Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-10841

Опубликовано: 20 июн. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 6.5
CVSS3: 8.8

Описание

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support, was needed
cosmic

released

4.1.2-1
devel

not-affected

4.1.2-1
disco

not-affected

4.1.2-1
eoan

not-affected

4.1.2-1
esm-apps/bionic

released

3.13.2-1ubuntu1+esm1
esm-apps/focal

not-affected

4.1.2-1
esm-apps/xenial

released

3.7.6-1ubuntu1+esm1
esm-infra-legacy/trusty

not-affected

code not present

Показывать по

6.5 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 6.6
redhat
больше 7 лет назад

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

CVSS3: 8.8
nvd
больше 7 лет назад

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

CVSS3: 8.8
debian
больше 7 лет назад

glusterfs is vulnerable to privilege escalation on gluster server node ...

CVSS3: 8.8
github
больше 3 лет назад

glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.

6.5 Medium

CVSS2

8.8 High

CVSS3