CVE-2018-14652

The Gluster file system through versions 3.12 and 4.1.4 is vulnerable to a buffer overflow in the 'features/index' translator via the code handling the 'GF_XATTR_CLRLK_CMD' xattr in the 'pl_getxattr' function. A remote authenticated attacker could exploit this on a mounted volume to cause a denial of service.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:enterprise_virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:49

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:3431 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:3431 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:3432 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:3432 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:3470 - Third Party Advisory, Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:3470 - Third Party Advisory, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14652 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14652 - Issue Tracking, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201904-06 - Third Party Advisory () https://security.gentoo.org/glsa/201904-06 - Third Party Advisory

Information

Published : 2018-10-31 19:29

Updated : 2024-11-21 03:49


NVD link : CVE-2018-14652

Mitre link : CVE-2018-14652

CVE.ORG link : CVE-2018-14652


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_virtualization_host
  • gluster_storage
  • enterprise_linux_virtualization

debian

  • debian_linux
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer