First published: Thu Sep 04 2014(Updated: )
IssueDescription: A denial of service flaw was found in the way the __socket_proto_state_machine() function of glusterfs processed certain fragment headers. A remote attacker could send a specially crafted fragment header that, when processed, would cause the glusterfs process to enter an infinite loop.
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS GlusterFS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1138145 is considered high due to its potential for denial of service.
To fix REDHAT-BUG-1138145, update to the latest version of glusterfs as per the available patches.
The symptoms of REDHAT-BUG-1138145 include the glusterfs process entering an infinite loop, leading to service disruption.
Users of glusterfs are affected by REDHAT-BUG-1138145, particularly those exposed to untrusted or remote connections.
Currently, there is no official workaround for REDHAT-BUG-1138145 aside from applying the necessary updates.