Upstream information
Description
It was discovered that fsync(2) system call in glusterfs client code leaks memory. An authenticated attacker could use this flaw to launch a denial of service attack by making gluster clients consume memory of the host machine.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 6.8 |
Vector | AV:N/AC:L/Au:S/C:N/I:N/A:C |
Access Vector | Network |
Access Complexity | Low |
Authentication | Single |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
National Vulnerability Database | SUSE | |
---|---|---|
Base Score | 6.5 | 5.3 |
Vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | Low | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality Impact | None | None |
Integrity Impact | None | None |
Availability Impact | High | Low |
CVSSv3 Version | 3 | 3 |
SUSE Security Advisories:
- openSUSE-SU-2020:0079-1, published Mon, 20 Jan 2020 06:11:03 +0100 (CET)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
openSUSE Leap 15.1 |
| Patchnames: openSUSE-2020-79 |
openSUSE Tumbleweed |
| Patchnames: openSUSE Tumbleweed GA glusterfs-9.1-1.3 |
SUSE Timeline for this CVE
CVE page created: Thu Aug 23 13:45:22 2018CVE page last modified: Wed Oct 26 21:19:18 2022