It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.
{
"versions": [
{
"introduced": "3.12.0"
},
{
"fixed": "3.12.14"
},
{
"introduced": "4.1.0"
},
{
"fixed": "4.1.8"
},
{
"introduced": "0"
},
{
"last_affected": "4.0"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
},
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
}