integer overflow vulnerabilities in the EVI extension and in the\n MIT-SHM extension can lead to buffer overflows (CVE-2007-6429).\n The TOG-CUP extension does not sanitize an index value in the\n ProcGetReservedColormapEntries() function, leading to arbitrary memory\n access (CVE-2007-6428).\n A buffer overflow was discovered in the Xfont library when\n processing PCF font files (CVE-2008-0006).\n The X server does not enforce restrictions when a user specifies a\n security policy file and attempts to open it (CVE-2007-5958).\n \nImpact :\n\n Remote attackers could exploit the vulnerability in the Xfont library\n by enticing a user to load a specially crafted PCF font file resulting\n in the execution of arbitrary code with the privileges of the user\n running the X server, typically root. Local attackers could exploit\n this and the vulnerabilities in the X.org extensions to gain elevated\n privileges. If the X server allows connections from the network, these\n vulnerabilities could be exploited remotely. A local attacker could\n determine the existence of arbitrary files by exploiting the last\n vulnerability or possibly cause a Denial of Service.\n \nWorkaround :\n\n Workarounds for some of the vulnerabilities can be found in the X.Org\n security advisory as listed under References.\"\n );\n # http://lists.freedesktop.org/archives/xorg/2008-January/031918.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.freedesktop.org/archives/xorg/2008-January/031918.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200801-09\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All X.Org X server users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-base/xorg-server-1.3.0.0-r5'\n All X.Org Xfont library users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-libs/libXfont-1.3.1-r1'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(119, 189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:libXfont\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:xorg-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"x11-base/xorg-server\", unaffected:make_list(\"ge 1.3.0.0-r5\"), vulnerable:make_list(\"lt 1.3.0.0-r5\"))) flag++;\nif (qpkg_check(package:\"x11-libs/libXfont\", unaffected:make_list(\"ge 1.3.1-r1\"), vulnerable:make_list(\"lt 1.3.1-r1\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"X.Org X server and Xfont library\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:41:55", "description": "CVE-2007-5760: XFree86-Misc Extension Invalid Array Index Vulnerability CVE-2007-5958: Xorg / XFree86 file existence disclosure vulnerability CVE-2007-6427: XInput Extension Memory Corruption Vulnerability CVE-2007-6428: TOG-CUP Extension Memory Corruption Vulnerability CVE-2007-6429: EVI and MIT-SHM Extension Integer Overflow Vulnerability CVE-2008-0006: PCF Font Vulnerability - this patch isn't strictly required with new version of libXfont.\n\nThis contains ajax's fixes for the MITSHM patch.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2008-01-27T00:00:00", "type": "nessus", "title": "Fedora 7 : xorg-x11-server-1.3.0.0-15.fc7 (2008-0831)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429", "CVE-2008-0006"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:xorg-x11-server-xdmx", "p-cpe:/a:fedoraproject:fedora:xorg-x11-server-xephyr", "p-cpe:/a:fedoraproject:fedora:xorg-x11-server-xnest", "p-cpe:/a:fedoraproject:fedora:xorg-x11-server-xorg", "p-cpe:/a:fedoraproject:fedora:xorg-x11-server-xvfb", "p-cpe:/a:fedoraproject:fedora:xorg-x11-server-debuginfo", "p-cpe:/a:fedoraproject:fedora:xorg-x11-server-sdk", "p-cpe:/a:fedoraproject:fedora:xorg-x11-server-source", "cpe:/o:fedoraproject:fedora:7"], "id": "FEDORA_2008-0831.NASL", "href": "https://www.tenable.com/plugins/nessus/30076", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2008-0831.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(30076);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_bugtraq_id(27350, 27351, 27352, 27353, 27354, 27355, 27356);\n script_xref(name:\"FEDORA\", value:\"2008-0831\");\n\n script_name(english:\"Fedora 7 : xorg-x11-server-1.3.0.0-15.fc7 (2008-0831)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"CVE-2007-5760: XFree86-Misc Extension Invalid Array Index\nVulnerability CVE-2007-5958: Xorg / XFree86 file existence disclosure\nvulnerability CVE-2007-6427: XInput Extension Memory Corruption\nVulnerability CVE-2007-6428: TOG-CUP Extension Memory Corruption\nVulnerability CVE-2007-6429: EVI and MIT-SHM Extension Integer\nOverflow Vulnerability CVE-2008-0006: PCF Font Vulnerability - this\npatch isn't strictly required with new version of libXfont.\n\nThis contains ajax's fixes for the MITSHM patch.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=391841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=413721\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=413741\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=413791\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=413811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=414031\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=429125\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2008-January/007057.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?50405a6a\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(119, 189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xorg-x11-server-Xdmx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xorg-x11-server-Xephyr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xorg-x11-server-Xnest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xorg-x11-server-Xorg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xorg-x11-server-Xvfb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xorg-x11-server-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xorg-x11-server-sdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:xorg-x11-server-source\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/01/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 7.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC7\", reference:\"xorg-x11-server-Xdmx-1.3.0.0-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"xorg-x11-server-Xephyr-1.3.0.0-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"xorg-x11-server-Xnest-1.3.0.0-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"xorg-x11-server-Xorg-1.3.0.0-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"xorg-x11-server-Xvfb-1.3.0.0-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"xorg-x11-server-debuginfo-1.3.0.0-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"xorg-x11-server-sdk-1.3.0.0-15.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"xorg-x11-server-source-1.3.0.0-15.fc7\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xorg-x11-server-Xdmx / xorg-x11-server-Xephyr / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:42:00", "description": "USN-571-1 fixed vulnerabilities in X.org. The upstream fixes were incomplete, and under certain situations, applications using the MIT-SHM extension (e.g. Java, wxWidgets) would crash with BadAlloc X errors. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nMultiple overflows were discovered in the XFree86-Misc, XInput-Misc, TOG-CUP, EVI, and MIT-SHM extensions which did not correctly validate function arguments. An authenticated attacker could send specially crafted requests and gain root privileges. (CVE-2007-5760, CVE-2007-6427, CVE-2007-6428, CVE-2007-6429)\n\nIt was discovered that the X.org server did not use user privileges when attempting to open security policy files.\nLocal attackers could exploit this to probe for files in directories they would not normally be able to access.\n(CVE-2007-5958)\n\nIt was discovered that the PCF font handling code did not correctly validate the size of fonts. An authenticated attacker could load a specially crafted font and gain additional privileges. (CVE-2008-0006).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2008-01-21T00:00:00", "type": "nessus", "title": "Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : xorg-server regression (USN-571-2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-5760", "CVE-2007-5958", "CVE-2007-6427", "CVE-2007-6428", "CVE-2007-6429", "CVE-2008-0006"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:xdmx", "p-cpe:/a:canonical:ubuntu_linux:xdmx-tools", "p-cpe:/a:canonical:ubuntu_linux:xnest", "p-cpe:/a:canonical:ubuntu_linux:xprint", "p-cpe:/a:canonical:ubuntu_linux:xprint-common", "p-cpe:/a:canonical:ubuntu_linux:xserver-xephyr", "p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-core", "p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-core-dbg", "p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-dev", "p-cpe:/a:canonical:ubuntu_linux:xvfb", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts", "cpe:/o:canonical:ubuntu_linux:6.10", "cpe:/o:canonical:ubuntu_linux:7.04", "cpe:/o:canonical:ubuntu_linux:7.10"], "id": "UBUNTU_USN-571-2.NASL", "href": "https://www.tenable.com/plugins/nessus/30042", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-571-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(30042);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2007-5760\", \"CVE-2007-5958\", \"CVE-2007-6427\", \"CVE-2007-6428\", \"CVE-2007-6429\", \"CVE-2008-0006\");\n script_xref(name:\"USN\", value:\"571-2\");\n\n script_name(english:\"Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : xorg-server regression (USN-571-2)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-571-1 fixed vulnerabilities in X.org. The upstream fixes were\nincomplete, and under certain situations, applications using the\nMIT-SHM extension (e.g. Java, wxWidgets) would crash with BadAlloc X\nerrors. This update fixes the problem.\n\nWe apologize for the inconvenience.\n\nMultiple overflows were discovered in the XFree86-Misc, XInput-Misc,\nTOG-CUP, EVI, and MIT-SHM extensions which did not correctly validate\nfunction arguments. An authenticated attacker could send specially\ncrafted requests and gain root privileges. (CVE-2007-5760,\nCVE-2007-6427, CVE-2007-6428, CVE-2007-6429)\n\nIt was discovered that the X.org server did not use user\nprivileges when attempting to open security policy files.\nLocal attackers could exploit this to probe for files in\ndirectories they would not normally be able to access.\n(CVE-2007-5958)\n\nIt was discovered that the PCF font handling code did not\ncorrectly validate the size of fonts. An authenticated\nattacker could load a specially crafted font and gain\nadditional privileges. (CVE-2008-0006).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/571-2/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(119, 189, 200, 362, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xdmx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xdmx-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xnest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xprint\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xprint-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xserver-xephyr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-core-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xserver-xorg-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:xvfb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.10\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/01/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/01/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.06|6\\.10|7\\.04|7\\.10)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06 / 6.10 / 7.04 / 7.10\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xdmx\", pkgver:\"1.0.2-0ubuntu10.10\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xdmx-tools\", pkgver:\"1.0.2-0ubuntu10.10\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xnest\", pkgver:\"1.0.2-0ubuntu10.10\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xserver-xorg-core\", pkgver:\"1:1.0.2-0ubuntu10.10\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xserver-xorg-dev\", pkgver:\"1.0.2-0ubuntu10.10\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"xvfb\", pkgver:\"1.0.2-0ubuntu10.10\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xdmx\", pkgver:\"1.1.1-0ubuntu12.5\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xdmx-tools\", pkgver:\"1.1.1-0ubuntu12.5\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xnest\", pkgver:\"1.1.1-0ubuntu12.5\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xserver-xephyr\", pkgver:\"1.1.1-0ubuntu12.5\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xserver-xorg-core\", pkgver:\"1:1.1.1-0ubuntu12.5\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xserver-xorg-dev\", pkgver:\"1.1.1-0ubuntu12.5\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"xvfb\", pkgver:\"1.1.1-0ubuntu12.5\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xdmx\", pkgver:\"1.2.0-3ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xdmx-tools\", pkgver:\"1.2.0-3ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xnest\", pkgver:\"1.2.0-3ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xserver-xephyr\", pkgver:\"1.2.0-3ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xserver-xorg-core\", pkgver:\"2:1.2.0-3ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xserver-xorg-dev\", pkgver:\"1.2.0-3ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"xvfb\", pkgver:\"1.2.0-3ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xdmx\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xdmx-tools\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xnest\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xprint\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xprint-common\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xserver-xephyr\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xserver-xorg-core\", pkgver:\"2:1.3.0.0.dfsg-12ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xserver-xorg-core-dbg\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xserver-xorg-dev\", pkgver:\"1.3.0.0.dfsg-12ubuntu8.3\")) flag++;\nif (ubuntu_check(osver:\"7.10\", pkgname:\"xvfb\", pkgver:\"