krb5-libs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the krb5-libs package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Memory Leak

*
  • M
Memory Leak

*
  • L
Memory Leak

*
  • M
NULL Pointer Dereference

<0:1.10.3-33.el6
  • M
NULL Pointer Dereference

<0:1.10.3-33.el6
  • M
Improper Input Validation

<0:1.10.3-10.el6_4.3
  • M
NULL Pointer Dereference

<0:1.10.3-10.el6_4.2
  • M
NULL Pointer Dereference

<0:1.10.3-10.el6_4.1
  • M
NULL Pointer Dereference

<0:1.10.3-10.el6_4.1
  • H
Improper Input Validation

<0:1.9-33.el6_3.2
  • M
Memory Leak

<0:1.10.3-42z1.el6_7
  • H
CVE-2012-1013

<0:1.9-33.el6_3.2
  • M
Out-of-Bounds

<0:1.10.3-42z1.el6_7
  • M
NULL Pointer Dereference

<0:1.10.3-37.el6_6
  • M
NULL Pointer Dereference

<0:1.9-22.el6_2.1
  • M
Improper Input Validation

<0:1.9-9.el6_1.2
  • M
Improper Input Validation

<0:1.9-9.el6_1.2
  • M
Improper Input Validation

<0:1.9-9.el6_1.2
  • M
NULL Pointer Dereference

<0:1.10.3-37.el6_6
  • M
Use After Free

<0:1.10.3-33.el6
  • M
Improper Input Validation

<0:1.8.2-3.el6_0.7
  • M
Insufficient Comparison

<0:1.10.3-37.el6_6
  • H
Cryptographic Issues

<0:1.8.2-3.el6_0.4
  • M
Out-of-bounds Write

<0:1.10.3-33.el6
  • M
Use After Free

<0:1.10.3-37.el6_6
  • M
NULL Pointer Dereference

<0:1.10.3-33.el6
  • M
Out-of-bounds Read

<0:1.10.3-33.el6
  • M
Improper Handling of Length Parameter Inconsistency

<0:1.10.3-33.el6
  • M
Use After Free

<0:1.10.3-37.el6_6
  • H
Resource Management Errors

<0:1.8.2-3.el6_0.6
  • H
Improper Input Validation

<0:1.8.2-3.el6_0.4
  • H
CVE-2011-0282

<0:1.8.2-3.el6_0.4
  • H
Cryptographic Issues

<0:1.8.2-3.el6_0.3
  • H
Cryptographic Issues

<0:1.8.2-3.el6_0.3
  • H
Cryptographic Issues

<0:1.8.2-3.el6_0.3
  • H
Improper Input Validation

<0:1.8.2-3.el6_0.1
  • L
LDAP Injection

*
  • L
LDAP Injection

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*