samba vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the samba package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Use of Uninitialized Resource

<4.21.9-r0
  • M
Files or Directories Accessible to External Parties

<4.21.6-r0
  • C
OS Command Injection

<4.21.9-r0
  • M
Resource Exhaustion

<4.8.7-r0
  • M
NULL Pointer Dereference

<4.8.7-r0
  • M
NULL Pointer Dereference

<4.8.4-r0
  • H
Cryptographic Issues

<4.7.0-r0
  • M
CVE-2023-42670

<4.18.8-r0
  • M
Incorrect Default Permissions

<4.18.8-r0
  • H
Man-in-the-Middle (MitM)

<4.7.0-r0
  • H
Missing Authorization

<4.15.2-r0
  • M
Improper Authentication

<4.15.2-r0
  • M
NULL Pointer Dereference

<4.15.0-r0
  • M
Incorrect Default Permissions

<4.11.3-r0
  • M
Improper Authentication

<4.11.3-r0
  • C
Use After Free

<4.7.3-r0
  • H
Out-of-Bounds

<4.7.3-r0
  • M
Double Free

<4.8.7-r0
  • H
Insufficiently Protected Credentials

<4.8.4-r0
  • H
Out-of-Bounds

<4.8.4-r0
  • H
Information Exposure

<4.7.0-r0
  • M
Missing Authorization

<4.18.9-r0
  • H
Incorrect Default Permissions

<4.17.0-r0
  • H
Race Condition

<4.6.1-r0
  • M
CVE-2021-3670

<4.15.9-r0
  • H
Out-of-bounds Read

<4.15.9-r0
  • M
Heap-based Buffer Overflow

<4.16.6-r0
  • M
Information Exposure

<4.8.4-r0
  • M
Improper Input Validation

<4.8.4-r0
  • H
Improper Authentication

<4.15.9-r0
  • M
NULL Pointer Dereference

<4.7.6-r0
  • H
CVE-2021-23192

<4.15.2-r0
  • H
Incorrect Authorization

<4.7.6-r0
  • M
NULL Pointer Dereference

<4.12.9-r0
  • H
Race Condition

<4.15.2-r0
  • M
Use After Free

<4.15.9-r0
  • M
Improper Privilege Management

<4.12.9-r0
  • M
Use After Free

<4.11.5-r0
  • M
Link Following

<4.16.6-r0
  • M
Directory Traversal

<4.11.2-r0
  • M
Out-of-bounds Read

<4.11.5-r0
  • H
Integer Overflow or Wraparound

<4.16.7-r0
  • H
Improper Input Validation

<4.15.2-r0
  • C
Directory Traversal

<4.10.8-r0
  • H
Improper Input Validation

<4.15.2-r0
  • H
Out-of-bounds Read

<4.14.2-r0
  • M
CVE-2020-14383

<4.12.9-r0
  • M
Directory Traversal

<4.8.11-r0
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<4.8.11-r0
  • M
NULL Pointer Dereference

<4.10.5-r0
  • M
Incorrect Permission Assignment for Critical Resource

<4.18.1-r0
  • M
NULL Pointer Dereference

<4.10.5-r0
  • C
Directory Traversal

<4.18.8-r0
  • M
CVE-2023-42669

<4.18.8-r0
  • M
Out-of-bounds Write

<4.18.8-r0
  • M
CVE-2022-32742

<4.15.9-r0
  • H
Authentication Bypass

<4.15.9-r0
  • H
Use After Free

<4.15.2-r0
  • H
Incorrect Authorization

<4.15.2-r0
  • H
Out-of-bounds Read

<4.14.2-r0
  • M
Use of Insufficiently Random Values

<4.17.0-r0
  • M
Out-of-bounds Read

<4.14.4-r0
  • M
Use After Free

<4.12.5-r0
  • H
Resource Exhaustion

<4.12.5-r0
  • M
CVE-2019-14902

<4.11.5-r0
  • M
Improper Privilege Management

<4.12.7-r0
  • H
Improperly Implemented Security Check for Standard

<4.10.3-r0
  • H
Improper Input Validation

<4.12.5-r0
  • H
Buffer Overflow

<4.12.2-r0
  • M
Use After Free

<4.12.2-r0
  • M
Weak Password Requirements

<4.11.2-r0
  • M
NULL Pointer Dereference

<4.12.5-r0