First published: Tue Aug 07 2018(Updated: )
A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Virtualization Host | =4.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Gluster GlusterFS | >=3.12<3.12.14 | |
Gluster GlusterFS | >=4.1<4.1.8 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10926 is a vulnerability in the glusterfs server that allows an authenticated attacker to write files to an arbitrary location and execute arbitrary code.
GlusterFS versions up to 3.12.14 and 4.1.4 are affected by CVE-2018-10926. Redhat Enterprise Linux 6.0, 7.0, and 7.0 servers, and Redhat Virtualization Host 4.0 are also affected.
CVE-2018-10926 has a severity score of 8.8, which is considered high.
The Common Weakness Enumeration (CWE) IDs for CVE-2018-10926 are CWE-22 and CWE-20.
To fix CVE-2018-10926, it is recommended to update GlusterFS to version 3.12.14 or 4.1.4, or apply the appropriate patches provided by Redhat. Additionally, ensure that the system is running the latest security updates.