Gluster

Glusterfs

23 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.75%
  • Veröffentlicht 04.09.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:18

It was discovered that fsync(2) system call in glusterfs client code leaks memory. An authenticated attacker could use this flaw to launch a denial of service attack by making gluster clients consume memory of the host machine.

  • EPSS 0.91%
  • Veröffentlicht 04.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:18

It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs s...

  • EPSS 3.87%
  • Veröffentlicht 04.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:17

It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks an...

  • EPSS 0.94%
  • Veröffentlicht 04.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:17

An information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.

  • EPSS 4.26%
  • Veröffentlicht 04.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:17

A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.

  • EPSS 2.11%
  • Veröffentlicht 04.09.2018 13:29:11
  • Zuletzt bearbeitet 21.11.2024 03:42:16

It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume...

  • EPSS 1.26%
  • Veröffentlicht 04.09.2018 13:29:09
  • Zuletzt bearbeitet 21.11.2024 03:42:16

It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exp...

  • EPSS 0.31%
  • Veröffentlicht 20.06.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:42:07

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like ad...

  • EPSS 3.25%
  • Veröffentlicht 25.04.2018 12:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:12

glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using 'auth.allow' option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CV...

  • EPSS 0.06%
  • Veröffentlicht 26.10.2017 17:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service.