ceph-fuse vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ceph-fuse package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Insufficient Verification of Data Authenticity

*
  • M
Cross-site Scripting (XSS)

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Inefficient Regular Expression Complexity

*
  • M
NULL Pointer Dereference

<1:10.2.3-13.el7cp
  • M
Improper Input Validation

<1:10.2.3-17.el7cp
  • M
Cross-site Scripting (XSS)

<2:12.2.8-128.el7cp
  • H
Directory Traversal

*
  • H
Directory Traversal

*
  • M
Information Exposure

<2:10.2.10-49.el7cp
  • M
Information Exposure

<2:12.2.8-128.el7cp
  • M
Out-of-Bounds

*
  • M
Out-of-Bounds

*
  • H
Cleartext Storage of Sensitive Information

<2:14.2.11-95.el7cp
  • H
Improper Input Validation

<2:12.2.12-139.el7cp
  • H
Improper Input Validation

<2:14.2.11-147.el7cp
  • M
Covert Timing Channel

<2:14.2.22-110.el7cp
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • M
Improper Handling of URL Encoding (Hex Encoding)

*
  • H
Placement of User into Incorrect Group

*
  • H
Placement of User into Incorrect Group

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Incorrect Authorization

*
  • M
Resource Exhaustion

*
  • L
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • M
Directory Traversal

*
  • M
Improper Authentication

<2:14.2.22-110.el7cp
  • M
Improper Authentication

*
  • M
Improper Authentication

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Cross-site Scripting (XSS)

<2:14.2.11-181.el7cp
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

<2:14.2.22-110.el7cp
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
Improper Preservation of Permissions

*
  • H
Improper Authentication

<2:14.2.11-181.el7cp
  • H
Improper Authentication

*
  • H
Improper Authentication

*
  • H
Improper Authentication

<2:12.2.12-141.el7cp
  • H
Insufficiently Protected Credentials

<2:14.2.11-181.el7cp
  • M
Insufficiently Protected Credentials

*
  • M
Insufficiently Protected Credentials

*
  • H
Insufficiently Protected Credentials

<2:12.2.12-139.el7cp
  • H
Insufficiently Protected Credentials

*
  • H
Insufficiently Protected Credentials

<2:14.2.11-95.el7cp
  • H
Insufficiently Protected Credentials

*
  • M
Authentication Bypass

*
  • H
Authentication Bypass

<2:14.2.11-95.el7cp
  • M
Reusing a Nonce

<2:14.2.8-111.el7cp
  • M
Cleartext Storage of Sensitive Information

*
  • H
Cleartext Storage of Sensitive Information

<2:14.2.11-147.el7cp
  • M
Cleartext Storage of Sensitive Information

*
  • M
Cross-site Scripting (XSS)

<2:14.2.8-81.el7cp
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Resource Exhaustion

*
  • H
Improper Input Validation

<2:12.2.12-139.el7cp
  • M
HTTP Response Splitting

<2:14.2.8-81.el7cp
  • M
HTTP Response Splitting

<2:12.2.12-124.el7cp
  • M
HTTP Response Splitting

*
  • M
Improper Input Validation

<2:12.2.12-84.el7cp
  • M
Improper Input Validation

*
  • H
Improper Handling of Exceptional Conditions

<2:12.2.12-48.el7cp
  • H
NULL Pointer Dereference

<2:12.2.1-46.el7cp
  • M
Improper Input Validation

<2:12.2.12-45.el7cp
  • M
Allocation of Resources Without Limits or Throttling

<2:12.2.12-45.el7cp
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Cross-site Scripting (XSS)

*
  • M
Improper Authorization

<2:12.2.4-30.el7cp
  • M
Improper Authorization

<2:10.2.10-28.el7cp
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

<1:10.2.7-27.el7cp
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • H
Server-Side Request Forgery (SSRF)

<2:12.2.12-139.el7cp
  • M
Memory Leak

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Access Control

<2:12.2.4-30.el7cp
  • M
Improper Access Control

<2:10.2.10-28.el7cp
  • M
Authentication Bypass

*
  • M
Authentication Bypass

<2:12.2.4-30.el7cp
  • M
Authentication Bypass

<2:10.2.10-28.el7cp
  • L
Improper Preservation of Permissions

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Authorization

<2:12.2.12-45.el7cp
  • L
Improper Authorization

*