samba-krb5-printing vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the samba-krb5-printing package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Reversible One-Way Hash

<0:4.10.16-24.el7_9
  • C
Out-of-bounds Write

<0:4.10.16-18.el7_9
  • M
Improper Authentication

<0:4.10.16-9.el7_9
  • M
Improper Null Termination

<0:4.10.16-9.el7_9
  • M
Incorrect Privilege Assignment

<0:4.10.16-9.el7_9
  • M
Out-of-bounds Read

<0:4.10.16-15.el7_9
  • M
Directory Traversal

<0:4.10.4-10.el7
  • M
Directory Traversal

<0:4.10.4-10.el7
  • M
Out-of-bounds Read

<0:4.10.16-5.el7
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • H
Improper Input Validation

<0:4.10.16-17.el7_9
  • H
Improper Authentication

<0:4.10.16-17.el7_9
  • M
Directory Traversal

<0:4.9.1-6.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • M
Resource Exhaustion

*
  • M
Incorrect Default Permissions

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

*
  • L
Race Condition

*
  • H
Reversible One-Way Hash

<0:4.10.16-24.el7_9
  • L
Unchecked Return Value

*
  • M
Incorrect Default Permissions

*
  • M
Information Exposure

*
  • C
Out-of-bounds Write

<0:4.8.3-7.el7_6
  • C
Out-of-bounds Write

<0:4.10.16-18.el7_9
  • C
Out-of-bounds Write

<0:4.9.1-12.el7_7
  • C
Out-of-bounds Write

<0:4.8.3-7.el7_6
  • C
Out-of-bounds Write

<0:4.9.1-12.el7_7
  • C
Out-of-bounds Write

<0:4.11.6-116.el7rhgs
  • C
Out-of-bounds Write

<0:4.9.1-12.el7_7
  • C
Out-of-bounds Write

<0:4.8.3-7.el7_6
  • L
Race Condition

*
  • M
Race Condition

*
  • H
Improper Input Validation

<0:4.10.16-17.el7_9
  • H
Improper Input Validation

<0:4.11.6-114.el7rhgs
  • H
Improper Authentication

<0:4.11.6-114.el7rhgs
  • H
Improper Authentication

<0:4.10.16-17.el7_9
  • M
Improper Input Validation

<0:4.7.5-110.el7rhgs
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • M
NULL Pointer Dereference

<0:4.7.5-110.el7rhgs
  • M
NULL Pointer Dereference

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.7.5-110.el7rhgs
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • M
Improper Input Validation

<0:4.8.3-4.el7
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.2-12.el7_4
  • H
Out-of-Bounds

<0:4.6.3-9.el7rhgs
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.3-9.el7rhgs
  • H
Use After Free

<0:4.6.2-12.el7_4
  • H
Use After Free

<0:4.6.2-12.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.3-6.el7rhgs
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.3-6.el7rhgs
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • M
Information Exposure

<0:4.6.2-11.el7_4
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.6-5.el7rhgs
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • H
Arbitrary Code Injection

<0:4.4.4-14.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.6.3-4.el7rhgs
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Race Condition

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.6-4.el7rhgs
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Improper Authentication

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.4-13.el7_3
  • M
Access Restriction Bypass

<0:4.4.6-4.el7rhgs
  • M
Directory Traversal

<0:4.9.8-109.el7rhgs
  • M
Directory Traversal

<0:4.10.4-10.el7
  • M
Out-of-bounds Read

<0:4.11.6-104.el7rhgs
  • M
Out-of-bounds Read

<0:4.10.16-5.el7
  • M
Improper Authentication

<0:4.11.6-112.el7rhgs
  • M
Improper Authentication

<0:4.10.16-9.el7_9
  • M
Improper Null Termination

<0:4.11.6-112.el7rhgs
  • M
Improper Null Termination

<0:4.10.16-9.el7_9
  • M
Incorrect Privilege Assignment

<0:4.11.6-112.el7rhgs
  • M
Incorrect Privilege Assignment

<0:4.10.16-9.el7_9
  • M
Directory Traversal

<0:4.9.1-6.el7
  • M
Directory Traversal

<0:4.9.1-6.el7
  • M
Directory Traversal

<0:4.9.8-105.el7rhgs
  • M
Directory Traversal

<0:4.9.1-6.el7
  • M
Directory Traversal

<0:4.9.1-6.el7
  • M
Directory Traversal

<0:4.9.1-6.el7
  • M
Use After Free

<0:4.11.6-107.el7rhgs
  • M
Directory Traversal

<0:4.10.4-10.el7
  • M
Directory Traversal

<0:4.11.6-104.el7rhgs
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.3-4.el7rhgs
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.6.2-8.el7
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.3-6.el7rhgs
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Man-in-the-Middle (MitM)

<0:4.6.2-11.el7_4
  • M
Out-of-bounds Read

<0:4.11.6-112.el7rhgs
  • M
Out-of-bounds Read

<0:4.9.1-11.el7_7
  • M
Out-of-bounds Read

<0:4.9.1-11.el7_7
  • M
Out-of-bounds Read

<0:4.9.1-11.el7_7
  • M
Out-of-bounds Read

<0:4.10.16-15.el7_9