CVE-2018-14654

NameCVE-2018-14654
DescriptionThe Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2806-1
Debian Bugs912997

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glusterfs (PTS)jessie, jessie (lts)3.5.2-2+deb8u5fixed
stretch (security), stretch (lts), stretch3.8.8-1+deb9u1fixed
buster5.5-3fixed
bullseye9.2-1fixed
bookworm10.3-5fixed
sid, trixie11.1-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glusterfssourcewheezy(unfixed)end-of-life
glusterfssourcejessie(not affected)
glusterfssourcestretch3.8.8-1+deb9u1DLA-2806-1
glusterfssource(unstable)5.1-1912997

Notes

[jessie] - glusterfs <not-affected> (vulnerable code not present)
https://www.openwall.com/lists/oss-security/2018/10/31/5
https://bugzilla.redhat.com/show_bug.cgi?id=1631576
https://review.gluster.org/#/c/glusterfs/+/21534/
http://git.gluster.org/cgit/glusterfs.git/commit/?id=5f4ae8a80543332a2e92dfa5c7f833ae7b93a664 (release-4.1)
http://git.gluster.org/cgit/glusterfs.git/commit/?id=dc775c4ae052d1e9d0f61ace3be999f73f0ffa23 (release-5)

Search for package or bug name: Reporting problems