samba-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the samba-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

*
  • M
Information Exposure

<0:4.17.5-5.el8_8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.17.5-5.el8_8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.17.5-5.el8_8
  • M
Out-of-bounds Read

<0:4.17.5-5.el8_8
  • M
Information Exposure

<0:4.17.5-5.el8_8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.17.5-5.el8_8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.17.5-5.el8_8
  • M
Out-of-bounds Read

<0:4.17.5-5.el8_8
  • M
Information Exposure

<0:4.17.5-5.el8_8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.17.5-5.el8_8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.17.5-5.el8_8
  • M
Out-of-bounds Read

<0:4.17.5-5.el8_8
  • M
Information Exposure

<0:4.17.5-5.el8_8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.17.5-5.el8_8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.17.5-5.el8_8
  • M
Out-of-bounds Read

<0:4.17.5-5.el8_8
  • M
Information Exposure

<0:4.15.5-15.el8_6
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.15.5-15.el8_6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.15.5-15.el8_6
  • M
Out-of-bounds Read

<0:4.15.5-15.el8_6
  • M
Unchecked Return Value

<0:4.15.5-15.el8_6
  • M
Information Exposure

<0:4.15.5-15.el8_6
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.15.5-15.el8_6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.15.5-15.el8_6
  • M
Out-of-bounds Read

<0:4.15.5-15.el8_6
  • M
Unchecked Return Value

<0:4.15.5-15.el8_6
  • M
Information Exposure

<0:4.15.5-15.el8_6
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.15.5-15.el8_6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.15.5-15.el8_6
  • M
Out-of-bounds Read

<0:4.15.5-15.el8_6
  • M
Unchecked Return Value

<0:4.15.5-15.el8_6
  • M
Information Exposure

<0:4.15.5-15.el8_6
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.15.5-15.el8_6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.15.5-15.el8_6
  • M
Out-of-bounds Read

<0:4.15.5-15.el8_6
  • M
Unchecked Return Value

<0:4.15.5-15.el8_6
  • M
Resource Exhaustion

<0:4.17.5-4.el8_8
  • M
Incorrect Default Permissions

<0:4.17.5-4.el8_8
  • M
Directory Traversal

<0:4.17.5-4.el8_8
  • M
Resource Exhaustion

<0:4.17.5-4.el8_8
  • M
Incorrect Default Permissions

<0:4.17.5-4.el8_8
  • M
Directory Traversal

<0:4.17.5-4.el8_8
  • M
Resource Exhaustion

<0:4.17.5-4.el8_8
  • M
Incorrect Default Permissions

<0:4.17.5-4.el8_8
  • M
Directory Traversal

<0:4.17.5-4.el8_8
  • M
Resource Exhaustion

<0:4.17.5-4.el8_8
  • M
Incorrect Default Permissions

<0:4.17.5-4.el8_8
  • M
Directory Traversal

<0:4.17.5-4.el8_8
  • M
Resource Exhaustion

<0:4.15.5-13.el8_6
  • M
Incorrect Default Permissions

<0:4.15.5-13.el8_6
  • M
Directory Traversal

<0:4.15.5-13.el8_6
  • M
Resource Exhaustion

<0:4.15.5-13.el8_6
  • M
Incorrect Default Permissions

<0:4.15.5-13.el8_6
  • M
Directory Traversal

<0:4.15.5-13.el8_6
  • M
Resource Exhaustion

<0:4.15.5-13.el8_6
  • M
Incorrect Default Permissions

<0:4.15.5-13.el8_6
  • M
Directory Traversal

<0:4.15.5-13.el8_6
  • M
Resource Exhaustion

<0:4.15.5-13.el8_6
  • M
Incorrect Default Permissions

<0:4.15.5-13.el8_6
  • M
Directory Traversal

<0:4.15.5-13.el8_6
  • L
Heap-based Buffer Overflow

*
  • M
Resource Exhaustion

*
  • M
Resource Exhaustion

<0:4.18.6-2.el8_9
  • M
Directory Traversal

*
  • M
Directory Traversal

<0:4.18.6-2.el8_9
  • M
Incorrect Default Permissions

<0:4.18.6-2.el8_9
  • M
Incorrect Default Permissions

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.6-1.el8
  • M
Information Exposure

*
  • M
Information Exposure

<0:4.18.6-1.el8
  • M
Improper Verification of Cryptographic Signature

<0:4.17.5-3.el8_8
  • M
Improper Verification of Cryptographic Signature

*
  • M
Improper Verification of Cryptographic Signature

<0:4.17.5-3.el8_8
  • M
Improper Verification of Cryptographic Signature

<0:4.17.5-3.el8_8
  • M
Improper Verification of Cryptographic Signature

<0:4.17.5-3.el8_8
  • M
Improper Verification of Cryptographic Signature

<0:4.17.5-3.el8_8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.6-1.el8
  • M
Out-of-bounds Read

<0:4.18.6-1.el8
  • M
Out-of-bounds Read

*
  • L
Race Condition

*
  • L
Race Condition

*
  • H
Reversible One-Way Hash

<0:4.13.3-11.el8_4
  • H
Reversible One-Way Hash

<0:4.13.3-11.el8_4
  • H
Reversible One-Way Hash

<0:4.16.4-4.el8_7
  • H
Reversible One-Way Hash

<0:4.15.5-12.el8_6
  • H
Reversible One-Way Hash

<0:4.13.3-11.el8_4
  • H
Reversible One-Way Hash

<0:4.13.3-11.el8_4
  • H
Reversible One-Way Hash

<0:4.16.4-4.el8_7
  • H
Reversible One-Way Hash

<0:4.16.4-4.el8_7
  • H
Reversible One-Way Hash

<0:4.16.4-4.el8_7
  • H
Reversible One-Way Hash

<0:4.15.5-12.el8_6
  • H
Reversible One-Way Hash

<0:4.16.4-4.el8_7
  • H
Reversible One-Way Hash

<0:4.15.5-12.el8_6
  • H
Reversible One-Way Hash

<0:4.15.5-12.el8_6
  • M
Symlink Following

*
  • L
Unchecked Return Value

*
  • L
Unchecked Return Value

<0:4.17.5-2.el8
  • L
Unchecked Return Value

<0:4.17.5-2.el8
  • L
Unchecked Return Value

<0:4.17.5-2.el8
  • L
Unchecked Return Value

<0:4.17.5-2.el8
  • L
Unchecked Return Value

<0:4.17.5-2.el8
  • M
Incorrect Default Permissions

*
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.16.5-100.el8rhgs
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-100.el8rhgs
  • M
Link Following

<0:4.15.5-5.el8
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.13.3-9.el8_4
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.13.3-9.el8_4
  • C
Out-of-bounds Write

<0:4.13.3-9.el8_4
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-206.el8rhgs
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.13.3-9.el8_4
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

*
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-100.el8rhgs
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • H
CVE-2021-23192

<0:4.13.3-8.el8_4
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.13.3-8.el8_4
  • H
CVE-2021-23192

<0:4.13.3-8.el8_4
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.13.3-8.el8_4
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-204.el8rhgs
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-204.el8rhgs
  • H
Improper Input Validation

<0:4.13.3-8.el8_4
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.13.3-8.el8_4
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.13.3-8.el8_4
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.13.3-8.el8_4
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.13.3-8.el8_4
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-204.el8rhgs
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.13.3-8.el8_4
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.13.3-8.el8_4
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.13.3-8.el8_4
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • M
Out-of-bounds Read

*
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.7-101.el8rhgs
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Authentication

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.7-101.el8rhgs
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Improper Null Termination

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.3-3.el8
  • M
Incorrect Privilege Assignment

<0:4.13.7-101.el8rhgs
  • M
Use After Free

<0:4.11.6-107.el8rhgs
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.14.5-201.el8rhgs
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4
  • M
Out-of-bounds Read

<0:4.13.3-5.el8_4