CVE-2006-1526

NameCVE-2006-1526
DescriptionBuffer overflow in the X render (Xrender) extension in X.org X server 6.8.0 up to allows attackers to cause a denial of service (crash), as demonstrated by the (1) XRenderCompositeTriStrip and (2) XRenderCompositeTriFan requests in the rendertest from XCB xcb/xcb-demo, which leads to an incorrect memory allocation due to a typo in an expression that uses a "&" instead of a "*" operator. NOTE: the subject line of the original announcement used an incorrect CVE number for this issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs378464

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xorg-server (PTS)jessie, jessie (lts)2:1.16.4-1+deb8u17fixed
stretch (security)2:1.19.2-1+deb9u9fixed
stretch (lts), stretch2:1.19.2-1+deb9u20fixed
buster, buster (lts)2:1.20.4-1+deb10u15fixed
buster (security)2:1.20.4-1+deb10u14fixed
bullseye2:1.20.11-1+deb11u13fixed
bullseye (security)2:1.20.11-1+deb11u14fixed
bookworm (security), bookworm2:21.1.7-3+deb12u8fixed
trixie2:21.1.14-2fixed
sid2:21.1.15-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xfree86sourcesarge(not affected)
xorg-serversource(unstable)1:1.0.2-8378464

Notes

[sarge] - xfree86 <not-affected> (Vulnerable code not present)

Search for package or bug name: Reporting problems