Ubuntu Security Notice 280-1 - The Render extension of the X.org server incorrectly calculated the size of a memory buffer, which led to a buffer overflow. A local attacker could exploit this to crash the X server or even execute arbitrary code with root privileges.
4252ccbc2fa1be87bfa9830eeceead304eb917d6bbb3ed937fbe535b1568bf57
SUSE Security Announcement SUSE-SA-2006-023 - Miscalculation of a buffer size in the X Render extension of the X.Org X11 server could potentially be exploited by users to cause a buffer overflow and run code with elevated privileges.
52d90b0b78168a60644274e0a3f413c07be58b05e633809e2a7b89236c5a4fc1
Mandriva Linux Security Advisory MDKSA-2006-081 - A problem was discovered in xorg-x11 where the X render extension would mis-calculate the size of a buffer, leading to an overflow that could possibly be exploited by clients of the X server.
2ada09873fc6bc397367940a4fa6b66f717149851074c90fc0b22de7d0746015