Slackware Advisory SSA:2006-123-01 xorg server overflow

Summary
The remote host is missing an update as announced via advisory SSA:2006-123-01.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2006-123-01
Insight
New xorg and xorg-devel packages are available for Slackware 10.1, 10.2, and -current to fix a security issue. A typo in the X render extension in X.Org 6.8.0 or later allows an X client to crash the server and possibly to execute arbitrary code as the X server user (typically this is 'root'.) More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526 The advisory from X.Org may be found here: http://lists.freedesktop.org/archives/xorg/2006-May/015136.html