First published: Wed Aug 01 2018(Updated: )
It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/glusterfs | <3.12.14 | 3.12.14 |
redhat/glusterfs | <4.1.4 | 4.1.4 |
Gluster GlusterFS | >=3.12.0<3.12.14 | |
Gluster GlusterFS | >=4.1.0<4.1.8 | |
Redhat Virtualization Host | =4.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10923 is a vulnerability that allows an authenticated attacker to create arbitrary devices and read data from any device attached to the glusterfs server node.
Users of GlusterFS versions 3.12.0 to 3.12.14 and 4.1.0 to 4.1.8, Red Hat Virtualization Host 4.0, Debian Debian Linux 8.0 and 9.0, Red Hat Enterprise Linux Server 6.0 and 7.0, and openSUSE Leap 15.1 are affected by CVE-2018-10923.
CVE-2018-10923 has a severity rating of 8.1 (high).
An attacker can exploit CVE-2018-10923 by using the 'mknod' call derived from mknod(2) to create files pointing to devices on a glusterfs server node.
To fix CVE-2018-10923, users should update their GlusterFS installation to versions 3.12.14 or 4.1.4, as recommended by Red Hat. For other affected software, users should follow the remediation steps provided by the respective vendors.