First published: Mon Jul 23 2018(Updated: )
It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gluster GlusterFS | >=3.12.0<3.12.14 | |
Gluster GlusterFS | >=4.1.0<4.1.8 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-10914.
The severity level of CVE-2018-10914 is medium.
An attacker can exploit CVE-2018-10914 by issuing a malicious xattr request via glusterfs FUSE, causing the gluster brick process to crash and resulting in a remote denial of service.
The affected versions include glusterfs 3.12.0 to 3.12.14, glusterfs 4.1.0 to 4.1.4, Gluster GlusterFS 3.12.0 to 3.12.14, Gluster GlusterFS 4.1.0 to 4.1.8, Redhat Virtualization Host 4.0, Redhat Enterprise Linux Server 6.0 and 7.0, Debian Debian Linux 8.0 and 9.0, and openSUSE Leap 15.1.
To fix CVE-2018-10914, update your glusterfs software to version 3.12.15 or 4.1.5, or apply the recommended patches provided by the vendor.