Slackware Security Advisory - New libXres packages are available for Slackware 14.1, 14.2, and -current to fix a security issue.
ba4dee4196f1fd0039a52c066dad8f5928def70d4e1cdb78f9f3eece879723cc
Red Hat Security Advisory 2014-1436-02 - The X11 libraries provide library routines that are used within all X Window applications. Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the way various X11 client libraries handled certain protocol data. An attacker able to submit invalid protocol data to an X11 server via a malicious X11 client could use either of these flaws to potentially escalate their privileges on the system.
9bc4b5a9aabf00bcff355671d5717e02f39198aa036cfa96c9e9b2205910a13d
Gentoo Linux Security Advisory 201405-7 - Multiple vulnerabilities have been found in X.Org X Server, allowing attackers to execute arbitrary code or cause a Denial of Service condition. Versions less than 1.14.3-r2 are affected.
f191a6d803ee52893abaf1ebc5b38cb24ae2b2f23d074bcaefcd37350622dea2
Ubuntu Security Notice 1864-1 - Ilja van Sprundel discovered multiple security issues in various X.org libraries and components. An attacker could use these issues to cause applications to crash, resulting in a denial of service, or possibly execute arbitrary code.
292ae0718860d8250f3b7c0d90f53555e2ede217205d92c1af22dcd904f1bd6d
Debian Linux Security Advisory 2688-1 - Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related conversions, buffer overflows, memory corruption and missing input sanitizing may lead to privilege escalation or denial of service.
f0f238273af66cc3adfe3cf4c1d1f708cbf8597f7e07dd972df9e40ede5f30bd