Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Centos » Important CentOS 7 xorg-x11-server Security Update

Important CentOS 7 xorg-x11-server Security Update

  • Vendor: Centos
  • Vendor ID: CESA-2014:1983
  • Date: December 11, 2014


CentOS Errata and Security Advisory 2014:1983 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1983.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
25c346880f3748436057b98c8abdb4983348d929488d2e92f2d1a4df4702ea87 xorg-x11-server-common-1.15.0-7.el7_0.3.x86_64.rpm
27d1e743db0018993426ccdac8e39e8674d6c9c5c8a28ae443d0e6d5cd8544d4 xorg-x11-server-devel-1.15.0-7.el7_0.3.i686.rpm
4533997894d055edd8044deee6576bbde9033dbd93f2c38a245d8fa8a7a466d4 xorg-x11-server-devel-1.15.0-7.el7_0.3.x86_64.rpm
cc215d5a48fd7e0594a0527d58872822e9aab6d6a5e9cf9fb61ca23c3a7e3e23 xorg-x11-server-source-1.15.0-7.el7_0.3.noarch.rpm
3c5308aea94c229d6066a569f29adbd0103619a076e65a5625e27b992284f17f xorg-x11-server-Xdmx-1.15.0-7.el7_0.3.x86_64.rpm
5e019ef3b76e6dec4380bc902d7aa3a56852c5fbbbc3ee066ddb23d2726d0996 xorg-x11-server-Xephyr-1.15.0-7.el7_0.3.x86_64.rpm
2eb7582e057cbf95c6766971592f3eb509d802bca5a235b2358da612ad738e62 xorg-x11-server-Xnest-1.15.0-7.el7_0.3.x86_64.rpm
6497f3b531d7b401ef842b8bf29fc97bb8f95bddbf3871c6e66b0e1899fcade7 xorg-x11-server-Xorg-1.15.0-7.el7_0.3.x86_64.rpm
3f683d130f9c1444b65f7bb76f4eed6a055f86b1605e36bfda4e5db3c3ea6930 xorg-x11-server-Xvfb-1.15.0-7.el7_0.3.x86_64.rpm

Source:
52f2205b6f2f67575d20ada900a33e3a8e826e9f2654a87385fa06e7d23e4b60 xorg-x11-server-1.15.0-7.el7_0.3.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »