Описание
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| glusterfs | fixed | 4.0.2-1 | package | |
| glusterfs | not-affected | jessie | package | |
| glusterfs | not-affected | wheezy | package |
Примечания
https://bugzilla.redhat.com/show_bug.cgi?id=1558721
https://review.gluster.org/#/c/19899/
https://review.gluster.org/#/c/19898/
When fixing the issue it's important to not apply the incomplete fix and open
CVE-2018-1112 causing that auth.allow allows all clients to mount volumes.
Cf. https://bugzilla.redhat.com/show_bug.cgi?id=1570891
Needs: https://review.gluster.org/#/c/19899/1..2
EPSS
Связанные уязвимости
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
Уязвимость функции gluster_shared_storage платформы хранения для физических, виртуальных и облачных сред gluster, позволяющая нарушителю повысить свои привилегии
EPSS