samba-vfs-iouring vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the samba-vfs-iouring package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Information Exposure

<0:4.17.5-5.el8_8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.17.5-5.el8_8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.17.5-5.el8_8
  • M
Out-of-bounds Read

<0:4.17.5-5.el8_8
  • M
Information Exposure

<0:4.17.5-5.el8_8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.17.5-5.el8_8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.17.5-5.el8_8
  • M
Out-of-bounds Read

<0:4.17.5-5.el8_8
  • M
Information Exposure

<0:4.17.5-5.el8_8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.17.5-5.el8_8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.17.5-5.el8_8
  • M
Out-of-bounds Read

<0:4.17.5-5.el8_8
  • M
Information Exposure

<0:4.17.5-5.el8_8
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.17.5-5.el8_8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.17.5-5.el8_8
  • M
Out-of-bounds Read

<0:4.17.5-5.el8_8
  • M
Information Exposure

<0:4.15.5-15.el8_6
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.15.5-15.el8_6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.15.5-15.el8_6
  • M
Out-of-bounds Read

<0:4.15.5-15.el8_6
  • M
Unchecked Return Value

<0:4.15.5-15.el8_6
  • M
Information Exposure

<0:4.15.5-15.el8_6
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.15.5-15.el8_6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.15.5-15.el8_6
  • M
Out-of-bounds Read

<0:4.15.5-15.el8_6
  • M
Unchecked Return Value

<0:4.15.5-15.el8_6
  • M
Information Exposure

<0:4.15.5-15.el8_6
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.15.5-15.el8_6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.15.5-15.el8_6
  • M
Out-of-bounds Read

<0:4.15.5-15.el8_6
  • M
Unchecked Return Value

<0:4.15.5-15.el8_6
  • M
Information Exposure

<0:4.15.5-15.el8_6
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.15.5-15.el8_6
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.15.5-15.el8_6
  • M
Out-of-bounds Read

<0:4.15.5-15.el8_6
  • M
Unchecked Return Value

<0:4.15.5-15.el8_6
  • M
Resource Exhaustion

<0:4.17.5-4.el8_8
  • M
Incorrect Default Permissions

<0:4.17.5-4.el8_8
  • M
Directory Traversal

<0:4.17.5-4.el8_8
  • M
Resource Exhaustion

<0:4.17.5-4.el8_8
  • M
Incorrect Default Permissions

<0:4.17.5-4.el8_8
  • M
Directory Traversal

<0:4.17.5-4.el8_8
  • M
Resource Exhaustion

<0:4.17.5-4.el8_8
  • M
Incorrect Default Permissions

<0:4.17.5-4.el8_8
  • M
Directory Traversal

<0:4.17.5-4.el8_8
  • M
Resource Exhaustion

<0:4.17.5-4.el8_8
  • M
Incorrect Default Permissions

<0:4.17.5-4.el8_8
  • M
Directory Traversal

<0:4.17.5-4.el8_8
  • M
Resource Exhaustion

<0:4.15.5-13.el8_6
  • M
Incorrect Default Permissions

<0:4.15.5-13.el8_6
  • M
Directory Traversal

<0:4.15.5-13.el8_6
  • M
Resource Exhaustion

<0:4.15.5-13.el8_6
  • M
Incorrect Default Permissions

<0:4.15.5-13.el8_6
  • M
Directory Traversal

<0:4.15.5-13.el8_6
  • M
Resource Exhaustion

<0:4.15.5-13.el8_6
  • M
Incorrect Default Permissions

<0:4.15.5-13.el8_6
  • M
Directory Traversal

<0:4.15.5-13.el8_6
  • M
Resource Exhaustion

<0:4.15.5-13.el8_6
  • M
Incorrect Default Permissions

<0:4.15.5-13.el8_6
  • M
Directory Traversal

<0:4.15.5-13.el8_6
  • M
Resource Exhaustion

<0:4.18.6-2.el8_9
  • M
Directory Traversal

<0:4.18.6-2.el8_9
  • M
Incorrect Default Permissions

<0:4.18.6-2.el8_9
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:4.18.6-1.el8
  • M
Information Exposure

<0:4.18.6-1.el8
  • M
Improper Verification of Cryptographic Signature

<0:4.17.5-3.el8_8
  • M
Improper Verification of Cryptographic Signature

<0:4.17.5-3.el8_8
  • M
Improper Verification of Cryptographic Signature

<0:4.17.5-3.el8_8
  • M
Improper Verification of Cryptographic Signature

<0:4.17.5-3.el8_8
  • M
Improper Verification of Cryptographic Signature

<0:4.17.5-3.el8_8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.6-1.el8
  • M
Out-of-bounds Read

<0:4.18.6-1.el8
  • L
Race Condition

*
  • H
Reversible One-Way Hash

<0:4.15.5-12.el8_6
  • H
Reversible One-Way Hash

<0:4.15.5-12.el8_6
  • H
Reversible One-Way Hash

<0:4.16.4-4.el8_7
  • H
Reversible One-Way Hash

<0:4.16.4-4.el8_7
  • H
Reversible One-Way Hash

<0:4.15.5-12.el8_6
  • H
Reversible One-Way Hash

<0:4.16.4-4.el8_7
  • H
Reversible One-Way Hash

<0:4.16.4-4.el8_7
  • H
Reversible One-Way Hash

<0:4.15.5-12.el8_6
  • H
Reversible One-Way Hash

<0:4.16.4-4.el8_7
  • L
Unchecked Return Value

<0:4.17.5-2.el8
  • L
Unchecked Return Value

<0:4.17.5-2.el8
  • L
Unchecked Return Value

<0:4.17.5-2.el8
  • L
Unchecked Return Value

<0:4.17.5-2.el8
  • L
Unchecked Return Value

<0:4.17.5-2.el8
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Information Exposure

<0:4.15.5-10.el8_6
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • M
Link Following

<0:4.15.5-5.el8
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • C
Out-of-bounds Write

<0:4.14.5-9.el8_5
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • L
Race Condition

<0:4.14.5-2.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • M
Race Condition

<0:4.15.5-5.el8
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
CVE-2021-23192

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Input Validation

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5
  • H
Improper Authentication

<0:4.14.5-7.el8_5