Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-10923

Опубликовано: 04 сент. 2018
Источник: debian
EPSS Низкий

Описание

It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
glusterfsfixed4.1.4-1package

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1610659

  • https://github.com/gluster/glusterfs/commit/4bafcc97e812acc854dfc436ade35df0308d5a3e

EPSS

Процентиль: 79%
0.0127
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 7 лет назад

It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.

CVSS3: 7.6
redhat
больше 7 лет назад

It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.

CVSS3: 8.1
nvd
больше 7 лет назад

It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.

CVSS3: 8.1
github
почти 4 года назад

It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.

suse-cvrf
около 6 лет назад

Security update for glusterfs

EPSS

Процентиль: 79%
0.0127
Низкий