krb5-server-ldap vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the krb5-server-ldap package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Authentication Bypass

<0:1.18.2-30.el8_10
  • H
Authentication Bypass

<0:1.18.2-26.el8_8.3
  • H
Authentication Bypass

<0:1.18.2-26.el8_8.3
  • H
Authentication Bypass

<0:1.18.2-26.el8_8.3
  • H
Authentication Bypass

<0:1.18.2-16.el8_6.2
  • H
Authentication Bypass

<0:1.18.2-26.el8_8.3
  • H
Authentication Bypass

<0:1.18.2-16.el8_6.2
  • H
Authentication Bypass

<0:1.18.2-16.el8_6.2
  • H
Authentication Bypass

<0:1.18.2-9.el8_4.2
  • H
Authentication Bypass

<0:1.18.2-9.el8_4.2
  • H
Authentication Bypass

<0:1.18.2-9.el8_4.2
  • H
Authentication Bypass

<0:1.17-19.el8_2.2
  • M
CVE-2024-37371

<0:1.17-19.el8_2.1
  • M
CVE-2024-37370

<0:1.17-19.el8_2.1
  • M
CVE-2024-37371

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37370

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37371

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37370

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37371

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37370

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37371

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37370

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37371

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37370

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37371

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37370

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37371

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37370

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37371

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37370

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37371

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37370

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37371

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37370

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37371

<0:1.18.2-29.el8_10
  • M
CVE-2024-37370

<0:1.18.2-29.el8_10
  • L
Memory Leak

<0:1.18.2-27.el8_10
  • L
Memory Leak

<0:1.18.2-27.el8_10
  • M
Cross-site Request Forgery (CSRF)

<0:1.18.2-16.el8_6
  • M
Insufficient Verification of Data Authenticity

<0:1.18.2-16.el8_6
  • M
Cross-site Request Forgery (CSRF)

<0:1.18.2-16.el8_6
  • M
Insufficient Verification of Data Authenticity

<0:1.18.2-16.el8_6
  • M
Cross-site Request Forgery (CSRF)

<0:1.18.2-16.el8_6
  • M
Insufficient Verification of Data Authenticity

<0:1.18.2-16.el8_6
  • M
Cross-site Request Forgery (CSRF)

<0:1.18.2-16.el8_6
  • M
Insufficient Verification of Data Authenticity

<0:1.18.2-16.el8_6
  • M
Cross-site Request Forgery (CSRF)

*
  • H
Integer Overflow or Wraparound

<0:1.18.2-9.el8_4
  • H
Integer Overflow or Wraparound

<0:1.18.2-9.el8_4
  • H
Integer Overflow or Wraparound

<0:1.18.2-15.el8_6
  • H
Integer Overflow or Wraparound

<0:1.18.2-15.el8_6
  • H
Integer Overflow or Wraparound

<0:1.18.2-22.el8_7
  • H
Integer Overflow or Wraparound

<0:1.18.2-15.el8_6
  • H
Integer Overflow or Wraparound

<0:1.17-10.el8_1
  • H
Integer Overflow or Wraparound

<0:1.18.2-9.el8_4
  • H
Integer Overflow or Wraparound

<0:1.17-19.el8_2
  • H
Integer Overflow or Wraparound

<0:1.18.2-22.el8_7
  • H
Integer Overflow or Wraparound

<0:1.18.2-22.el8_7
  • H
Integer Overflow or Wraparound

<0:1.17-19.el8_2
  • H
Integer Overflow or Wraparound

<0:1.18.2-15.el8_6
  • H
Integer Overflow or Wraparound

<0:1.17-19.el8_2
  • H
Integer Overflow or Wraparound

<0:1.18.2-22.el8_7
  • H
Integer Overflow or Wraparound

<0:1.18.2-22.el8_7
  • H
Integer Overflow or Wraparound

<0:1.18.2-9.el8_4
  • M
Insufficient Verification of Data Authenticity

*
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4