CVE-2018-10904
04.09.2018, 13:29
It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.Enginsight
Vendor | Product | Version |
---|---|---|
gluster | glusterfs | 3.12.0 ≤ 𝑥 < 3.12.14 |
gluster | glusterfs | 4.1.0 ≤ 𝑥 < 4.1.8 |
redhat | virtualization_host | 4.0 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server | 7.0 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
opensuse | leap | 15.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
glusterfs |
|
Common Weakness Enumeration
References