It was found that the fix for CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete. A remote, authenticated attacker could use one of these flaws to execute arbitrary code, create arbitrary files, or cause denial of service on glusterfs server nodes via symlinks to relative paths.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14651 | Issue Tracking Patch Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3432 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3431 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html | Third Party Advisory |
https://security.gentoo.org/glsa/201904-06 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-10-31 15:29
Updated : 2023-02-12 15:32
NVD link : CVE-2018-14651
Mitre link : CVE-2018-14651
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
debian
- debian_linux
gluster
- glusterfs
redhat
- enterprise_linux