libglusterfs.so is vulnerable to a symlink attack. The library allows the use of the /
character in basenames, allowing a malicious user to conduct a symlink attack to execute arbitrary code, create arbitrary files or crash the application. The vulnerability is due to an incomplete fix of CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926.
CPE | Name | Operator | Version |
---|---|---|---|
libglusterfs.so | eq | 0.0.1 | |
libglusterfs.so | eq | 0.0.1 |
access.redhat.com/errata/RHSA-2018:3431
access.redhat.com/errata/RHSA-2018:3432
access.redhat.com/security/cve/CVE-2018-14651
bugzilla.redhat.com/show_bug.cgi?id=1632557
bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14651
lists.debian.org/debian-lts-announce/2018/11/msg00003.html
review.gluster.org/#/c/glusterfs/+/21527/
security.gentoo.org/glsa/201904-06