samba vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the samba package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2023-42669

<2:4.15.13+dfsg-0ubuntu0.20.04.6
  • M
Out-of-bounds Write

<2:4.15.13+dfsg-0ubuntu0.20.04.6
  • M
Incorrect Default Permissions

<2:4.15.13+dfsg-0ubuntu0.20.04.6
  • M
Information Exposure

<2:4.15.13+dfsg-0ubuntu0.20.04.3
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<2:4.15.13+dfsg-0ubuntu0.20.04.3
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<2:4.15.13+dfsg-0ubuntu0.20.04.3
  • M
Out-of-bounds Read

<2:4.15.13+dfsg-0ubuntu0.20.04.3
  • M
Access Restriction Bypass

*
  • M
Cleartext Storage of Sensitive Information

<2:4.15.13+dfsg-0ubuntu0.20.04.2
  • M
Cleartext Transmission of Sensitive Information

<2:4.15.13+dfsg-0ubuntu0.20.04.2
  • L
Missing Authorization

*
  • M
CVE-2022-37967

<2:4.15.13+dfsg-0ubuntu0.20.04.1
  • M
CVE-2022-37966

<2:4.15.13+dfsg-0ubuntu0.20.04.1
  • M
CVE-2022-38023

<2:4.15.13+dfsg-0ubuntu0.20.04.1
  • M
Inadequate Encryption Strength

<2:4.15.13+dfsg-0ubuntu0.20.04.1
  • M
Integer Overflow or Wraparound

<2:4.15.13+dfsg-0ubuntu0.20.04.1
  • L
Race Condition

*
  • M
Heap-based Buffer Overflow

<2:4.15.13+dfsg-0ubuntu0.20.04.1
  • L
Use of Insufficiently Random Values

*
  • L
Incorrect Default Permissions

*
  • M
Improper Authentication

<2:4.13.17~dfsg-0ubuntu1.20.04.1
  • M
Authentication Bypass

<2:4.13.17~dfsg-0ubuntu1.20.04.1
  • M
Use After Free

<2:4.13.17~dfsg-0ubuntu1.20.04.1
  • M
Out-of-bounds Read

<2:4.13.17~dfsg-0ubuntu1.20.04.1
  • L
CVE-2022-32742

<2:4.13.17~dfsg-0ubuntu1.20.04.1
  • L
CVE-2021-3670

<2:4.13.17~dfsg-0ubuntu1.20.04.1
  • M
Incorrect Default Permissions

<2:4.13.17~dfsg-0ubuntu0.21.04.1
  • H
Out-of-bounds Write

<2:4.13.17~dfsg-0ubuntu0.21.04.1
  • L
Race Condition

<2:4.13.17~dfsg-0ubuntu0.21.04.1
  • M
Incorrect Authorization

<2:4.13.14+dfsg-0ubuntu0.20.04.1
  • M
Race Condition

<2:4.13.14+dfsg-0ubuntu0.20.04.1
  • M
Improper Input Validation

<2:4.13.14+dfsg-0ubuntu0.20.04.1
  • M
Use After Free

<2:4.13.14+dfsg-0ubuntu0.20.04.1
  • M
Improper Authentication

<2:4.13.14+dfsg-0ubuntu0.20.04.1
  • M
Missing Authorization

<2:4.13.14+dfsg-0ubuntu0.20.04.1
  • M
Improper Input Validation

<2:4.13.14+dfsg-0ubuntu0.20.04.1
  • M
CVE-2021-23192

<2:4.13.14+dfsg-0ubuntu0.20.04.1
  • L
NULL Pointer Dereference

<2:4.13.14+dfsg-0ubuntu0.20.04.1
  • M
Out-of-bounds Read

<2:4.11.6+dfsg-0ubuntu1.8
  • M
Incorrect Privilege Assignment

<2:4.11.6+dfsg-0ubuntu1.6
  • M
CVE-2020-14383

<2:4.11.6+dfsg-0ubuntu1.6
  • M
NULL Pointer Dereference

<2:4.11.6+dfsg-0ubuntu1.6
  • M
Improper Input Validation

<2:4.11.6+dfsg-0ubuntu1.4
  • M
NULL Pointer Dereference

<2:4.11.6+dfsg-0ubuntu1.3
  • M
Resource Exhaustion

<2:4.11.6+dfsg-0ubuntu1.3
  • M
Use After Free

<2:4.11.6+dfsg-0ubuntu1.3
  • M
Buffer Overflow

<2:4.11.6+dfsg-0ubuntu1.1
  • M
Use After Free

<2:4.11.6+dfsg-0ubuntu1.1
  • L
CVE-2019-14902

<2:4.11.5+dfsg-1ubuntu1
  • L
Out-of-bounds Read

<2:4.11.5+dfsg-1ubuntu1
  • M
Improperly Implemented Security Check for Standard

<2:4.10.0+dfsg-0ubuntu2.1