The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer overflow in the '_servergetspec' function via the 'gfgetspecreq' RPC message. A remote authenticated attacker could exploit this to cause a denial of service or other potential unspecified impact.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "3.4.2-1ubuntu1+esm1",
"binary_name": "glusterfs-client"
},
{
"binary_version": "3.4.2-1ubuntu1+esm1",
"binary_name": "glusterfs-common"
},
{
"binary_version": "3.4.2-1ubuntu1+esm1",
"binary_name": "glusterfs-server"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "3.7.6-1ubuntu1+esm1",
"binary_name": "glusterfs-client"
},
{
"binary_version": "3.7.6-1ubuntu1+esm1",
"binary_name": "glusterfs-common"
},
{
"binary_version": "3.7.6-1ubuntu1+esm1",
"binary_name": "glusterfs-server"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "3.13.2-1ubuntu1+esm1",
"binary_name": "glusterfs-client"
},
{
"binary_version": "3.13.2-1ubuntu1+esm1",
"binary_name": "glusterfs-common"
},
{
"binary_version": "3.13.2-1ubuntu1+esm1",
"binary_name": "glusterfs-server"
}
]
}