samba vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the samba package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

*
  • M
Incorrect Default Permissions

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

*
  • L
Race Condition

*
  • H
Reversible One-Way Hash

<0:4.10.16-24.el7_9
  • L
Unchecked Return Value

*
  • M
Incorrect Default Permissions

*
  • M
Information Exposure

*
  • C
Out-of-bounds Write

<0:4.10.16-18.el7_9
  • L
Race Condition

*
  • M
Race Condition

*
  • H
Improper Input Validation

<0:4.10.16-17.el7_9
  • H
Improper Authentication

<0:4.10.16-17.el7_9
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Improper Access Control

<0:4.2.10-7.el7_2
  • C
Improper Certificate Validation

<0:4.2.10-6.el7_2
  • C
Man-in-the-Middle (MitM)

<0:4.2.10-6.el7_2
  • C
Man-in-the-Middle (MitM)

<0:4.2.10-6.el7_2
  • C
Man-in-the-Middle (MitM)

<0:4.2.10-6.el7_2
  • C
Authentication Bypass

<0:4.2.10-6.el7_2
  • C
Man-in-the-Middle (MitM)

<0:4.2.10-6.el7_2
  • C
CVE-2015-5370

<0:4.2.10-6.el7_2
  • C
Man-in-the-Middle (MitM)

<0:4.2.10-6.el7_2
  • M
Improper Access Control

<0:4.2.3-12.el7_2
  • M
Incorrect Calculation of Multi-Byte String Length

<0:4.2.3-11.el7_2
  • M
Missing Authorization

<0:4.2.3-11.el7_2
  • M
Insufficient Verification of Data Authenticity

<0:4.2.3-11.el7_2
  • M
Path Equivalence

<0:4.2.3-11.el7_2
  • M
Directory Traversal

<0:4.10.4-10.el7
  • M
Out-of-bounds Read

<0:4.10.16-5.el7
  • H
Out-of-Bounds

<0:4.1.1-38.el7_0
  • H
Out-of-Bounds

<0:4.1.1-37.el7_0
  • M
Improper Input Validation

<0:4.1.1-35.el7_0
  • M
Missing Initialization of a Variable

<0:4.1.1-35.el7_0
  • M
Encoding Error

<0:4.1.1-35.el7_0
  • M
Allocation of Resources Without Limits or Throttling

<0:4.2.3-10.el7
  • M
Improper Authentication

<0:4.10.16-9.el7_9
  • M
Improper Null Termination

<0:4.10.16-9.el7_9
  • M
Incorrect Privilege Assignment

<0:4.10.16-9.el7_9
  • M
Directory Traversal

<0:4.9.1-6.el7
  • M
Directory Traversal

<0:4.10.4-10.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Out-of-bounds Read

<0:4.10.16-15.el7_9