sssd-client

Direct Vulnerabilities

Known vulnerabilities in the sssd-client package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Buffer Access with Incorrect Length Value

*
  • H
Improper Privilege Management

<0:1.16.5-10.el7_9.17
  • H
LDAP Injection

<0:1.16.5-10.el7_9.15
  • L
Information Exposure

<0:1.16.2-13.el7
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • H
OS Command Injection

<0:1.16.5-10.el7_9.10
  • M
Files or Directories Accessible to External Parties

<0:1.16.4-21.el7
  • M
Improper Privilege Management

<0:1.16.4-21.el7
  • M
Race Condition

*
  • H
LDAP Injection

<0:1.16.5-10.el7_9.15
  • H
OS Command Injection

<0:1.16.5-10.el7_9.10
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • M
Improper Input Validation

<0:1.15.2-50.el7_4.8
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Memory Leak

<0:1.13.0-40.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • L
Access Restriction Bypass

<0:1.12.2-58.el7
  • M
Improper Privilege Management

<0:1.16.4-21.el7
  • M
Improper Privilege Management

<0:1.16.4-21.el7
  • M
Improper Privilege Management

<0:1.16.4-21.el7
  • M
Improper Privilege Management

<0:1.16.4-21.el7
  • M
Improper Privilege Management

<0:1.16.4-21.el7
  • M
Files or Directories Accessible to External Parties

<0:1.16.4-21.el7
  • M
Files or Directories Accessible to External Parties

<0:1.16.4-21.el7
  • M
Files or Directories Accessible to External Parties

<0:1.16.4-21.el7
  • M
Files or Directories Accessible to External Parties

<0:1.16.4-21.el7
  • M
Files or Directories Accessible to External Parties

<0:1.16.4-21.el7
  • L
Information Exposure

<0:1.16.2-13.el7
  • L
Information Exposure

<0:1.16.2-13.el7
  • L
Information Exposure

<0:1.16.2-13.el7
  • L
Information Exposure

<0:1.16.2-13.el7
  • L
Information Exposure

<0:1.16.2-13.el7
  • L
Information Exposure

<0:1.16.2-13.el7
  • L
Information Exposure

<0:1.16.2-13.el7
  • L
Information Exposure

<0:1.16.2-13.el7
  • L
Information Exposure

<0:1.16.2-13.el7
  • L
Information Exposure

*