CVE-2018-14660

A flaw was found in glusterfs server through versions 4.1.4 and 3.1.2 which allowed repeated usage of GF_META_LOCK_KEY xattr. A remote, authenticated attacker could use this flaw to create multiple locks for single inode by using setxattr repetitively resulting in memory exhaustion of glusterfs server node.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*
cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:49

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:3431 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:3431 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:3432 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:3432 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2018:3470 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2018:3470 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14660 - Issue Tracking, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201904-06 - Third Party Advisory () https://security.gentoo.org/glsa/201904-06 - Third Party Advisory

30 Nov 2021, 22:00

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/201904-06 - (GENTOO) https://security.gentoo.org/glsa/201904-06 - Third Party Advisory

17 Nov 2021, 22:16

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html -

10 Nov 2021, 01:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html', 'name': '[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update', 'tags': [], 'refsource': 'MLIST'}

02 Nov 2021, 03:15

Type Values Removed Values Added
CWE CWE-770 CWE-400
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html -

Information

Published : 2018-11-01 14:29

Updated : 2024-11-21 03:49


NVD link : CVE-2018-14660

Mitre link : CVE-2018-14660

CVE.ORG link : CVE-2018-14660


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux
  • virtualization
  • virtualization_host

debian

  • debian_linux

gluster

  • glusterfs
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-770

Allocation of Resources Without Limits or Throttling