
x11r6.9.0-geteuid.diff:
CVE-2006-0745: The X server as distributed with X11R6.9.0 allowed execution
of arbitrary code with root privileges if the server was installed setuid
root, as well as a DoS by writing log files to arbitrary locations as
root.
MD5: de85e59b8906f76a52ec9162ec6c0b63          x11r6.9.0-geteuid.diff
SHA1: f9b73b7c1bd7d6d6db6d23741d5d1125eea5f860  x11r6.9.0-geteuid.diff
x11r6.9.0-mitri.diff:
CVE-2006-1526:  A buffer overflow in the Render extension triangle 
handling code  makes it possible for an authorized client to crash 
the X server or allow execution of malicious code with the privileges 
of the X server.
MD5: d666925bfe3d76156c399091578579ae           x11r6.9.0-mitri.diff
SHA1: 3d9da8bb9b28957c464d28ea194d5df50e2a3e5c  x11r6.9.0-mitri.diff
x11r6.9.0-setuid.diff:
setuid() return value check problems on Linux systems.
MD5: 8e95fc06109d44ac280431d9cd8b41c9		x11r6.9.0-setuid.diff
SHA1: e576d725dd5f8d6c70df4b024adeecc5f7f90dc6	x11r6.9.0-setuid.diff