pg_repack vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the pg_repack package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Exposure of Sensitive Information Through Metadata

<0:1.4.8-2.module+el9.5.0+22224+f5585c78
  • H
Buffer Over-read

<0:1.4.8-2.module+el9.5.0+22224+f5585c78
  • H
CRLF Injection

<0:1.4.8-2.module+el9.5.0+22224+f5585c78
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:1.4.8-2.module+el9.5.0+22224+f5585c78
  • H
Improper Neutralization

<0:1.5.1-1.module+el9.5.0+22557+8cb08ba5
  • H
External Control of System or Configuration Setting

<0:1.5.1-1.module+el9.5.0+22557+8cb08ba5
  • H
Incorrect Privilege Assignment

<0:1.5.1-1.module+el9.5.0+22557+8cb08ba5
  • H
Improper Preservation of Consistency Between Independent Representations of Shared State

<0:1.5.1-1.module+el9.5.0+22557+8cb08ba5
  • H
Time-of-check Time-of-use (TOCTOU)

<0:1.4.8-1.module+el9.2.0+17405+aeb9ec60
  • H
Missing Authorization

<0:1.4.8-1.module+el9.2.0+17405+aeb9ec60
  • H
Privilege Dropping / Lowering Errors

<0:1.4.8-1.module+el9.2.0+17405+aeb9ec60
  • H
Resource Exhaustion

<0:1.4.8-1.module+el9.2.0+17405+aeb9ec60
  • H
Integer Overflow or Wraparound

<0:1.4.8-1.module+el9.2.0+17405+aeb9ec60
  • H
Function Call With Incorrect Argument Type

<0:1.4.8-1.module+el9.2.0+17405+aeb9ec60
  • H
Insufficient Granularity of Access Control

<0:1.4.8-1.module+el9.2.0+17405+aeb9ec60
  • H
SQL Injection

<0:1.4.8-1.module+el9.2.0+17405+aeb9ec60
  • M
Improper Input Validation

<0:1.4.8-1.module+el9.2.0+17405+aeb9ec60
  • M
Improper Input Validation

<0:1.4.8-1.module+el9.2.0+17405+aeb9ec60