Vulnerabilities > Redhat > Gluster Storage > 3.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-10-31 | CVE-2018-14654 | Path Traversal vulnerability in multiple products The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. | 6.5 |
2018-10-31 | CVE-2018-14653 | Heap-based Buffer Overflow vulnerability in multiple products The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer overflow in the '__server_getspec' function via the 'gf_getspec_req' RPC message. | 8.8 |
2018-10-31 | CVE-2018-14652 | Classic Buffer Overflow vulnerability in multiple products The Gluster file system through versions 3.12 and 4.1.4 is vulnerable to a buffer overflow in the 'features/index' translator via the code handling the 'GF_XATTR_CLRLK_CMD' xattr in the 'pl_getxattr' function. | 6.5 |
2018-09-11 | CVE-2018-1127 | Session Fixation vulnerability in Redhat Gluster Storage Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. | 6.8 |
2018-04-18 | CVE-2018-1088 | Incorrect Privilege Assignment vulnerability in multiple products A privilege escalation flaw was found in gluster 3.x snapshot scheduler. | 8.1 |
2015-11-25 | CVE-2015-5242 | Code Injection vulnerability in Redhat Gluster Storage 3.1 OpenStack Swift-on-File (aka Swiftonfile) does not properly restrict use of the pickle Python module when loading metadata, which allows remote authenticated users to execute arbitrary code via a crafted extended attribute (xattrs). | 6.0 |