USN-4770-1

Source
https://ubuntu.com/security/notices/USN-4770-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4770-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4770-1
Related
Published
2021-03-15T20:13:19.248522Z
Modified
2021-03-15T20:13:19.248522Z
Summary
glusterfs vulnerabilities
Details

It was discovered that GlusterFS incorrectly handled network requests. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 ESM. (CVE-2014-3619)

It was discovered that GlusterFS incorrectly handled user permissions. An authenticated attacker could possibly use this to add himself to a trusted storage pool and perform privileged operations on volumes. This issue only affected Ubuntu 16.04 ESM and Ubuntu 18.04 ESM. (CVE-2018-10841)

It was discovered that GlusterFS incorrectly handled mounting gluster volumes. An attacker could possibly use this issue to also mount shared gluster volumes and escalate privileges through malicious cronjobs. This issue only affected Ubuntu 16.04 ESM and Ubuntu 18.04 ESM. (CVE-2018-1088)

It was discovered that GlusterFS incorrectly handled file paths. An attacker could possibly use this issue to create arbitrary files and execute arbitrary code. (CVE-2018-10904)

It was discovered that GlusterFS incorrectly handled mounting volumes. An attacker could possibly use this issue to cause a denial of service or run arbitrary code. (CVE-2018-10907)

It was discovered that GlusterFS incorrectly handled negative key length values. An attacker could possibly use this issue to obtain sensitive information. (CVE-2018-10911)

It was discovered that GlusterFS incorrectly handled FUSE requests. An attacker could use this issue to obtain sensitive information. (CVE-2018-10913, CVE-2018-10914)

It was discovered that GlusterFS incorrectly handled the file creation process. An authenticated attacker could possibly use this issue to create arbitrary files and obtain sensitive information. (CVE-2018-10923)

It was discovered that GlusterFS incorrectly handled certain inputs. An authenticated attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 ESM. (CVE-2018-10924)

It was discovered that GlusterFS incorrectly handled RPC requests. An attacker could possibly use this issue to write files to an arbitrary location and execute arbitrary code. (CVE-2018-10926, CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930)

It was discovered that the fix for CVE-2018-10926, CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930 was incomplete. A remote authenticated attacker could possibly use this issue to execute arbitrary code or cause a denial of service. (CVE-2018-14651)

It was discovered that GlusterFS incorrectly handled certain files. A remote authenticated attacker could possibly use this issue to cause a denial of service. (CVE-2018-14652)

It was discovered that GlusterFS incorrectly handled RPC requests. A remote authenticated attacker could possibly use this issue to cause a denial of service or other unspecified impact. (CVE-2018-14653)

It was discovered that GlusterFS incorrectly handled mount volumes operation. A remote attacker could possibly use this issue to create arbitrary files. This issue only affected Ubuntu 18.04 ESM. (CVE-2018-14654)

It was discovered that GlusterFS incorrectly handled certain files. A remote authenticated attacker could possibly use this issue to create arbitrary files. (CVE-2018-14659)

It was discovered that GlusterFS incorrectly handled certain inputs. A remote authenticated attacker could possibly use this is issue to cause a denial of service. This issue only affected Ubuntu 18.04 ESM. (CVE-2018-14660)

It was discovered that GlusterFS incorrectly handled strings. A remote authenticated attacker could possibly use this issue to cause a denial of service. (CVE-2018-14661)

References

Affected packages

Ubuntu:Pro:14.04:LTS / glusterfs

Package

Name
glusterfs
Purl
pkg:deb/ubuntu/glusterfs?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.2-1ubuntu1+esm1

Affected versions

3.*

3.2.7-3ubuntu2
3.4.1-1ubuntu1
3.4.1-2ubuntu1
3.4.2-1ubuntu1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "3.4.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-client"
        },
        {
            "binary_version": "3.4.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-client-dbgsym"
        },
        {
            "binary_version": "3.4.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-common"
        },
        {
            "binary_version": "3.4.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-common-dbgsym"
        },
        {
            "binary_version": "3.4.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-dbg"
        },
        {
            "binary_version": "3.4.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-server"
        },
        {
            "binary_version": "3.4.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-server-dbgsym"
        }
    ]
}

Ubuntu:Pro:16.04:LTS / glusterfs

Package

Name
glusterfs
Purl
pkg:deb/ubuntu/glusterfs?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7.6-1ubuntu1+esm1

Affected versions

3.*

3.7.3-1ubuntu1
3.7.3-1ubuntu2
3.7.6-1ubuntu1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "3.7.6-1ubuntu1+esm1",
            "binary_name": "glusterfs-client"
        },
        {
            "binary_version": "3.7.6-1ubuntu1+esm1",
            "binary_name": "glusterfs-client-dbgsym"
        },
        {
            "binary_version": "3.7.6-1ubuntu1+esm1",
            "binary_name": "glusterfs-common"
        },
        {
            "binary_version": "3.7.6-1ubuntu1+esm1",
            "binary_name": "glusterfs-common-dbgsym"
        },
        {
            "binary_version": "3.7.6-1ubuntu1+esm1",
            "binary_name": "glusterfs-dbg"
        },
        {
            "binary_version": "3.7.6-1ubuntu1+esm1",
            "binary_name": "glusterfs-server"
        },
        {
            "binary_version": "3.7.6-1ubuntu1+esm1",
            "binary_name": "glusterfs-server-dbgsym"
        }
    ]
}

Ubuntu:Pro:18.04:LTS / glusterfs

Package

Name
glusterfs
Purl
pkg:deb/ubuntu/glusterfs?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.13.2-1ubuntu1+esm1

Affected versions

3.*

3.11.2-1
3.12.1-1
3.12.2-1
3.12.2-2
3.12.3-1
3.13.0-1
3.13.2-1
3.13.2-1build1
3.13.2-1ubuntu1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "3.13.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-client"
        },
        {
            "binary_version": "3.13.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-client-dbgsym"
        },
        {
            "binary_version": "3.13.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-common"
        },
        {
            "binary_version": "3.13.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-common-dbgsym"
        },
        {
            "binary_version": "3.13.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-server"
        },
        {
            "binary_version": "3.13.2-1ubuntu1+esm1",
            "binary_name": "glusterfs-server-dbgsym"
        }
    ]
}