A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:2607 | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10927 | patch third party advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html | third party advisory mailing list |
https://access.redhat.com/errata/RHSA-2018:2608 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2018:3470 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201904-06 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html | vendor advisory mailing list third party advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html | third party advisory mailing list |