glusterfs-cli vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the glusterfs-cli package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • M
Access Restriction Bypass

<0:3.7.1-16.el7
  • M
Improper Access Control

<0:3.7.1-16.el7
  • M
Use After Free

*
  • M
Use After Free

*
  • H
Incorrect Privilege Assignment

<0:3.8.4-54.6.el7
  • L
Out-of-Bounds

<0:6.0-21.el7rhgs
  • M
Insecure Temporary File

<0:3.8.4-18.el7
  • H
Allocation of Resources Without Limits or Throttling

<0:3.12.2-25.el7
  • H
Improper Input Validation

<0:3.12.2-25.el7
  • H
Resource Exhaustion

<0:3.12.2-25.el7
  • H
Directory Traversal

<0:3.12.2-25.el7
  • H
Heap-based Buffer Overflow

<0:3.12.2-25.el7
  • H
Buffer Overflow

<0:3.12.2-25.el7
  • H
Link Following

<0:3.12.2-25.el7
  • H
Improper Authentication

<0:3.8.4-54.8.el7rhgs
  • H
Improper Input Validation

<0:3.12.2-18.el7
  • H
Improper Input Validation

<0:3.12.2-18.el7
  • H
Improper Input Validation

<0:3.12.2-18.el7
  • H
Link Following

<0:3.12.2-18.el7
  • H
Improper Input Validation

<0:3.12.2-18.el7
  • H
Improper Input Validation

<0:3.12.2-18.el7
  • H
Information Exposure

<0:3.12.2-18.el7
  • H
NULL Pointer Dereference

<0:3.12.2-18.el7
  • H
Stack-based Buffer Overflow

<0:3.12.2-18.el7
  • H
Untrusted Search Path

<0:3.12.2-18.el7
  • H
Improper Authentication

<0:3.8.4-54.10.el7
  • M
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • M
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • M
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • H
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • M
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • M
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • M
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • M
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • M
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • M
Deserialization of Untrusted Data

<0:3.12.2-18.el7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*