ceph vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ceph package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Insufficient Granularity of Access Control

<12.2.11+dfsg1-2.1+deb10u1
  • M
Improper Authentication

<12.2.11+dfsg1-2.1+deb10u1
  • M
Improper Input Validation

<12.2.11+dfsg1-2.1+deb10u1
  • M
Improper Input Validation

<12.2.11+dfsg1-2.1+deb10u1
  • H
Improper Authentication

<12.2.11+dfsg1-2.1+deb10u1
  • H
Insufficiently Protected Credentials

<12.2.11+dfsg1-2.1+deb10u1
  • M
Cleartext Storage of Sensitive Information

<12.2.11+dfsg1-2.1+deb10u1
  • M
HTTP Response Splitting

<12.2.11+dfsg1-2.1+deb10u1
  • H
NULL Pointer Dereference

<12.2.11+dfsg1-2.1+deb10u1
  • M
Cross-site Scripting (XSS)

<12.2.11+dfsg1-2.1+deb10u1
  • M
Resource Exhaustion

<12.2.11+dfsg1-2.1+deb10u1
  • H
Improper Handling of Exceptional Conditions

<12.2.11+dfsg1-2.1+deb10u1
  • L
Information Exposure

<12.2.11+dfsg1-1
  • M
Incorrect Permission Assignment for Critical Resource

<12.2.11+dfsg1-1
  • M
Allocation of Resources Without Limits or Throttling

<12.2.11+dfsg1-1
  • H
Improper Authentication

<12.2.8+dfsg1-1
  • H
Improper Authentication

<12.2.8+dfsg1-1
  • M
Improper Authentication

<12.2.8+dfsg1-1
  • H
Improper Input Validation

<10.2.5-2
  • M
Improper Input Validation

<10.2.5-1
  • M
Use of Externally-Controlled Format String

<12.2.8+dfsg1-1
  • H
Information Exposure

<10.2.5-1
  • M
Improper Input Validation

<10.2.5-1
  • M
CVE-2015-5245

<0.80.10-1