First published: Mon Aug 06 2018(Updated: )
A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Gluster GlusterFS | >=3.12<3.12.14 | |
Gluster GlusterFS | >=4.1<4.1.8 | |
Redhat Virtualization Host | =4.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw is CVE-2018-10927.
The severity of CVE-2018-10927 is high with a CVSS score of 8.1.
This vulnerability affects the glusterfs server and can be exploited by an authenticated attacker to leak information and execute remote denial of service by crashing the gluster brick process.
The software versions affected by this vulnerability are glusterfs versions up to exclusive 3.12.14 and 4.1.4, Redhat Enterprise Linux Server versions 6.0 and 7.0, Debian Debian Linux versions 8.0 and 9.0, Redhat Virtualization Host version 4.0, and openSUSE Leap version 15.1.
Yes, there are remedies available to fix this vulnerability, which can be found in the references provided.