Note:
This project will be discontinued after December 13, 2021. [more]
2018-09-04
It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
Products | Debian_linux, Glusterfs, Leap, Enterprise_linux_server, Virtualization_host |
Type | Untrusted Search Path (CWE-426) |
First patch | - None (likely due to unavailable code) |
Patches | https://review.gluster.org/#/c/glusterfs/+/21072/ |
Links |
• https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html
• https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10904 • https://security.gentoo.org/glsa/201904-06 • https://access.redhat.com/errata/RHSA-2018:2608 • https://access.redhat.com/errata/RHSA-2018:3470 |