It was found that the fix for CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete. A remote, authenticated attacker could use one of these flaws to execute arbitrary code, create arbitrary files, or cause denial of service on glusterfs server nodes via symlinks to relative paths.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Debian_linux | Debian | 8.0 (including) | 8.0 (including) |
Native Client for RHEL 6 for Red Hat Storage | RedHat | glusterfs-0:3.12.2-25.el6 | * |
Native Client for RHEL 7 for Red Hat Storage | RedHat | glusterfs-0:3.12.2-25.el7 | * |
Red Hat Gluster Storage 3.4 for RHEL 6 | RedHat | glusterfs-0:3.12.2-25.el6rhs | * |
Red Hat Gluster Storage 3.4 for RHEL 6 | RedHat | redhat-storage-server-0:3.4.1.0-1.el6rhs | * |
Red Hat Gluster Storage 3.4 for RHEL 7 | RedHat | glusterfs-0:3.12.2-25.el7rhgs | * |
Red Hat Gluster Storage 3.4 for RHEL 7 | RedHat | redhat-storage-server-0:3.4.1.0-1.el7rhgs | * |
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 | RedHat | glusterfs-0:3.12.2-25.el7 | * |
Glusterfs | Ubuntu | bionic | * |
Glusterfs | Ubuntu | cosmic | * |
Glusterfs | Ubuntu | esm-apps/bionic | * |
Glusterfs | Ubuntu | esm-apps/xenial | * |
Glusterfs | Ubuntu | trusty | * |
Glusterfs | Ubuntu | trusty/esm | * |
Glusterfs | Ubuntu | xenial | * |