First published: Mon Oct 08 2018(Updated: )
It was found that usage of snprintf function in feature/locks translator of glusterfs server 3.8.4, as shipped with Red Hat Gluster Storage, was vulnerable to a format string attack. A remote, authenticated attacker could use this flaw to cause remote denial of service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gluster GlusterFS | =3.8.4 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Virtualization | =4.0 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14661 is a vulnerability found in the glusterfs server 3.8.4, as shipped with Red Hat Gluster Storage, which allows a remote authenticated attacker to cause remote denial of service.
CVE-2018-14661 has a severity score of 6.5 out of 10.
The affected software includes glusterfs server 3.8.4, Debian Linux 8.0 and 9.0, Red Hat Virtualization 4.0 and Red Hat Virtualization Host 4.0.
To fix CVE-2018-14661, it is recommended to update to a patched version of glusterfs server and follow the instructions provided by the vendor.
You can find more information about CVE-2018-14661 on the Red Hat Bugzilla and Red Hat Security Advisories websites.