CVE-2018-14651

It was found that the fix for CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete. A remote, authenticated attacker could use one of these flaws to execute arbitrary code, create arbitrary files, or cause denial of service on glusterfs server nodes via symlinks to relative paths.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*
cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:49

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:3431 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3431 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3432 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3432 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14651 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14651 - Issue Tracking, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html - Third Party Advisory
References () https://security.gentoo.org/glsa/201904-06 - () https://security.gentoo.org/glsa/201904-06 -

Information

Published : 2018-10-31 22:29

Updated : 2024-11-21 03:49


NVD link : CVE-2018-14651

Mitre link : CVE-2018-14651

CVE.ORG link : CVE-2018-14651


JSON object : View

Products Affected

gluster

  • glusterfs

debian

  • debian_linux

redhat

  • enterprise_linux
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')