Max CVSS 7.5 Min CVSS 4.0 Total Count2
IDCVSSSummaryLast (major) updatePublished
CVE-2018-10923 5.5
It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs s
15-10-2020 - 13:28 04-09-2018 - 14:29
CVE-2018-10927 5.5
A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.
15-10-2020 - 13:28 04-09-2018 - 15:29
CVE-2018-10930 4.0
A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.
15-10-2020 - 13:28 04-09-2018 - 16:29
CVE-2018-10904 6.5
It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exp
15-10-2020 - 13:28 04-09-2018 - 13:29
CVE-2018-10914 4.0
It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks an
15-10-2020 - 13:28 04-09-2018 - 14:29
CVE-2018-10926 6.5
A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.
15-10-2020 - 13:28 04-09-2018 - 15:29
CVE-2018-10913 4.0
An information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.
15-10-2020 - 13:28 04-09-2018 - 14:29
CVE-2018-10907 6.5
It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume
15-10-2020 - 13:28 04-09-2018 - 13:29
CVE-2018-10929 6.5
A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.
15-10-2020 - 13:28 04-09-2018 - 16:29
CVE-2018-10928 6.5
A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing any
15-10-2020 - 13:28 04-09-2018 - 15:29
CVE-2018-10911 5.0
A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.
15-10-2020 - 13:28 04-09-2018 - 14:29
CVE-2018-1112 7.5
glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using 'auth.allow' option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CV
09-10-2019 - 23:38 25-04-2018 - 12:29
CVE-2018-1088 6.8
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
03-10-2019 - 00:03 18-04-2018 - 16:29
CVE-2018-10924 6.8
It was discovered that fsync(2) system call in glusterfs client code leaks memory. An authenticated attacker could use this flaw to launch a denial of service attack by making gluster clients consume memory of the host machine.
03-10-2019 - 00:03 04-09-2018 - 15:29
Back to Top Mark selected
Back to Top