CVE-2018-10911 — Integer Overflow or Wraparound in Glusterfs
Severity
7.5HIGHNVD
EPSS
4.3%
top 11.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 4
Latest updateApr 30
Description
A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages8 packages
Also affects: Debian Linux 8.0, 9.0
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-x86v-j2gh-g3w6: A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values↗2022-04-30
OSV▶
CVE-2018-10911: A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values↗2018-09-04
CVEList▶
CVE-2018-10911: A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values↗2018-09-04
📋Vendor Advisories
3💬Community
4Bugzilla▶
CVE-2018-10911 glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory↗2018-09-05
Bugzilla▶
CVE-2018-10911 glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory [fedora-all]↗2018-09-04
Bugzilla▶
CVE-2018-10911 glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory↗2018-09-04
Bugzilla▶
CVE-2018-10911 glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory↗2018-07-17