Описание
[REJECTED CVE] Any host, whether a peer member or not, can use the remote-host command to gain access to the trusted peer group. The remote host can peer probe itself, modify the volume, set up geo-rep to a 3rd party, etc. Network security is not enough. Take, for instance, a storage-as-a-service model where you allow untrusted users to mount volumes. Since they need access to 24007 to retrieve their volume configuration, they can also issue remote-host commands.
Отчет
This CVE has been rejected, because this is by design, the network and hosts used by Gluster must be trusted. Red Hat has evaluated this issue and determined that it does not meet the criteria to be classified as a security vulnerability. This assessment is based on the issue not posing a significant security risk, being a result of misconfiguration or usage error, or falling outside the scope of security considerations. As such, this CVE has been marked as "Rejected" in alignment with Red Hat's vulnerability management policies. If you have additional information or concerns regarding this determination, please contact Red Hat Product Security for further clarification.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Storage 2.0 | glusterfs | Will not fix | ||
| Red Hat Storage 2.1 | glusterfs | Affected |
Показывать по
Дополнительная информация
0 Low
CVSS3
6.8 Medium
CVSS2
Связанные уязвимости
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
0 Low
CVSS3
6.8 Medium
CVSS2