xorg-server-1.0.1-geteuid.diff:
CVE-2006-0745: The X server as distributed with X11R7 (xorg-server 1.0.0, as well
as xorg-server 1.0.1) allowed execution of arbitrary code with root privileges if
the server was installed setuid root, as well as a DoS by writing log files to
arbitrary locations as root.
MD5: 80db6a3ab76334061ec6102e74ef5607 xorg-server-1.0.1-geteuid.diff
SHA1: 44b44fa3efc63697eefadc7c2a1bfa50a35eec91 xorg-server-1.0.1-geteuid.diff
xorg-server-1.0.x-mitri.diff:
CVE-2006-1526: A buffer overflow in the Render extension triangle
handling code makes it possible for an authorized client to crash
the X server or allow execution of malicious code with the privileges
of the X server.
MD5: 9a9356f86fe2c10985f1008d459fb272 x11r7.0-mitri.diff
SHA1: d6eba2bddac69f12f21785ea94397b206727ba93 x11r7.0-mitri.diff
x11r7.0-setuid.diff:
setuid() return value check problems on Linux systems.
MD5: 8e95fc06109d44ac280431d9cd8b41c9 x11r7.0-setuid.diff
SHA1: e576d725dd5f8d6c70df4b024adeecc5f7f90dc6 x11r7.0-setuid.diff