mesa-libxatracker vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the mesa-libxatracker package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Integer Underflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Heap-based Buffer Overflow

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Out-of-Bounds

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Improper Initialization

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Integer Overflow or Wraparound

<0:20.3.3-2.el8
  • M
Incorrect Permission Assignment for Critical Resource

*