Описание
glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | ignored | end of standard support, was needed |
| cosmic | released | 4.1.2-1 |
| devel | not-affected | 4.1.2-1 |
| disco | not-affected | 4.1.2-1 |
| eoan | not-affected | 4.1.2-1 |
| esm-apps/bionic | released | 3.13.2-1ubuntu1+esm1 |
| esm-apps/focal | not-affected | 4.1.2-1 |
| esm-apps/xenial | released | 3.7.6-1ubuntu1+esm1 |
| esm-infra-legacy/trusty | not-affected | code not present |
Показывать по
Ссылки на источники
6.5 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
glusterfs is vulnerable to privilege escalation on gluster server node ...
glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
6.5 Medium
CVSS2
8.8 High
CVSS3