CVE-2018-10907

NameCVE-2018-10907
DescriptionIt was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1510-1, DLA-2806-1
Debian Bugs909215

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glusterfs (PTS)jessie, jessie (lts)3.5.2-2+deb8u5fixed
stretch (security), stretch (lts), stretch3.8.8-1+deb9u1fixed
buster5.5-3fixed
bullseye9.2-1fixed
bookworm10.3-5fixed
sid, trixie11.1-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glusterfssourcewheezy(unfixed)end-of-life
glusterfssourcejessie3.5.2-2+deb8u4DLA-1510-1
glusterfssourcestretch3.8.8-1+deb9u1DLA-2806-1
glusterfssource(unstable)4.1.4-1909215

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=1601642
https://github.com/gluster/glusterfs/commit/35f86ce46240c4f9c216bbc29164ce441cfca1e7

Search for package or bug name: Reporting problems