krb5-pkinit vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the krb5-pkinit package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Authentication Bypass

<0:1.21.1-4.el9_5
  • H
Authentication Bypass

<0:1.21.1-2.el9_4.1
  • H
Authentication Bypass

<0:1.19.1-16.el9_0.2
  • H
Authentication Bypass

<0:1.20.1-9.el9_2.2
  • H
Authentication Bypass

<0:1.20.1-9.el9_2.2
  • H
Authentication Bypass

<0:1.20.1-9.el9_2.2
  • M
CVE-2024-37371

<0:1.21.1-2.el9_4
  • M
CVE-2024-37370

<0:1.21.1-2.el9_4
  • M
Double Free

<0:1.21.1-1.el9
  • M
Access of Uninitialized Pointer

<0:1.21.1-1.el9
  • M
Insufficient Verification of Data Authenticity

<0:1.20.1-8.el9
  • H
Integer Overflow or Wraparound

<0:1.19.1-24.el9_1
  • M
CVE-2024-37371

<0:1.20.1-9.el9_2.1
  • M
CVE-2024-37370

<0:1.20.1-9.el9_2.1
  • M
CVE-2024-37371

<0:1.20.1-9.el9_2.1
  • M
CVE-2024-37370

<0:1.20.1-9.el9_2.1
  • M
CVE-2024-37371

<0:1.20.1-9.el9_2.1
  • M
CVE-2024-37370

<0:1.20.1-9.el9_2.1
  • M
CVE-2024-37371

<0:1.19.1-16.el9_0.1
  • M
CVE-2024-37370

<0:1.19.1-16.el9_0.1
  • M
CVE-2024-37371

<0:1.21.1-2.el9_4
  • M
CVE-2024-37370

<0:1.21.1-2.el9_4
  • M
Memory Leak

<0:1.21.1-3.el9
  • M
Memory Leak

<0:1.21.1-3.el9
  • M
Memory Leak

<0:1.21.1-3.el9
  • M
Double Free

<0:1.21.1-1.el9
  • M
Access of Uninitialized Pointer

<0:1.21.1-1.el9
  • H
Integer Overflow or Wraparound

<0:1.19.1-24.el9_1
  • H
Integer Overflow or Wraparound

<0:1.19.1-24.el9_1
  • H
Integer Overflow or Wraparound

<0:1.19.1-16.el9_0
  • H
Integer Overflow or Wraparound

<0:1.19.1-24.el9_1
  • H
Integer Overflow or Wraparound

<0:1.19.1-24.el9_1
  • H
Integer Overflow or Wraparound

<0:1.19.1-16.el9_0
  • M
Insufficient Verification of Data Authenticity

<0:1.20.1-8.el9
  • M
Insufficient Verification of Data Authenticity

<0:1.20.1-8.el9
  • M
Insufficient Verification of Data Authenticity

<0:1.20.1-8.el9
  • M
Insufficient Verification of Data Authenticity

<0:1.20.1-8.el9