Gentoo Linux Security Advisory 201405-7 - Multiple vulnerabilities have been found in X.Org X Server, allowing attackers to execute arbitrary code or cause a Denial of Service condition. Versions less than 1.14.3-r2 are affected.
f191a6d803ee52893abaf1ebc5b38cb24ae2b2f23d074bcaefcd37350622dea2
Red Hat Security Advisory 2013-1620-02 - X.Org is an open source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. A flaw was found in the way the X.org X11 server registered new hot plugged devices. If a local user switched to a different session and plugged in a new device, input from that device could become available in the previous session, possibly leading to information disclosure. This issue was found by David Airlie and Peter Hutterer of Red Hat.
d9b2327c50545970d9b73191ac1a524f85d7fbf297a2c977571a9de16d9ce5a3
Mandriva Linux Security Advisory 2013-260 - Multiple vulnerabilities have been discovered and corrected in x11-server. The updated packages have been patched to correct these issues.
50969d2a09bdf2e48ce14b12843f678f7e90396dd3d3c735132e96cfb2be5013
Ubuntu Security Notice 1803-1 - It was discovered that the X.Org X server did not properly clear input events in certain circumstances. A local attacker with physical access could use this flaw to capture keystrokes.
0a8fc43b37e93e1260e0124d3f96f99613c73e4adbc0f22dda8909721d36cfa6
Debian Linux Security Advisory 2661-1 - David Airlie and Peter Hutterer of Red Hat discovered that xorg-server, the Xorg X server was vulnerable to an information disclosure flaw related to input handling and devices hotplug.
ddec4e210a037caeffbc9a414e249bc38399f5e30f17b1044f4ffdad14f56b69