CVE-2018-14653

The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer overflow in the '__server_getspec' function via the 'gf_getspec_req' RPC message. A remote authenticated attacker could exploit this to cause a denial of service or other potential unspecified impact.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:49

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:3431 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:3431 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:3432 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:3432 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:3470 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:3470 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14653 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14653 - Issue Tracking, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201904-06 - Third Party Advisory () https://security.gentoo.org/glsa/201904-06 - Third Party Advisory

16 Dec 2021, 18:50

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - Mailing List, Third Party Advisory

17 Nov 2021, 22:16

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html -

10 Nov 2021, 01:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html', 'name': '[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update', 'tags': [], 'refsource': 'MLIST'}

02 Nov 2021, 03:15

Type Values Removed Values Added
CWE CWE-787 CWE-122
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html -

Information

Published : 2018-10-31 19:29

Updated : 2024-11-21 03:49


NVD link : CVE-2018-14653

Mitre link : CVE-2018-14653

CVE.ORG link : CVE-2018-14653


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_virtualization
  • gluster_storage

debian

  • debian_linux
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write