CVE-2018-10907

NameCVE-2018-10907
DescriptionIt was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1510-1
NVD severitymedium
Debian Bugs909215

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glusterfs (PTS)stretch3.8.8-1vulnerable
buster5.5-3fixed
bullseye, sid9.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glusterfssourcejessie3.5.2-2+deb8u4DLA-1510-1
glusterfssource(unstable)4.1.4-1909215

Notes

[stretch] - glusterfs <no-dsa> (Minor issue; can be fixed via point release)
https://bugzilla.redhat.com/show_bug.cgi?id=1601642
https://github.com/gluster/glusterfs/commit/35f86ce46240c4f9c216bbc29164ce441cfca1e7

Search for package or bug name: Reporting problems