It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
{
"versions": [
{
"introduced": "3.12.0"
},
{
"fixed": "3.12.14"
},
{
"introduced": "4.1.0"
},
{
"fixed": "4.1.4"
},
{
"introduced": "0"
},
{
"last_affected": "4.0"
},
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"introduced": "0"
},
{
"last_affected": "7.0"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}