The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable to a denial of service attack via use of the 'GFXATTRIOSTATSDUMPKEY' xattr. A remote, authenticated attacker could exploit this by mounting a Gluster volume and repeatedly calling 'setxattr(2)' to trigger a state dump and create an arbitrary number of files in the server's runtime directory.
{
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:redhat:gluster_file_system:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "3.0.0"
},
{
"last_affected": "3.1.2"
},
{
"introduced": "4.1.0"
},
{
"last_affected": "4.1.4"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
},
{
"last_affected": "9.0"
},
{
"last_affected": "6.0"
},
{
"last_affected": "7.0"
},
{
"last_affected": "4.0"
}
]
}