xorg-x11-server-source vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xorg-x11-server-source package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Use After Free

<0:1.20.11-27.el8_10
  • M
Use After Free

<0:1.20.11-27.el8_10
  • M
Integer Overflow or Wraparound

<0:1.20.11-27.el8_10
  • H
Integer Overflow or Wraparound

<0:1.20.11-26.el8_10
  • H
Information Exposure

*
  • H
Integer Overflow or Wraparound

<0:1.20.11-26.el8_10
  • H
Out-of-bounds Read

<0:1.20.11-26.el8_10
  • H
Improper Locking

<0:1.20.11-26.el8_10
  • H
Integer Overflow or Wraparound

<0:1.20.11-26.el8_10
  • M
Heap-based Buffer Overflow

<0:1.20.11-25.el8_10
  • M
Buffer Over-read

<0:1.20.11-23.el8_10
  • M
Use After Free

<0:1.20.11-23.el8_10
  • M
Buffer Over-read

<0:1.20.11-23.el8_10
  • M
Heap-based Buffer Overflow

<0:1.20.11-22.el8
  • M
Out-of-bounds Write

<0:1.20.11-22.el8
  • M
Out-of-bounds Write

*
  • M
Improper Neutralization of Null Byte or NUL Character

<0:1.20.11-22.el8
  • M
Out-of-bounds Write

<0:1.20.11-22.el8
  • M
Heap-based Buffer Overflow

<0:1.20.11-22.el8
  • M
Integer Overflow or Wraparound

<0:1.20.11-22.el8
  • M
Out-of-bounds Write

<0:1.20.11-22.el8
  • M
Use After Free

*
  • M
Use After Free

<0:1.20.11-22.el8
  • M
Out-of-bounds Write

<0:1.20.11-22.el8
  • M
Use After Free

<0:1.20.11-17.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Out-of-bounds Write

<0:1.20.11-15.el8
  • M
Out-of-bounds Read

<0:1.20.11-15.el8
  • M
Stack-based Buffer Overflow

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Out-of-Bounds

<0:1.20.11-15.el8
  • M
Memory Leak

<0:1.20.11-15.el8
  • M
Out-of-bounds Write

<0:1.20.11-9.el8
  • M
Improper Protection for Out of Bounds Signal Level Alerts

<0:1.20.11-9.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Underflow

*
  • M
Missing Authentication for Critical Function

*