Bug 1611785 (CVE-2018-10924) - CVE-2018-10924 glusterfs: Denial-of-service via fsync(2) in Gluster FUSE client
Summary: CVE-2018-10924 glusterfs: Denial-of-service via fsync(2) in Gluster FUSE client
Alias: CVE-2018-10924
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1625078 1625081
Blocks: 1611787
TreeView+ depends on / blocked
Reported: 2018-08-02 17:58 UTC by Laura Pardo
Modified: 2021-02-16 23:49 UTC (History)
30 users (show)

Fixed In Version: glusterfs-3.12.14, glusterfs-4.1.4
Doc Type: If docs needed, set a value
Doc Text:
It was discovered that fsync(2) system call in glusterfs client code leaks memory. An authenticated attacker could use this flaw to launch a denial of service attack by making gluster clients consume memory of the host machine.
Clone Of:
Last Closed: 2018-09-04 09:07:08 UTC

Attachments (Terms of Use)

Description Laura Pardo 2018-08-02 17:58:52 UTC
A flaw was found in Gluster 3.12.11 and 3.12.12 FUSE client. The fsync(2) system call appears to directly or indirectly leak memory in "gf_common_mt_memdup" and "gf_common_mt_char" functions. An attacker could exploit this vulnerablity to perform a Denial of Service attack.

Comment 1 Laura Pardo 2018-08-02 17:59:04 UTC

Name: Michael Hanselmann (hansmi.ch)

Comment 2 Doran Moppert 2018-08-16 02:06:21 UTC
This memory leak does not appear to be reproducible on glusterfs-3.8.x.  The FUSE interface changed significantly between 3.8 and 3.12.

Comment 4 Siddharth Sharma 2018-09-04 05:43:53 UTC
Created glusterfs tracking bugs for this issue:

Affects: fedora-all [bug 1625078]

Comment 6 Siddharth Sharma 2018-09-04 09:07:08 UTC
upstream fix:


Comment 7 Siddharth Sharma 2018-09-04 13:34:57 UTC

This issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6 and 7, and Red Hat Gluster Storage 3.

Note You need to log in before you can comment on or make changes to this bug.