krb5-workstation vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the krb5-workstation package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Reversible One-Way Hash

<0:1.18.2-26.el8_8.5
  • M
Reversible One-Way Hash

<0:1.18.2-16.el8_6.4
  • M
Reversible One-Way Hash

<0:1.18.2-26.el8_8.5
  • M
Reversible One-Way Hash

<0:1.18.2-16.el8_6.4
  • M
Reversible One-Way Hash

<0:1.18.2-16.el8_6.4
  • M
Reversible One-Way Hash

<0:1.18.2-9.el8_4.3
  • M
Reversible One-Way Hash

<0:1.17-19.el8_2.3
  • M
Reversible One-Way Hash

<0:1.18.2-32.el8_10
  • M
Out-of-bounds Write

<0:1.18.2-31.el8_10
  • H
Authentication Bypass

<0:1.18.2-30.el8_10
  • H
Authentication Bypass

<0:1.18.2-26.el8_8.3
  • H
Authentication Bypass

<0:1.18.2-26.el8_8.3
  • H
Authentication Bypass

<0:1.18.2-26.el8_8.3
  • H
Authentication Bypass

<0:1.18.2-16.el8_6.2
  • H
Authentication Bypass

<0:1.18.2-26.el8_8.3
  • H
Authentication Bypass

<0:1.18.2-16.el8_6.2
  • H
Authentication Bypass

<0:1.18.2-16.el8_6.2
  • H
Authentication Bypass

<0:1.18.2-9.el8_4.2
  • H
Authentication Bypass

<0:1.18.2-9.el8_4.2
  • H
Authentication Bypass

<0:1.18.2-9.el8_4.2
  • H
Authentication Bypass

<0:1.17-19.el8_2.2
  • M
CVE-2024-37371

<0:1.17-19.el8_2.1
  • M
CVE-2024-37370

<0:1.17-19.el8_2.1
  • M
CVE-2024-37371

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37370

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37371

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37370

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37371

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37370

<0:1.18.2-16.el8_6.1
  • M
CVE-2024-37371

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37370

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37371

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37370

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37371

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37370

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37371

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37370

<0:1.18.2-26.el8_8.2
  • M
CVE-2024-37371

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37370

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37371

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37370

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37371

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37370

<0:1.18.2-9.el8_4.1
  • M
CVE-2024-37371

<0:1.18.2-29.el8_10
  • M
CVE-2024-37370

<0:1.18.2-29.el8_10
  • L
Memory Leak

<0:1.18.2-27.el8_10
  • L
Memory Leak

<0:1.18.2-27.el8_10
  • M
Cross-site Request Forgery (CSRF)

<0:1.18.2-16.el8_6
  • M
Insufficient Verification of Data Authenticity

<0:1.18.2-16.el8_6
  • M
Cross-site Request Forgery (CSRF)

<0:1.18.2-16.el8_6
  • M
Insufficient Verification of Data Authenticity

<0:1.18.2-16.el8_6
  • M
Cross-site Request Forgery (CSRF)

<0:1.18.2-16.el8_6
  • M
Insufficient Verification of Data Authenticity

<0:1.18.2-16.el8_6
  • M
Cross-site Request Forgery (CSRF)

<0:1.18.2-16.el8_6
  • M
Insufficient Verification of Data Authenticity

<0:1.18.2-16.el8_6
  • H
Integer Overflow or Wraparound

<0:1.17-19.el8_2
  • H
Integer Overflow or Wraparound

<0:1.18.2-22.el8_7
  • H
Integer Overflow or Wraparound

<0:1.18.2-15.el8_6
  • H
Integer Overflow or Wraparound

<0:1.18.2-22.el8_7
  • H
Integer Overflow or Wraparound

<0:1.17-19.el8_2
  • H
Integer Overflow or Wraparound

<0:1.18.2-9.el8_4
  • H
Integer Overflow or Wraparound

<0:1.18.2-22.el8_7
  • H
Integer Overflow or Wraparound

<0:1.18.2-9.el8_4
  • H
Integer Overflow or Wraparound

<0:1.18.2-15.el8_6
  • H
Integer Overflow or Wraparound

<0:1.18.2-15.el8_6
  • H
Integer Overflow or Wraparound

<0:1.17-10.el8_1
  • H
Integer Overflow or Wraparound

<0:1.18.2-9.el8_4
  • H
Integer Overflow or Wraparound

<0:1.17-19.el8_2
  • H
Integer Overflow or Wraparound

<0:1.18.2-9.el8_4
  • H
Integer Overflow or Wraparound

<0:1.18.2-22.el8_7
  • H
Integer Overflow or Wraparound

<0:1.18.2-22.el8_7
  • H
Integer Overflow or Wraparound

<0:1.18.2-15.el8_6
  • M
Insufficient Verification of Data Authenticity

*
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
Uncontrolled Recursion

<0:1.18.2-8.el8
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4
  • M
NULL Pointer Dereference

<0:1.18.2-8.3.el8_4