New x11 (X.Org) packages are available for Slackware 10.2, and -current to fix security issues due to overflows in font parsing.
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3739
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740
Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/x11-6.8.2-i486-7_slack10.2.tgz:i
Fixed an overflow in CID encoded Type1 font parsing.
For further reference, see:
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=411
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3739
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740
(* Security fix *)
patches/packages/x11-devel-6.8.2-i486-7_slack10.2.tgz: Recompiled.
patches/packages/x11-xdmx-6.8.2-i486-7_slack10.2.tgz: Recompiled.
patches/packages/x11-xnest-6.8.2-i486-7_slack10.2.tgz: Recompiled.
patches/packages/x11-xvfb-6.8.2-i486-7_slack10.2.tgz: Recompiled.
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-6.8.2-i486-7_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-devel-6.8.2-i486-7_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-xdmx-6.8.2-i486-7_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-xnest-6.8.2-i486-7_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-xvfb-6.8.2-i486-7_slack10.2.tgz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/x11-6.9.0-i486-11.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/x11-devel-6.9.0-i486-11.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/x11-xdmx-6.9.0-i486-11.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/x11-xnest-6.9.0-i486-11.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/x11-xvfb-6.9.0-i486-11.tgz
MD5 signatures:
+-------------+
Slackware 10.2 package:
a9316c321d186c6f9550b1f29ccc1501 x11-6.8.2-i486-7_slack10.2.tgz
20d998bce33e744ffd037d8190a42c18 x11-devel-6.8.2-i486-7_slack10.2.tgz
0a3327d025d6af59f54de9ac63404c97 x11-xdmx-6.8.2-i486-7_slack10.2.tgz
e236495f4e11a246b0027f6cfb5703d2 x11-xnest-6.8.2-i486-7_slack10.2.tgz
12a58e8efcdd6807b3d366fbcf9d79e4 x11-xvfb-6.8.2-i486-7_slack10.2.tgz
Slackware -current package:
59bf0501ce46391197ad571c9341c105 x11-6.9.0-i486-11.tgz
14c95b5eab916883a313c34db4fdb38a x11-devel-6.9.0-i486-11.tgz
2d19e8fe89b314fe93baed7c62d0a1cb x11-xdmx-6.9.0-i486-11.tgz
54369c52653384d0ff4310b56bd67c96 x11-xnest-6.9.0-i486-11.tgz
c8795b535a8c38cc4832dbbb5e4aa711 x11-xvfb-6.9.0-i486-11.tgz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg x11-6.8.2-i486-7_slack10.2.tgz x11-devel-6.8.2-i486-7_slack10.2.tgz x11-xdmx-6.8.2-i486-7_slack10.2.tgz x11-xnest-6.8.2-i486-7_slack10.2.tgz x11-xvfb-6.8.2-i486-7_slack10.2.tgz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3739
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740
Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/x11-6.8.2-i486-7_slack10.2.tgz:i
Fixed an overflow in CID encoded Type1 font parsing.
For further reference, see:
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=411
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3739
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740
(* Security fix *)
patches/packages/x11-devel-6.8.2-i486-7_slack10.2.tgz: Recompiled.
patches/packages/x11-xdmx-6.8.2-i486-7_slack10.2.tgz: Recompiled.
patches/packages/x11-xnest-6.8.2-i486-7_slack10.2.tgz: Recompiled.
patches/packages/x11-xvfb-6.8.2-i486-7_slack10.2.tgz: Recompiled.
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project!
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-6.8.2-i486-7_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-devel-6.8.2-i486-7_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-xdmx-6.8.2-i486-7_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-xnest-6.8.2-i486-7_slack10.2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/x11-xvfb-6.8.2-i486-7_slack10.2.tgz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/x11-6.9.0-i486-11.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/x11-devel-6.9.0-i486-11.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/x11-xdmx-6.9.0-i486-11.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/x11-xnest-6.9.0-i486-11.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/x/x11-xvfb-6.9.0-i486-11.tgz
MD5 signatures:
+-------------+
Slackware 10.2 package:
a9316c321d186c6f9550b1f29ccc1501 x11-6.8.2-i486-7_slack10.2.tgz
20d998bce33e744ffd037d8190a42c18 x11-devel-6.8.2-i486-7_slack10.2.tgz
0a3327d025d6af59f54de9ac63404c97 x11-xdmx-6.8.2-i486-7_slack10.2.tgz
e236495f4e11a246b0027f6cfb5703d2 x11-xnest-6.8.2-i486-7_slack10.2.tgz
12a58e8efcdd6807b3d366fbcf9d79e4 x11-xvfb-6.8.2-i486-7_slack10.2.tgz
Slackware -current package:
59bf0501ce46391197ad571c9341c105 x11-6.9.0-i486-11.tgz
14c95b5eab916883a313c34db4fdb38a x11-devel-6.9.0-i486-11.tgz
2d19e8fe89b314fe93baed7c62d0a1cb x11-xdmx-6.9.0-i486-11.tgz
54369c52653384d0ff4310b56bd67c96 x11-xnest-6.9.0-i486-11.tgz
c8795b535a8c38cc4832dbbb5e4aa711 x11-xvfb-6.9.0-i486-11.tgz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg x11-6.8.2-i486-7_slack10.2.tgz x11-devel-6.8.2-i486-7_slack10.2.tgz x11-xdmx-6.8.2-i486-7_slack10.2.tgz x11-xnest-6.8.2-i486-7_slack10.2.tgz x11-xvfb-6.8.2-i486-7_slack10.2.tgz
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com