It was found that the fix for CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete. A remote, authenticated attacker could use one of these flaws to execute arbitrary code, create arbitrary files, or cause denial of service on glusterfs server nodes via symlinks to relative paths.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2018:3431 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3432 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14651 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html | Third Party Advisory |
https://security.gentoo.org/glsa/201904-06 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2018-10-31 22:29
Updated : 2023-02-12 23:32
NVD link : CVE-2018-14651
Mitre link : CVE-2018-14651
CVE.ORG link : CVE-2018-14651
JSON object : View
Products Affected
debian
- debian_linux
gluster
- glusterfs
redhat
- enterprise_linux
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')