Debian Security Advisory
DLA-1565-1 glusterfs -- LTS security update
- Date Reported:
- 05 Nov 2018
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2018-14651, CVE-2018-14652, CVE-2018-14653, CVE-2018-14659, CVE-2018-14661.
- More information:
Multiple security vulnerabilities were discovered in GlusterFS, a clustered file system. Buffer overflows and path traversal issues may lead to information disclosure, denial-of-service or the execution of arbitrary code.
It was found that the fix for CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete. A remote, authenticated attacker could use one of these flaws to execute arbitrary code, create arbitrary files, or cause denial of service on glusterfs server nodes via symlinks to relative paths.
The Gluster file system is vulnerable to a buffer overflow in the 'features/index' translator via the code handling the
GF_XATTR_CLRLK_CMDxattr in the
pl_getxattrfunction. A remote authenticated attacker could exploit this on a mounted volume to cause a denial of service.
The Gluster file system is vulnerable to a heap-based buffer overflow in the
__server_getspecfunction via the
gf_getspec_reqRPC message. A remote authenticated attacker could exploit this to cause a denial of service or other potential unspecified impact.
The Gluster file system is vulnerable to a denial of service attack via use of the
GF_XATTR_IOSTATS_DUMP_KEYxattr. A remote, authenticated attacker could exploit this by mounting a Gluster volume and repeatedly calling 'setxattr(2)' to trigger a state dump and create an arbitrary number of files in the server's runtime directory.
It was found that usage of snprintf function in feature/locks translator of glusterfs server was vulnerable to a format string attack. A remote, authenticated attacker could use this flaw to cause remote denial of service.
For Debian 8
Jessie, these problems have been fixed in version 3.5.2-2+deb8u5.
We recommend that you upgrade your glusterfs packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS