CVE-2018-14651

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-14651
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-14651.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-14651
Related
Published
2018-10-31T22:29:00Z
Modified
2024-09-18T02:56:33.224408Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

It was found that the fix for CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete. A remote, authenticated attacker could use one of these flaws to execute arbitrary code, create arbitrary files, or cause denial of service on glusterfs server nodes via symlinks to relative paths.

References

Affected packages

Debian:11 / glusterfs

Package

Name
glusterfs
Purl
pkg:deb/debian/glusterfs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / glusterfs

Package

Name
glusterfs
Purl
pkg:deb/debian/glusterfs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / glusterfs

Package

Name
glusterfs
Purl
pkg:deb/debian/glusterfs?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/gluster/glusterfs

Affected ranges

Type
GIT
Repo
https://github.com/gluster/glusterfs
Events

Affected versions

v4.*

v4.1.0
v4.1.1
v4.1.2
v4.1.3
v4.1.4