A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10928 | Issue Tracking Patch Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2608 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2607 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3470 | Third Party Advisory |
https://security.gentoo.org/glsa/201904-06 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2018-09-04 08:29
Updated : 2022-04-12 11:33
NVD link : CVE-2018-10928
Mitre link : CVE-2018-10928
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
gluster
- glusterfs
redhat
- enterprise_linux
- gluster_storage
- virtualization_host
- enterprise_linux_server
opensuse
- leap
debian
- debian_linux