It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using ‘alloca(3)’. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | glusterfs | < 4.1.4-1 | glusterfs_4.1.4-1_all.deb |
Debian | 11 | all | glusterfs | < 4.1.4-1 | glusterfs_4.1.4-1_all.deb |
Debian | 10 | all | glusterfs | < 4.1.4-1 | glusterfs_4.1.4-1_all.deb |
Debian | 999 | all | glusterfs | < 4.1.4-1 | glusterfs_4.1.4-1_all.deb |
Debian | 13 | all | glusterfs | < 4.1.4-1 | glusterfs_4.1.4-1_all.deb |