xorg-server vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xorg-server package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Locking

<2:21.1.7-3+deb12u10
  • H
Integer Overflow or Wraparound

<2:21.1.7-3+deb12u10
  • M
Information Exposure

<2:21.1.7-3+deb12u10
  • M
Out-of-bounds Read

<2:21.1.7-3+deb12u10
  • H
Integer Overflow or Wraparound

<2:21.1.7-3+deb12u10
  • H
Integer Overflow or Wraparound

<2:21.1.7-3+deb12u10
  • L
CVE-2022-49737

*
  • H
Use After Free

<2:21.1.7-3+deb12u9
  • H
Access of Uninitialized Pointer

<2:21.1.7-3+deb12u9
  • H
Out-of-Bounds

<2:21.1.7-3+deb12u9
  • H
Out-of-bounds Write

<2:21.1.7-3+deb12u9
  • H
Out-of-bounds Write

<2:21.1.7-3+deb12u9
  • H
Use After Free

<2:21.1.7-3+deb12u9
  • H
Use After Free

<2:21.1.7-3+deb12u9
  • H
Out-of-bounds Write

<2:21.1.7-3+deb12u9
  • H
Heap-based Buffer Overflow

<2:21.1.7-3+deb12u8
  • L
CVE-2024-31082

<2:21.1.7-3+deb12u7
  • L
Buffer Over-read

<2:21.1.7-3+deb12u7
  • L
Buffer Over-read

<2:21.1.7-3+deb12u7
  • L
Use After Free

<2:21.1.7-3+deb12u7
  • C
Out-of-bounds Write

<2:21.1.7-3+deb12u5
  • H
Out-of-bounds Write

<2:21.1.7-3+deb12u5
  • L
Heap-based Buffer Overflow

<2:21.1.7-3+deb12u5
  • L
Heap-based Buffer Overflow

<2:21.1.7-3+deb12u5
  • H
Out-of-bounds Write

<2:21.1.7-3+deb12u5
  • M
CVE-2024-0408

<2:21.1.7-3+deb12u5
  • H
Integer Overflow or Wraparound

<2:21.1.7-3+deb12u3
  • H
Out-of-bounds Read

<2:21.1.7-3+deb12u4
  • L
Use After Free

*
  • H
Out-of-bounds Write

<2:21.1.7-3+deb12u2
  • M
Use After Free

<2:21.1.7-3+deb12u2
  • H
Use After Free

<2:21.1.7-2
  • H
Use After Free

<2:21.1.7-1
  • H
Use After Free

<2:21.1.5-1
  • H
Out-of-bounds Write

<2:21.1.5-1
  • H
Use After Free

<2:21.1.5-1
  • H
Out-of-bounds Write

<2:21.1.5-1
  • H
Out-of-bounds Read

<2:21.1.5-1
  • H
Use After Free

<2:21.1.5-1
  • L
Improper Resource Shutdown or Release

<2:21.1.4-1
  • H
Out-of-Bounds

<2:21.1.4-3
  • M
Improper Resource Shutdown or Release

<2:21.1.4-3
  • H
Out-of-bounds Write

<2:21.1.4-1
  • H
Improper Protection for Out of Bounds Signal Level Alerts

<2:21.1.4-1
  • H
Out-of-Bounds

<2:1.20.13-3
  • H
Out-of-Bounds

<2:1.20.13-3
  • H
Out-of-Bounds

<2:1.20.13-3
  • H
Out-of-Bounds

<2:1.20.13-3
  • H
Integer Underflow

<2:1.20.11-1
  • H
Heap-based Buffer Overflow

<2:1.20.10-1
  • H
Out-of-Bounds

<2:1.20.10-1
  • H
Integer Overflow or Wraparound

<2:1.20.9-1
  • H
Integer Overflow or Wraparound

<2:1.20.9-1
  • H
Integer Overflow or Wraparound

<2:1.20.9-1
  • H
Out-of-Bounds

<2:1.20.9-1
  • M
Improper Initialization

<2:1.20.9-1
  • M
Incorrect Authorization

<2:1.20.3-1
  • L
Information Exposure

<2:1.19.2-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Integer Overflow or Wraparound

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Integer Overflow or Wraparound

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • H
Out-of-Bounds

<2:1.19.4-1
  • M
Improper Privilege Management

<2:1.19.4-1
  • M
Improper Initialization

<2:1.19.3-2
  • H
Out-of-Bounds

<2:1.19.3-2
  • H
Divide By Zero

<2:1.16.4-1
  • M
Access Restriction Bypass

<2:1.17.2-1
  • M
Information Exposure

<2:1.16.4-1
  • M
CVE-2014-8092

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Integer Overflow or Wraparound

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
CVE-2014-8091

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
CVE-2014-8093

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • H
Access Restriction Bypass

<2:1.11.3.901-2
  • L
Numeric Errors

<2:1.14.2.901-1
  • M
Resource Management Errors

<2:1.14.3-4
  • M
Access Restriction Bypass

<2:1.12.4-6
  • M
Improper Input Validation

<2:1.9.0.901-1
  • H
Improper Input Validation

<2:1.9.99.902-1
  • L
Race Condition

<2:1.11.1.901-2
  • L
Link Following

<2:1.11.1.901-2
  • C
Improper Input Validation

<2:1.12.1.902-1
  • L
Access Restriction Bypass

<2:1.6.1.901-3
  • H
Numeric Errors

<2:1.4.1~git20080517-2
  • M
Numeric Errors

<2:1.4.1~git20080517-2
  • M
Numeric Errors

<2:1.4.1~git20080517-2
  • C
Numeric Errors

<2:1.4.1~git20080517-2
  • H
Numeric Errors

<2:1.4.1~git20080517-2
  • H
Numeric Errors

<2:1.4.1~git20080105-2
  • M
Information Exposure

<2:1.4.1~git20080105-2
  • H
CVE-2007-5760

<2:1.4.1~git20080105-2
  • M
CVE-2007-6428

<2:1.4.1~git20080105-2
  • H
Out-of-Bounds

<2:1.4.1~git20080105-2
  • H
Out-of-bounds Write

<2:1.4.1~git20080105-2
  • M
CVE-2007-3920

<2:1.4.1~git20080118-1
  • M
Out-of-Bounds

<2:1.4-1
  • L
CVE-2007-2437

<2:1.3.0.0.dfsg-4
  • M
CVE-2007-1003

<2:1.1.1-21
  • H
CVE-2006-6103

<2:1.1.1-15
  • H
CVE-2006-6101

<2:1.1.1-15
  • C
CVE-2006-6102

<2:1.1.1-15
  • L
CVE-2006-4447

<1:1.0.2-9
  • M
CVE-2006-1526

<1:1.0.2-8
  • M
CVE-2006-0745

<1:1.0.2-1