xorg-server vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the xorg-server package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
CVE-2024-31082

*
  • L
Use After Free

<2:1.20.4-1+deb10u14
  • L
Buffer Over-read

<2:1.20.4-1+deb10u14
  • L
Buffer Over-read

<2:1.20.4-1+deb10u14
  • M
CVE-2024-0408

<2:1.20.4-1+deb10u13
  • L
Access of Memory Location After End of Buffer

<2:1.20.4-1+deb10u13
  • H
Out-of-bounds Write

<2:1.20.4-1+deb10u13
  • C
Out-of-bounds Write

<2:1.20.4-1+deb10u13
  • L
Heap-based Buffer Overflow

<2:1.20.4-1+deb10u13
  • L
Heap-based Buffer Overflow

<2:1.20.4-1+deb10u13
  • H
Out-of-bounds Read

<2:1.20.4-1+deb10u12
  • H
Integer Overflow or Wraparound

<2:1.20.4-1+deb10u11
  • L
Use After Free

*
  • H
Out-of-bounds Write

<2:1.20.4-1+deb10u10
  • M
Use After Free

<2:1.20.4-1+deb10u10
  • H
Use After Free

<2:1.20.4-1+deb10u9
  • H
Use After Free

<2:1.20.4-1+deb10u8
  • H
Use After Free

<2:1.20.4-1+deb10u7
  • H
Out-of-bounds Write

<2:1.20.4-1+deb10u7
  • H
Use After Free

<2:1.20.4-1+deb10u7
  • H
Out-of-bounds Write

<2:1.20.4-1+deb10u7
  • H
Out-of-bounds Read

<2:1.20.4-1+deb10u7
  • H
Use After Free

<2:1.20.4-1+deb10u7
  • L
Improper Resource Shutdown or Release

*
  • H
Out-of-Bounds

<2:1.20.4-1+deb10u6
  • M
Improper Resource Shutdown or Release

<2:1.20.4-1+deb10u6
  • H
Out-of-bounds Write

<2:1.20.4-1+deb10u5
  • H
Improper Protection for Out of Bounds Signal Level Alerts

<2:1.20.4-1+deb10u5
  • H
Out-of-Bounds

<2:1.20.4-1+deb10u4
  • H
Out-of-Bounds

<2:1.20.4-1+deb10u4
  • H
Out-of-Bounds

<2:1.20.4-1+deb10u4
  • H
Out-of-Bounds

<2:1.20.4-1+deb10u4
  • H
Integer Underflow

<2:1.20.4-1+deb10u3
  • H
Heap-based Buffer Overflow

<2:1.20.4-1+deb10u2
  • H
Out-of-Bounds

<2:1.20.4-1+deb10u2
  • H
Integer Overflow or Wraparound

<2:1.20.4-1+deb10u1
  • H
Integer Overflow or Wraparound

<2:1.20.4-1+deb10u1
  • H
Integer Overflow or Wraparound

<2:1.20.4-1+deb10u1
  • H
Out-of-Bounds

<2:1.20.4-1+deb10u1
  • M
Improper Initialization

<2:1.20.4-1+deb10u1
  • M
Incorrect Authorization

<2:1.20.3-1
  • L
Information Exposure

<2:1.19.2-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Integer Overflow or Wraparound

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Integer Overflow or Wraparound

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • C
Improper Input Validation

<2:1.19.5-1
  • H
Out-of-Bounds

<2:1.19.4-1
  • M
Improper Privilege Management

<2:1.19.4-1
  • M
Improper Initialization

<2:1.19.3-2
  • H
Out-of-Bounds

<2:1.19.3-2
  • H
Divide By Zero

<2:1.16.4-1
  • M
Access Restriction Bypass

<2:1.17.2-1
  • M
Information Exposure

<2:1.16.4-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
CVE-2014-8091

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
Out-of-Bounds

<2:1.16.2.901-1
  • M
CVE-2014-8093

<2:1.16.2.901-1
  • M
CVE-2014-8092

<2:1.16.2.901-1
  • M
Integer Overflow or Wraparound

<2:1.16.2.901-1
  • H
Access Restriction Bypass

<2:1.11.3.901-2
  • L
Numeric Errors

<2:1.14.2.901-1
  • M
Resource Management Errors

<2:1.14.3-4
  • M
Access Restriction Bypass

<2:1.12.4-6
  • H
Improper Input Validation

<2:1.9.99.902-1
  • M
Improper Input Validation

<2:1.9.0.901-1
  • L
Link Following

<2:1.11.1.901-2
  • L
Race Condition

<2:1.11.1.901-2
  • C
Improper Input Validation

<2:1.12.1.902-1
  • L
Access Restriction Bypass

<2:1.6.1.901-3
  • C
Numeric Errors

<2:1.4.1~git20080517-2
  • M
Numeric Errors

<2:1.4.1~git20080517-2
  • M
Numeric Errors

<2:1.4.1~git20080517-2
  • H
Numeric Errors

<2:1.4.1~git20080517-2
  • H
Numeric Errors

<2:1.4.1~git20080517-2
  • H
Out-of-bounds Write

<2:1.4.1~git20080105-2
  • M
Information Exposure

<2:1.4.1~git20080105-2
  • H
Out-of-Bounds

<2:1.4.1~git20080105-2
  • H
Numeric Errors

<2:1.4.1~git20080105-2
  • H
CVE-2007-5760

<2:1.4.1~git20080105-2
  • M
CVE-2007-6428

<2:1.4.1~git20080105-2
  • M
CVE-2007-3920

<2:1.4.1~git20080118-1
  • M
Out-of-Bounds

<2:1.4-1
  • L
CVE-2007-2437

<2:1.3.0.0.dfsg-4
  • M
CVE-2007-1003

<2:1.1.1-21
  • H
CVE-2006-6103

<2:1.1.1-15
  • C
CVE-2006-6102

<2:1.1.1-15
  • H
CVE-2006-6101

<2:1.1.1-15
  • L
CVE-2006-4447

<1:1.0.2-9
  • M
CVE-2006-1526

<1:1.0.2-8
  • M
CVE-2006-0745

<1:1.0.2-1