xorg-server vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://x.org|xorg-server package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Heap-based Buffer Overflow

[1.1.1,21.1.14)
  • H
Buffer Over-read

[,21.1.12)
  • H
Buffer Over-read

[1.7.0,21.1.12)
  • H
Buffer Over-read

[,21.1.12)
  • H
Use After Free

[,21.1.12)
  • M
Improper Neutralization of Null Byte or NUL Character

[,21.1.11)[22.1.0,23.2.4)
  • H
Out-of-bounds Write

[,21.1.11)[22.1.0,23.2.4)
  • H
Heap-based Buffer Overflow

[,21.1.11)[22.1.0,23.2.4)
  • H
Heap-based Buffer Overflow

[,21.1.11)[22.1.0,23.2.4)
  • H
Out-of-Bounds Write

[,21.1.11)[22.1.0,23.2.4)
  • H
Improper Restriction of Operations within the Bounds of a Memory Buffer

[,21.1.11)[22.1.0,23.2.4)
  • H
Out-of-bounds Read

[,21.1.10)
  • H
Out-of-bounds Read

[,21.1.10)
  • H
Out-of-Bounds Write

[,21.1.9)
  • H
Use After Free

[0,)
  • M
Use After Free

[,21.1.9)
  • H
Use After Free

[,21.1.8)
  • H
Use After Free

[0,)
  • H
Denial of Service (DoS)

[0,)
  • C
Buffer Overflow

[0,)
  • H
Missing Release of Memory after Effective Lifetime

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Arbitrary Code Execution

[0,)
  • H
Out-of-Bounds

[0,)
  • H
Out-of-Bounds

[,1.20.14)[21.0.0,21.1.2)
  • M
Information Exposure

[,1.20.14)[21.0.0,21.1.2)
  • C
Out-of-bounds Write

[,1.20.14)[21.0.0,21.1.2)
  • M
Out-of-bounds Read

[,1.20.14)[21.0.0,21.1.2)
  • C
Improper Input Validation

[,1.19.5)
  • C
Integer Overflow or Wraparound

[,1.19.5)
  • L
Race Condition

[,1.11.1.901)
  • M
Out-of-Bounds

[,1.16.2.901)
  • M
Information Exposure

[,1.16.4)
  • M
Improper Input Validation

[,1.7.99.1)
  • C
Integer Overflow or Wraparound

[,1.19.5)
  • M
Integer Overflow or Wraparound

[,1.16.3)
  • M
Out-of-Bounds

[,1.16.2.901)
  • M
Out-of-Bounds

[,1.16.2.901)
  • H
Out-of-Bounds

[,1.19.4)
  • H
Heap-based Buffer Overflow

[,1.20.10)
  • H
Out-of-Bounds

[,1.20.9)
  • M
Access Restriction Bypass

[,1.13.4)
  • H
Integer Underflow

[,1.20.9)
  • M
Out-of-Bounds

[,1.16.2.901)
  • M
Denial of Service (DoS)

[,1.16.2.901)
  • M
Denial of Service (DoS)

[,1.16.2.901)
  • M
Out-of-Bounds

[,1.16.2.901)
  • C
Improper Input Validation

[,1.19.5)
  • C
Improper Input Validation

[,1.19.5)
  • C
Improper Input Validation

[,1.19.5)
  • H
Integer Underflow

[,1.20.9)
  • C
Improper Input Validation

[,1.19.5)
  • C
Improper Input Validation

[,1.19.5)
  • M
Access Restriction Bypass

[,1.20.3)
  • M
Access Restriction Bypass

[,1.19.4)
  • M
Denial of Service (DoS)

[,1.16.2.901)
  • M
Out-of-Bounds

[,1.16.2.901)
  • C
Improper Input Validation

[,1.19.5)
  • H
Out-of-bounds Write

[,1.4.1)
  • M
Access Restriction Bypass

[,1.19.4)
  • C
Improper Input Validation

[,1.19.5)
  • H
Integer Underflow

[,1.20.9)
  • L
Symlink Attack

[,1.11.1.901)
  • H
Information Exposure

[,1.19.5)
  • H
Out-of-Bounds

[,1.19.4)
  • C
Improper Input Validation

[,1.19.5)
  • H
Divide By Zero

[,1.16.4)
  • M
Out-of-Bounds

[,1.16.2.901)
  • H
Out-of-Bounds

[,1.20.10)
  • H
Out-of-bounds Write

[,1.20.5)
  • H
Integer Underflow

[,1.20.11)
  • C
Improper Input Validation

[,1.19.5)
  • M
Access Restriction Bypass

[,1.17.2)
  • M
Out-of-Bounds

[,1.16.2.901)
  • M
Out-of-Bounds

[,1.16.3)
  • M
Improper Initialization

[,1.20.9)
  • M
Resource Management Errors

[,1.14.4)
  • H
Denial of Service (DoS)

[0,1.4.99.902-3.20080612.fc9)
  • H
Improper Input Validation

[,1.0)
  • M
Access Restriction Bypass

[,7.6)
  • H
Denial of Service (DoS)

[,7.1]
  • H
Denial of Service (DoS)

[0,1.4.99.902-3.20080612.fc9)
  • M
Denial of Service (DoS)

[0,1.4.99.902-3.20080612.fc9)
  • C
Denial of Service (DoS)

[0,1.4.99.902-3.20080612.fc9)
  • M
Access Restriction Bypass

[0,)