It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
{
"binaries": [
{
"binary_name": "glusterfs-client",
"binary_version": "3.4.2-1ubuntu1+esm1"
},
{
"binary_name": "glusterfs-common",
"binary_version": "3.4.2-1ubuntu1+esm1"
},
{
"binary_name": "glusterfs-server",
"binary_version": "3.4.2-1ubuntu1+esm1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_name": "glusterfs-client",
"binary_version": "3.7.6-1ubuntu1+esm1"
},
{
"binary_name": "glusterfs-common",
"binary_version": "3.7.6-1ubuntu1+esm1"
},
{
"binary_name": "glusterfs-server",
"binary_version": "3.7.6-1ubuntu1+esm1"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
{
"binaries": [
{
"binary_name": "glusterfs-client",
"binary_version": "3.13.2-1ubuntu1+esm1"
},
{
"binary_name": "glusterfs-common",
"binary_version": "3.13.2-1ubuntu1+esm1"
},
{
"binary_name": "glusterfs-server",
"binary_version": "3.13.2-1ubuntu1+esm1"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}