Total vulnerabilities in the database
It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.
Software | From | Fixed in |
---|---|---|
gluster / glusterfs | 3.12.0 | 3.12.14 |
gluster / glusterfs | 4.1.0 | 4.1.8 |
redhat / enterprise_linux_server | 7.0 | 7.0.x |
debian / debian_linux | 8.0 | 8.0.x |
redhat / enterprise_linux_server | 6.0 | 6.0.x |
debian / debian_linux | 9.0 | 9.0.x |
redhat / virtualization_host | 4.0 | 4.0.x |
opensuse / leap | 15.1 | 15.1.x |