Action not permitted
Modal body text goes here.
CVE-2018-1088
Vulnerability from cvelistv5
Published
2018-04-18 16:00
Modified
2024-08-05 03:51
Severity ?
EPSS score ?
Summary
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Red Hat, Inc. | glusterfs |
Version: 3.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:51:48.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:1137", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1137" }, { "name": "RHSA-2018:1275", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1275" }, { "name": "RHSA-2018:1524", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "name": "RHSA-2018:1136", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1136" }, { "name": "GLSA-201904-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201904-06" }, { "name": "openSUSE-SU-2020:0079", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" }, { "name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glusterfs", "vendor": "Red Hat, Inc.", "versions": [ { "status": "affected", "version": "3.x" } ] } ], "datePublic": "2018-04-18T00:00:00", "descriptions": [ { "lang": "en", "value": "A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-02T02:06:20", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2018:1137", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1137" }, { "name": "RHSA-2018:1275", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1275" }, { "name": "RHSA-2018:1524", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "name": "RHSA-2018:1136", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1136" }, { "name": "GLSA-201904-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201904-06" }, { "name": "openSUSE-SU-2020:0079", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" }, { "name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1088", "datePublished": "2018-04-18T16:00:00Z", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-08-05T03:51:48.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-1088\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-04-18T16:29:00.323\",\"lastModified\":\"2024-11-21T03:59:09.350\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un error de escalado de privilegios en el programador de capturas en gluster, en versiones 3.x. Cualquier cliente gluster al que se le permita montar vol\u00famenes de gluster tambi\u00e9n podr\u00eda montar un volumen de almacenamiento compartido de gluster y escalar privilegios programando un cronjob malicioso mediante un enlace simb\u00f3lico.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-266\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0\",\"versionEndIncluding\":\"3.13.2\",\"matchCriteriaId\":\"3977873F-62E6-4531-9DDF-F92FEC084895\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BBD7A51-0590-4DDF-8249-5AFA8D645CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB28F9AF-3D06-4532-B397-96D7E4792503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1136\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1137\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1275\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1524\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1558721\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201904-06\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1136\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1137\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1275\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1524\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1558721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201904-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2018_1524
Vulnerability from csaf_redhat
Published
2018-05-15 17:40
Modified
2024-11-15 03:03
Summary
Red Hat Security Advisory: redhat-virtualization-host bug fix and enhancement update
Notes
Topic
Updated redhat-virtualization-host packages that fix several bugs and add various enhancements are now available.
Details
The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Includes GlusterFS fixes for CVE-2018-1088, dhcp fixes for CVE-2018-1111, kernel fixes for CVE-2018-1087, and kernel fixes for CVE-2018-8897.
A list of bugs fixed in this update is available in the Technical Notes book: https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.2/html/technical_notes/
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated redhat-virtualization-host packages that fix several bugs and add various enhancements are now available.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nIncludes GlusterFS fixes for CVE-2018-1088, dhcp fixes for CVE-2018-1111, kernel fixes for CVE-2018-1087, and kernel fixes for CVE-2018-8897.\n\nA list of bugs fixed in this update is available in the Technical Notes book: https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.2/html/technical_notes/", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1524", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1357247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1357247" }, { "category": "external", "summary": "1374007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374007" }, { "category": "external", "summary": "1420068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420068" }, { "category": "external", "summary": "1422676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422676" }, { "category": "external", "summary": "1429485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429485" }, { "category": "external", "summary": "1433394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433394" }, { "category": "external", "summary": "1443965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443965" }, { "category": "external", "summary": "1454536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1454536" }, { "category": "external", "summary": "1474268", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474268" }, { "category": "external", "summary": "1489567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489567" }, { "category": "external", "summary": "1501161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501161" }, { "category": "external", "summary": "1502920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502920" }, { "category": "external", "summary": "1503148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503148" }, { "category": "external", "summary": "1516123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516123" }, { "category": "external", "summary": "1534855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534855" }, { "category": "external", "summary": "1535791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535791" }, { "category": "external", "summary": "1542833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1542833" }, { "category": "external", "summary": "1547864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547864" }, { "category": "external", "summary": "1549630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549630" }, { "category": "external", "summary": "1554186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554186" }, { "category": "external", "summary": "1555243", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555243" }, { "category": "external", "summary": "1555254", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555254" }, { "category": "external", "summary": "1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "1561258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561258" }, { "category": "external", "summary": "1563530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563530" }, { "category": "external", "summary": "1565497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565497" }, { "category": "external", "summary": "1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "1567974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567974" }, { "category": "external", "summary": "1571134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571134" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1524.json" } ], "title": "Red Hat Security Advisory: redhat-virtualization-host bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-15T03:03:52+00:00", "generator": { "date": "2024-11-15T03:03:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1524", "initial_release_date": "2018-05-15T17:40:52+00:00", "revision_history": [ { "date": "2018-05-15T17:40:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-15T17:40:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T03:03:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product": { "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product_id": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-node-ng-nodectl@4.2.0-0.20170814.0.el7?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-3.0.el7?arch=noarch" } } }, { "category": "product_version", "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product": { "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product_id": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-imgbased@1.0.16-0.1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product": { "name": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product_id": "imgbased-0:1.0.16-0.1.el7ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.0.16-0.1.el7ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20180508.0.el7_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product": { "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product_id": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-node-ng@4.2.0-0.20170814.0.el7?arch=src" } } }, { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product_id": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.0.el7?arch=src" } } }, { "category": "product_version", "name": "imgbased-0:1.0.16-0.1.el7ev.src", "product": { "name": "imgbased-0:1.0.16-0.1.el7ev.src", "product_id": "imgbased-0:1.0.16-0.1.el7ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/imgbased@1.0.16-0.1.el7ev?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product": { "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product_id": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20180508.0.el7_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product_id": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-3.0.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src" }, "product_reference": "redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.0.16-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch" }, "product_reference": "imgbased-0:1.0.16-0.1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "imgbased-0:1.0.16-0.1.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src" }, "product_reference": "imgbased-0:1.0.16-0.1.el7ev.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src" }, "product_reference": "ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch" }, "product_reference": "ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-imgbased-0:1.0.16-0.1.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch" }, "product_reference": "python-imgbased-0:1.0.16-0.1.el7ev.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src" }, "product_reference": "redhat-release-virtualization-host-0:4.2-3.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] } ], "cve": "CVE-2018-1087", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: error in exception handling leads to wrong debug stack value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1087" }, { "category": "external", "summary": "RHBZ#1566837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1087", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1087" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1087" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: KVM: error in exception handling leads to wrong debug stack value" }, { "acknowledgments": [ { "names": [ "John Strunk" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1088", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1558721" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in gluster snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that have, or have previously had, Gluster volume snapshot scheduling enabled from the CLI. Red Hat Enterprise Virtualization supports volume snapshot scheduling from the Web UI, which uses a distinct mechanism that is not subject to this vulnerability. VM snapshots are not impacted by this flaw. For more information, please see the Vulnerability Article linked under External References.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6, and 7 because only gluster client is shipped in these products. CVE-2018-1088 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1088" }, { "category": "external", "summary": "RHBZ#1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1088", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088" }, { "category": "external", "summary": "https://access.redhat.com/articles/3414511", "url": "https://access.redhat.com/articles/3414511" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "workaround", "details": "To limit exposure of gluster server nodes : \n\n1. gluster server should be on LAN and not reachable from public networks. \n2. Use gluster auth.allow and auth.reject. \n3. Use TLS certificates between gluster server nodes and clients. \n\nCaveat: This would only mitigate attacks from unauthorized malicious clients. gluster clients allowed by auth.allow or having signed TLS client certificates would still be able to trigger this attack.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm" ], "organization": "Google Security Team" } ], "cve": "CVE-2018-1111", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2018-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567974" } ], "notes": [ { "category": "description", "text": "A command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in Red Hat Enterprise Linux. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.", "title": "Vulnerability description" }, { "category": "summary", "text": "dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has been made aware of a vulnerability affecting the DHCP client packages as shipped with Red Hat Enterprise Linux 6 and 7. This vulnerability CVE-2018-1111 was rated as having a security impact of Critical. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol.\n\nRed Hat Enterprise Virtualization 4.1 includes the vulnerable components, but the default configuration is not impacted because NetworkManager is turned off in the Management Appliance, and not used in conjunction with DHCP in the Hypervisor. Customers can still obtain the updated packages from Red Hat Enterprise Linux channels using `yum update`, or upgrade to Red Hat Enterprise Virtualization 4.2, which includes the fixed packages.\n\nRed Hat Enterprise Virtualization 3.6 is not vulnerable as it does not use DHCP.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1111" }, { "category": "external", "summary": "RHBZ#1567974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567974" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1111", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1111" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1111", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1111" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/3442151", "url": "https://access.redhat.com/security/vulnerabilities/3442151" } ], "release_date": "2018-05-15T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "category": "workaround", "details": "Please access https://access.redhat.com/security/vulnerabilities/3442151 for information on how to mitigate this issue.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "dhcp: Command injection vulnerability in the DHCP client NetworkManager integration script" }, { "acknowledgments": [ { "names": [ "Andy Lutomirski" ] }, { "names": [ "Nick Peterson" ], "organization": "Everdox Tech LLC" } ], "cve": "CVE-2018-8897", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1567074" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in the denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: error in exception handling leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-8897" }, { "category": "external", "summary": "RHBZ#1567074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-8897", "url": "https://www.cve.org/CVERecord?id=CVE-2018-8897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8897" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/pop_ss", "url": "https://access.redhat.com/security/vulnerabilities/pop_ss" } ], "release_date": "2018-05-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-15T17:40:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1524" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.2-20180508.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.2-20180508.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:imgbased-0:1.0.16-0.1.el7ev.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-0:4.2.0-0.20170814.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:ovirt-node-ng-nodectl-0:4.2.0-0.20170814.0.el7.noarch", "7Server-RHEV-4-HypervisorBuild-7:python-imgbased-0:1.0.16-0.1.el7ev.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.2-3.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.2-3.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: error in exception handling leads to DoS" } ] }
rhsa-2018_1275
Vulnerability from csaf_redhat
Published
2018-05-02 13:15
Modified
2024-11-14 23:42
Summary
Red Hat Security Advisory: redhat-virtualization-host security update
Notes
Topic
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Security Fix(es):
* glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled (CVE-2018-1088)
* It was found that fix for CVE-2018-1088 introduced new vulnerability in the way 'auth.allow' is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
This issue was discovered by John Strunk (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled (CVE-2018-1088)\n\n* It was found that fix for CVE-2018-1088 introduced new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis issue was discovered by John Strunk (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1275", "url": "https://access.redhat.com/errata/RHSA-2018:1275" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "1568527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568527" }, { "category": "external", "summary": "1569421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569421" }, { "category": "external", "summary": "1569823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569823" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1275.json" } ], "title": "Red Hat Security Advisory: redhat-virtualization-host security update", "tracking": { "current_release_date": "2024-11-14T23:42:09+00:00", "generator": { "date": "2024-11-14T23:42:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1275", "initial_release_date": "2018-05-02T13:15:30+00:00", "revision_history": [ { "date": "2018-05-02T13:15:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-05-02T13:15:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:42:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product": { "name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product": { "name": "Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.1-11.0.el7.x86_64", "product": { "name": "redhat-release-virtualization-host-0:4.1-11.0.el7.x86_64", "product_id": "redhat-release-virtualization-host-0:4.1-11.0.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.1-11.0.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "redhat-release-virtualization-host-0:4.1-11.0.el7.src", "product": { "name": "redhat-release-virtualization-host-0:4.1-11.0.el7.src", "product_id": "redhat-release-virtualization-host-0:4.1-11.0.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.1-11.0.el7?arch=src" } } }, { "category": "product_version", "name": "redhat-virtualization-host-0:4.1-20180426.0.el7_5.src", "product": { "name": "redhat-virtualization-host-0:4.1-20180426.0.el7_5.src", "product_id": "redhat-virtualization-host-0:4.1-20180426.0.el7_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.1-20180426.0.el7_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-virtualization-host-image-update-placeholder-0:4.1-11.0.el7.noarch", "product": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.1-11.0.el7.noarch", "product_id": "redhat-virtualization-host-image-update-placeholder-0:4.1-11.0.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.1-11.0.el7?arch=noarch" } } }, { "category": "product_version", "name": "redhat-virtualization-host-image-update-0:4.1-20180426.0.el7_5.noarch", "product": { "name": "redhat-virtualization-host-image-update-0:4.1-20180426.0.el7_5.noarch", "product_id": "redhat-virtualization-host-image-update-0:4.1-20180426.0.el7_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.1-20180426.0.el7_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-0:4.1-20180426.0.el7_5.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.1-20180426.0.el7_5.src" }, "product_reference": "redhat-virtualization-host-0:4.1-20180426.0.el7_5.src", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-0:4.1-20180426.0.el7_5.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7", "product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.1-20180426.0.el7_5.noarch" }, "product_reference": "redhat-virtualization-host-image-update-0:4.1-20180426.0.el7_5.noarch", "relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.1-11.0.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.1-11.0.el7.src" }, "product_reference": "redhat-release-virtualization-host-0:4.1-11.0.el7.src", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-virtualization-host-0:4.1-11.0.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.1-11.0.el7.x86_64" }, "product_reference": "redhat-release-virtualization-host-0:4.1-11.0.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-virtualization-host-image-update-placeholder-0:4.1-11.0.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)", "product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.1-11.0.el7.noarch" }, "product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.1-11.0.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "John Strunk" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1088", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1558721" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in gluster snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that have, or have previously had, Gluster volume snapshot scheduling enabled from the CLI. Red Hat Enterprise Virtualization supports volume snapshot scheduling from the Web UI, which uses a distinct mechanism that is not subject to this vulnerability. VM snapshots are not impacted by this flaw. For more information, please see the Vulnerability Article linked under External References.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6, and 7 because only gluster client is shipped in these products. CVE-2018-1088 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.1-20180426.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.1-20180426.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.1-11.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.1-11.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.1-11.0.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1088" }, { "category": "external", "summary": "RHBZ#1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1088", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088" }, { "category": "external", "summary": "https://access.redhat.com/articles/3414511", "url": "https://access.redhat.com/articles/3414511" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-05-02T13:15:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.1-20180426.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.1-20180426.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.1-11.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.1-11.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.1-11.0.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1275" }, { "category": "workaround", "details": "To limit exposure of gluster server nodes : \n\n1. gluster server should be on LAN and not reachable from public networks. \n2. Use gluster auth.allow and auth.reject. \n3. Use TLS certificates between gluster server nodes and clients. \n\nCaveat: This would only mitigate attacks from unauthorized malicious clients. gluster clients allowed by auth.allow or having signed TLS client certificates would still be able to trigger this attack.", "product_ids": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.1-20180426.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.1-20180426.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.1-11.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.1-11.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.1-11.0.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.1-20180426.0.el7_5.src", "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.1-20180426.0.el7_5.noarch", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.1-11.0.el7.src", "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.1-11.0.el7.x86_64", "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.1-11.0.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled" } ] }
rhsa-2018_1137
Vulnerability from csaf_redhat
Published
2018-04-18 12:04
Modified
2024-11-14 23:41
Summary
Red Hat Security Advisory: glusterfs security update
Notes
Topic
An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 6 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.
Security Fix(es):
* glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled (CVE-2018-1088)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
This issue was discovered by John Strunk (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 6 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled (CVE-2018-1088)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis issue was discovered by John Strunk (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1137", "url": "https://access.redhat.com/errata/RHSA-2018:1137" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3414511", "url": "https://access.redhat.com/articles/3414511" }, { "category": "external", "summary": "1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1137.json" } ], "title": "Red Hat Security Advisory: glusterfs security update", "tracking": { "current_release_date": "2024-11-14T23:41:11+00:00", "generator": { "date": "2024-11-14T23:41:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1137", "initial_release_date": "2018-04-18T12:04:54+00:00", "revision_history": [ { "date": "2018-04-18T12:04:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-04-18T12:04:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:41:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.3 on RHEL-6", "product": { "name": "Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.3:server:el6" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-server-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-server-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-events-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-54.7.el6rhs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-54.7.el6rhs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-54.7.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-54.7.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.7.el6.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.7.el6.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.7.el6.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.7.el6.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.7.el6.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.7.el6.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.7.el6.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.7.el6.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.7.el6.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.7.el6.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.7.el6.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.7.el6.x86_64", "product_id": "glusterfs-0:3.8.4-54.7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.7.el6.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.7.el6.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.7.el6.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.7.el6.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.7.el6.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.7.el6.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.7.el6.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.7.el6.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.7.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-54.7.el6rhs.src", "product": { "name": "glusterfs-0:3.8.4-54.7.el6rhs.src", "product_id": "glusterfs-0:3.8.4-54.7.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.7.el6rhs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.7.el6.src", "product": { "name": "glusterfs-0:3.8.4-54.7.el6.src", "product_id": "glusterfs-0:3.8.4-54.7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.7.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-gluster-0:3.8.4-54.7.el6rhs.noarch", "product": { "name": "python-gluster-0:3.8.4-54.7.el6rhs.noarch", "product_id": "python-gluster-0:3.8.4-54.7.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.7.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.7.el6.noarch", "product": { "name": "python-gluster-0:3.8.4-54.7.el6.noarch", "product_id": "python-gluster-0:3.8.4-54.7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.7.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.7.el6rhs.src as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.7.el6rhs.src" }, "product_reference": "glusterfs-0:3.8.4-54.7.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-54.7.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.7.el6rhs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-54.7.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.7.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.7.el6rhs.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.7.el6rhs.noarch", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.7.el6.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-54.7.el6.src" }, "product_reference": "glusterfs-0:3.8.4-54.7.el6.src", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.7.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-54.7.el6.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.7.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.7.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-0:3.8.4-54.7.el6.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.7.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.7.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.7.el6.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.7.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.7.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.7.el6.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.7.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.7.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.7.el6.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.7.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.7.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.7.el6.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.7.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.7.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.7.el6.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.7.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.7.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.7.el6.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.7.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.7.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.7.el6.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.7.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.7.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.7.el6.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.7.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.7.el6.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:python-gluster-0:3.8.4-54.7.el6.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.7.el6.noarch", "relates_to_product_reference": "6Server-RHSClient" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "John Strunk" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1088", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1558721" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in gluster snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that have, or have previously had, Gluster volume snapshot scheduling enabled from the CLI. Red Hat Enterprise Virtualization supports volume snapshot scheduling from the Web UI, which uses a distinct mechanism that is not subject to this vulnerability. VM snapshots are not impacted by this flaw. For more information, please see the Vulnerability Article linked under External References.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6, and 7 because only gluster client is shipped in these products. CVE-2018-1088 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.7.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.7.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.7.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.7.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1088" }, { "category": "external", "summary": "RHBZ#1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1088", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088" }, { "category": "external", "summary": "https://access.redhat.com/articles/3414511", "url": "https://access.redhat.com/articles/3414511" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-18T12:04:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.7.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.7.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.7.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.7.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1137" }, { "category": "workaround", "details": "To limit exposure of gluster server nodes : \n\n1. gluster server should be on LAN and not reachable from public networks. \n2. Use gluster auth.allow and auth.reject. \n3. Use TLS certificates between gluster server nodes and clients. \n\nCaveat: This would only mitigate attacks from unauthorized malicious clients. gluster clients allowed by auth.allow or having signed TLS client certificates would still be able to trigger this attack.", "product_ids": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.7.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.7.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.7.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.7.el6.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.7.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.7.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.7.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.7.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.7.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.7.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled" } ] }
rhsa-2018_1136
Vulnerability from csaf_redhat
Published
2018-04-18 12:06
Modified
2024-11-14 23:41
Summary
Red Hat Security Advisory: glusterfs security update
Notes
Topic
An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 7 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.
Security Fix(es):
* glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled (CVE-2018-1088)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
This issue was discovered by John Strunk (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 7 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled (CVE-2018-1088)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nThis issue was discovered by John Strunk (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1136", "url": "https://access.redhat.com/errata/RHSA-2018:1136" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3414511", "url": "https://access.redhat.com/articles/3414511" }, { "category": "external", "summary": "1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1136.json" } ], "title": "Red Hat Security Advisory: glusterfs security update", "tracking": { "current_release_date": "2024-11-14T23:41:06+00:00", "generator": { "date": "2024-11-14T23:41:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1136", "initial_release_date": "2018-04-18T12:06:53+00:00", "revision_history": [ { "date": "2018-04-18T12:06:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-04-18T12:06:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:41:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.3 on RHEL-7", "product": { "name": "Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.3:server:el7" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el7" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-server-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-server-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-events-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.6.el7rhgs.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.6.el7rhgs.x86_64", "product_id": "glusterfs-0:3.8.4-54.6.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.6.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.6.el7.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.6.el7.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.6.el7.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.6.el7.x86_64", "product_id": "glusterfs-0:3.8.4-54.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.6.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.6.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-resource-agents-0:3.8.4-54.6.el7rhgs.noarch", "product": { "name": "glusterfs-resource-agents-0:3.8.4-54.6.el7rhgs.noarch", "product_id": "glusterfs-resource-agents-0:3.8.4-54.6.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-resource-agents@3.8.4-54.6.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.6.el7rhgs.noarch", "product": { "name": "python-gluster-0:3.8.4-54.6.el7rhgs.noarch", "product_id": "python-gluster-0:3.8.4-54.6.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.6.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.6.el7.noarch", "product": { "name": "python-gluster-0:3.8.4-54.6.el7.noarch", "product_id": "python-gluster-0:3.8.4-54.6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.6.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-54.6.el7rhgs.src", "product": { "name": "glusterfs-0:3.8.4-54.6.el7rhgs.src", "product_id": "glusterfs-0:3.8.4-54.6.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.6.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.6.el7.src", "product": { "name": "glusterfs-0:3.8.4-54.6.el7.src", "product_id": "glusterfs-0:3.8.4-54.6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.6.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.6.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.6.el7rhgs.src" }, "product_reference": "glusterfs-0:3.8.4-54.6.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-resource-agents-0:3.8.4-54.6.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.6.el7rhgs.noarch" }, "product_reference": "glusterfs-resource-agents-0:3.8.4-54.6.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-54.6.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.6.el7rhgs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-54.6.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.6.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.6.el7rhgs.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.6.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.6.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.6.el7.src" }, "product_reference": "glusterfs-0:3.8.4-54.6.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.6.el7.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.6.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.6.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.6.el7.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-54.6.el7.src" }, "product_reference": "glusterfs-0:3.8.4-54.6.el7.src", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.6.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.6.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.6.el7.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:python-gluster-0:3.8.4-54.6.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.6.el7.noarch", "relates_to_product_reference": "7Server-RHSClient" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "John Strunk" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2018-1088", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2018-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1558721" } ], "notes": [ { "category": "description", "text": "A privilege escalation flaw was found in gluster snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that have, or have previously had, Gluster volume snapshot scheduling enabled from the CLI. Red Hat Enterprise Virtualization supports volume snapshot scheduling from the Web UI, which uses a distinct mechanism that is not subject to this vulnerability. VM snapshots are not impacted by this flaw. For more information, please see the Vulnerability Article linked under External References.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6, and 7 because only gluster client is shipped in these products. CVE-2018-1088 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.6.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.6.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.6.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.6.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.6.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.6.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.6.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1088" }, { "category": "external", "summary": "RHBZ#1558721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1088", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1088" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088" }, { "category": "external", "summary": "https://access.redhat.com/articles/3414511", "url": "https://access.redhat.com/articles/3414511" } ], "release_date": "2018-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-18T12:06:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.6.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.6.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.6.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.6.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.6.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.6.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.6.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1136" }, { "category": "workaround", "details": "To limit exposure of gluster server nodes : \n\n1. gluster server should be on LAN and not reachable from public networks. \n2. Use gluster auth.allow and auth.reject. \n3. Use TLS certificates between gluster server nodes and clients. \n\nCaveat: This would only mitigate attacks from unauthorized malicious clients. gluster clients allowed by auth.allow or having signed TLS client certificates would still be able to trigger this attack.", "product_ids": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.6.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.6.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.6.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.6.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.6.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.6.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.6.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.6.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.6.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.6.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.6.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.6.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.6.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.6.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.6.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.6.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled" } ] }
gsd-2018-1088
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-1088", "description": "A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.", "id": "GSD-2018-1088", "references": [ "https://www.suse.com/security/cve/CVE-2018-1088.html", "https://access.redhat.com/errata/RHSA-2018:1524", "https://access.redhat.com/errata/RHSA-2018:1275", "https://access.redhat.com/errata/RHSA-2018:1137", "https://access.redhat.com/errata/RHSA-2018:1136", "https://ubuntu.com/security/CVE-2018-1088" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-1088" ], "details": "A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.", "id": "GSD-2018-1088", "modified": "2023-12-13T01:22:36.873041Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glusterfs", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.x" } ] } } ] }, "vendor_name": "Red Hat, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-266", "lang": "eng", "value": "CWE-266" } ] } ] }, "references": { "reference_data": [ { "name": "https://access.redhat.com/errata/RHSA-2018:1524", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "name": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html" }, { "name": "https://security.gentoo.org/glsa/201904-06", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201904-06" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" }, { "name": "https://access.redhat.com/errata/RHSA-2018:1136", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:1136" }, { "name": "https://access.redhat.com/errata/RHSA-2018:1137", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:1137" }, { "name": "https://access.redhat.com/errata/RHSA-2018:1275", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2018:1275" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:redhat:gluster_storage:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.13.2", "versionStartIncluding": "3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1088" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-266" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "name": "RHSA-2018:1137", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1137" }, { "name": "RHSA-2018:1136", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1136" }, { "name": "RHSA-2018:1275", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1275" }, { "name": "RHSA-2018:1524", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "name": "GLSA-201904-06", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201904-06" }, { "name": "openSUSE-SU-2020:0079", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" }, { "name": "[debian-lts-announce] 20211101 [SECURITY] [DLA 2806-1] glusterfs security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-13T04:53Z", "publishedDate": "2018-04-18T16:29Z" } } }
ghsa-rf3g-r74x-84j6
Vulnerability from github
Published
2022-05-13 01:04
Modified
2022-05-13 01:04
Severity ?
Details
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
{ "affected": [], "aliases": [ "CVE-2018-1088" ], "database_specific": { "cwe_ids": [ "CWE-266" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-04-18T16:29:00Z", "severity": "HIGH" }, "details": "A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.", "id": "GHSA-rf3g-r74x-84j6", "modified": "2022-05-13T01:04:43Z", "published": "2022-05-13T01:04:43Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1088" }, { "type": "WEB", "url": "https://access.redhat.com/articles/3414511" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1136" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1137" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1275" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1524" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2018-1088" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558721" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201904-06" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.