It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
| Software | From | Fixed in |
|---|---|---|
| gluster / glusterfs | 3.12.0 | 3.12.14 |
| gluster / glusterfs | 4.1.0 | 4.1.4 |
| redhat / enterprise_linux_server | 7.0 | 7.0.x |
| redhat / enterprise_linux_server | 6.0 | 6.0.x |
| redhat / virtualization_host | 4.0 | 4.0.x |
| debian / debian_linux | 8.0 | 8.0.x |
| debian / debian_linux | 9.0 | 9.0.x |
| opensuse / leap | 15.1 | 15.1.x |