xorg-x11-server-source vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xorg-x11-server-source package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Heap-based Buffer Overflow

<0:1.20.11-25.el8_10
  • M
Buffer Over-read

<0:1.20.11-23.el8_10
  • M
Use After Free

<0:1.20.11-23.el8_10
  • M
Buffer Over-read

<0:1.20.11-23.el8_10
  • M
Heap-based Buffer Overflow

<0:1.20.11-22.el8
  • M
Out-of-bounds Write

<0:1.20.11-22.el8
  • M
Out-of-bounds Write

*
  • M
Improper Neutralization of Null Byte or NUL Character

<0:1.20.11-22.el8
  • M
Out-of-bounds Write

<0:1.20.11-22.el8
  • M
Heap-based Buffer Overflow

<0:1.20.11-22.el8
  • M
Integer Overflow or Wraparound

<0:1.20.11-22.el8
  • M
Out-of-bounds Write

<0:1.20.11-22.el8
  • M
Use After Free

*
  • M
Use After Free

<0:1.20.11-22.el8
  • M
Out-of-bounds Write

<0:1.20.11-22.el8
  • M
Use After Free

<0:1.20.11-17.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Out-of-bounds Write

<0:1.20.11-15.el8
  • M
Out-of-bounds Write

<0:1.20.11-15.el8
  • M
Out-of-bounds Write

<0:1.20.11-15.el8
  • M
Out-of-bounds Write

<0:1.20.11-15.el8
  • M
Out-of-bounds Write

<0:1.20.11-15.el8
  • M
Out-of-bounds Read

<0:1.20.11-15.el8
  • M
Out-of-bounds Read

<0:1.20.11-15.el8
  • M
Out-of-bounds Read

<0:1.20.11-15.el8
  • M
Out-of-bounds Read

<0:1.20.11-15.el8
  • M
Out-of-bounds Read

<0:1.20.11-15.el8
  • M
Stack-based Buffer Overflow

<0:1.20.11-15.el8
  • M
Stack-based Buffer Overflow

<0:1.20.11-15.el8
  • M
Stack-based Buffer Overflow

<0:1.20.11-15.el8
  • M
Stack-based Buffer Overflow

<0:1.20.11-15.el8
  • M
Stack-based Buffer Overflow

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Use After Free

<0:1.20.11-15.el8
  • M
Out-of-Bounds

<0:1.20.11-15.el8
  • M
Out-of-Bounds

<0:1.20.11-15.el8
  • M
Out-of-Bounds

<0:1.20.11-15.el8
  • M
Out-of-Bounds

<0:1.20.11-15.el8
  • M
Out-of-Bounds

<0:1.20.11-15.el8
  • M
Memory Leak

<0:1.20.11-15.el8
  • M
Memory Leak

<0:1.20.11-15.el8
  • M
Memory Leak

<0:1.20.11-15.el8
  • M
Memory Leak

<0:1.20.11-15.el8
  • M
Memory Leak

<0:1.20.11-15.el8
  • M
Out-of-bounds Write

<0:1.20.11-9.el8
  • M
Out-of-bounds Write

<0:1.20.11-9.el8
  • M
Out-of-bounds Write

<0:1.20.11-9.el8
  • M
Out-of-bounds Write

<0:1.20.11-9.el8
  • M
Out-of-bounds Write

<0:1.20.11-9.el8
  • M
Improper Protection for Out of Bounds Signal Level Alerts

<0:1.20.11-9.el8
  • M
Improper Protection for Out of Bounds Signal Level Alerts

<0:1.20.11-9.el8
  • M
Improper Protection for Out of Bounds Signal Level Alerts

<0:1.20.11-9.el8
  • M
Improper Protection for Out of Bounds Signal Level Alerts

<0:1.20.11-9.el8
  • M
Improper Protection for Out of Bounds Signal Level Alerts

<0:1.20.11-9.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Out-of-Bounds

<0:1.20.11-5.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Integer Underflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Heap-based Buffer Overflow

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Out-of-Bounds

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Improper Initialization

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Overflow or Wraparound

<0:1.20.10-1.el8
  • M
Integer Underflow

*
  • M
Missing Authentication for Critical Function

*