openldap-clients vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openldap-clients package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

<0:2.4.44-22.el7
  • M
NULL Pointer Dereference

<0:2.4.44-23.el7_9
  • M
Reachable Assertion

<0:2.4.44-25.el7_9
  • M
Reachable Assertion

<0:2.4.44-25.el7_9
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • L
NULL Pointer Dereference

*
  • M
SQL Injection

*
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • H
Improper Input Validation

<0:2.4.39-7.el7_1
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
Off-by-one Error

<0:2.4.40-8.el7
  • M
NULL Pointer Dereference

<0:2.4.44-23.el7_9
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

<0:2.4.44-22.el7
  • M
Reachable Assertion

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Improper Handling of Length Parameter Inconsistency

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • M
Integer Underflow

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Reachable Assertion

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Reachable Assertion

<0:2.4.44-25.el7_9
  • M
Reachable Assertion

<0:2.4.44-25.el7_9
  • M
Improper Access Control

*
  • M
Information Exposure

*
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • M
Use After Free

<0:2.4.44-5.el7
  • L
Improper Validation of Certificate with Host Mismatch

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7
  • M
Incorrect Calculation

<0:2.4.40-8.el7