Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-1112
Vulnerability from cvelistv5
Published
2018-04-25 12:00
Modified
2024-08-05 03:51
Severity ?
EPSS score ?
Summary
glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using 'auth.allow' option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | unspecified | glusterfs |
Version: glusterfs 3.10.12 Version: glusterfs 4.0.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:51:48.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://review.gluster.org/#/c/19899/1..2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/articles/3422521" }, { "name": "RHSA-2018:1268", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "name": "RHSA-2018:1269", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "name": "openSUSE-SU-2020:0079", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "glusterfs", "vendor": "unspecified", "versions": [ { "status": "affected", "version": "glusterfs 3.10.12" }, { "status": "affected", "version": " glusterfs 4.0.2" } ] } ], "datePublic": "2018-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using \u0027auth.allow\u0027 option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-20T06:06:12", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://review.gluster.org/#/c/19899/1..2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/articles/3422521" }, { "name": "RHSA-2018:1268", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "name": "RHSA-2018:1269", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "name": "openSUSE-SU-2020:0079", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glusterfs", "version": { "version_data": [ { "version_value": "glusterfs 3.10.12" }, { "version_value": " glusterfs 4.0.2" } ] } } ] }, "vendor_name": "" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using \u0027auth.allow\u0027 option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression." } ] }, "impact": { "cvss": [ [ { "vectorString": "8.0/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112" }, { "name": "https://review.gluster.org/#/c/19899/1..2", "refsource": "CONFIRM", "url": "https://review.gluster.org/#/c/19899/1..2" }, { "name": "https://access.redhat.com/articles/3422521", "refsource": "CONFIRM", "url": "https://access.redhat.com/articles/3422521" }, { "name": "RHSA-2018:1268", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "name": "RHSA-2018:1269", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "name": "openSUSE-SU-2020:0079", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1112", "datePublished": "2018-04-25T12:00:00", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-08-05T03:51:48.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.10.12\", \"matchCriteriaId\": \"D3610741-E01E-4B62-954F-ACB672F09FBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gluster:glusterfs:4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9925B2D-B825-4B8C-A41E-35E877328AD6\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using \u0027auth.allow\u0027 option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.\"}, {\"lang\": \"es\", \"value\": \"El servidor glusterfs 3.10.12 y 4.0.2 es vulnerable cuando se emplea la opci\\u00f3n \\\"auth.allow\\\", que permite que cualquier cliente de gluster no autenticado se conecte desde cualquier red para montar vol\\u00famenes de almacenamiento de gluster. NOTA: esta vulnerabilidad existe debido a una regresi\\u00f3n de CVE-2018-1088\"}]", "id": "CVE-2018-1112", "lastModified": "2024-11-21T03:59:12.377", "metrics": "{\"cvssMetricV30\": [{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.0, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.1, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2018-04-25T12:29:00.213", "references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://access.redhat.com/articles/3422521\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1268\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1269\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://review.gluster.org/#/c/19899/1..2\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/articles/3422521\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1268\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1269\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://review.gluster.org/#/c/19899/1..2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-287\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2018-1112\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-04-25T12:29:00.213\",\"lastModified\":\"2024-11-21T03:59:12.377\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using \u0027auth.allow\u0027 option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.\"},{\"lang\":\"es\",\"value\":\"El servidor glusterfs 3.10.12 y 4.0.2 es vulnerable cuando se emplea la opci\u00f3n \\\"auth.allow\\\", que permite que cualquier cliente de gluster no autenticado se conecte desde cualquier red para montar vol\u00famenes de almacenamiento de gluster. NOTA: esta vulnerabilidad existe debido a una regresi\u00f3n de CVE-2018-1088\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.1,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.10.12\",\"matchCriteriaId\":\"D3610741-E01E-4B62-954F-ACB672F09FBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gluster:glusterfs:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9925B2D-B825-4B8C-A41E-35E877328AD6\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/articles/3422521\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1268\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1269\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://review.gluster.org/#/c/19899/1..2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/articles/3422521\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1268\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1269\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://review.gluster.org/#/c/19899/1..2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
rhsa-2018_1269
Vulnerability from csaf_redhat
Published
2018-04-30 12:51
Modified
2024-11-14 23:42
Summary
Red Hat Security Advisory: glusterfs security update
Notes
Topic
An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 7 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.
Security Fix(es):
* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way 'auth.allow' is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 7 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1269", "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" }, { "category": "external", "summary": "1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1269.json" } ], "title": "Red Hat Security Advisory: glusterfs security update", "tracking": { "current_release_date": "2024-11-14T23:42:24+00:00", "generator": { "date": "2024-11-14T23:42:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1269", "initial_release_date": "2018-04-30T12:51:26+00:00", "revision_history": [ { "date": "2018-04-30T12:51:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-04-30T12:51:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:42:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.3 on RHEL-7", "product": { "name": "Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.3:server:el7" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el7" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.8.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "product": { "name": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "product_id": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-resource-agents@3.8.4-54.8.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "product": { "name": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "product_id": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.8.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.8.el7.noarch", "product": { "name": "python-gluster-0:3.8.4-54.8.el7.noarch", "product_id": "python-gluster-0:3.8.4-54.8.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.8.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "product": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "product_id": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7.src", "product": { "name": "glusterfs-0:3.8.4-54.8.el7.src", "product_id": "glusterfs-0:3.8.4-54.8.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch" }, "product_reference": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.8.el7.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.8.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.src", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.8.el7.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.8.el7.noarch", "relates_to_product_reference": "7Server-RHSClient" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1112", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1570891" } ], "notes": [ { "category": "description", "text": "It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that use \u0027auth.allow\u0027 to restrict access to gluster volumes. Gluster servers using TLS to authenticate gluster clients are not affected by this. This vulnerability allows any client to connect to any gluster volume which only uses auth.allow to restrict access.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6 and 7 because only gluster client is shipped in these products. CVE-2018-1112 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1112" }, { "category": "external", "summary": "RHBZ#1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1112", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" } ], "release_date": "2018-04-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-30T12:51:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "category": "workaround", "details": "1. Use TLS Authentication to authenticate gluster clients to limit access to gluster storage volumes\n\n2. The gluster server should be on LAN, firewalled to trusted systems, and not reachable from public networks.", "product_ids": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)" } ] }
rhsa-2018_1268
Vulnerability from csaf_redhat
Published
2018-04-30 12:48
Modified
2024-11-14 23:42
Summary
Red Hat Security Advisory: glusterfs security update
Notes
Topic
An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 6 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.
Security Fix(es):
* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way 'auth.allow' is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 6 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1268", "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" }, { "category": "external", "summary": "1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1268.json" } ], "title": "Red Hat Security Advisory: glusterfs security update", "tracking": { "current_release_date": "2024-11-14T23:42:20+00:00", "generator": { "date": "2024-11-14T23:42:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1268", "initial_release_date": "2018-04-30T12:48:37+00:00", "revision_history": [ { "date": "2018-04-30T12:48:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-04-30T12:48:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:42:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.3 on RHEL-6", "product": { "name": "Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.3:server:el6" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "product": { "name": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "product_id": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.9.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.9.el6.noarch", "product": { "name": "python-gluster-0:3.8.4-54.9.el6.noarch", "product_id": "python-gluster-0:3.8.4-54.9.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.9.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.9.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6rhs.src", "product": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.src", "product_id": "glusterfs-0:3.8.4-54.9.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6rhs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6.src", "product": { "name": "glusterfs-0:3.8.4-54.9.el6.src", "product_id": "glusterfs-0:3.8.4-54.9.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.src as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.9.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6.src", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.9.el6.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.9.el6.noarch", "relates_to_product_reference": "6Server-RHSClient" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1112", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1570891" } ], "notes": [ { "category": "description", "text": "It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that use \u0027auth.allow\u0027 to restrict access to gluster volumes. Gluster servers using TLS to authenticate gluster clients are not affected by this. This vulnerability allows any client to connect to any gluster volume which only uses auth.allow to restrict access.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6 and 7 because only gluster client is shipped in these products. CVE-2018-1112 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1112" }, { "category": "external", "summary": "RHBZ#1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1112", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" } ], "release_date": "2018-04-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-30T12:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "category": "workaround", "details": "1. Use TLS Authentication to authenticate gluster clients to limit access to gluster storage volumes\n\n2. The gluster server should be on LAN, firewalled to trusted systems, and not reachable from public networks.", "product_ids": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)" } ] }
rhsa-2018:1268
Vulnerability from csaf_redhat
Published
2018-04-30 12:48
Modified
2024-11-14 23:42
Summary
Red Hat Security Advisory: glusterfs security update
Notes
Topic
An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 6 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.
Security Fix(es):
* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way 'auth.allow' is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 6 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1268", "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" }, { "category": "external", "summary": "1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1268.json" } ], "title": "Red Hat Security Advisory: glusterfs security update", "tracking": { "current_release_date": "2024-11-14T23:42:20+00:00", "generator": { "date": "2024-11-14T23:42:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1268", "initial_release_date": "2018-04-30T12:48:37+00:00", "revision_history": [ { "date": "2018-04-30T12:48:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-04-30T12:48:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:42:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.3 on RHEL-6", "product": { "name": "Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.3:server:el6" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "product": { "name": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "product_id": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.9.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.9.el6.noarch", "product": { "name": "python-gluster-0:3.8.4-54.9.el6.noarch", "product_id": "python-gluster-0:3.8.4-54.9.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.9.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.9.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6rhs.src", "product": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.src", "product_id": "glusterfs-0:3.8.4-54.9.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6rhs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6.src", "product": { "name": "glusterfs-0:3.8.4-54.9.el6.src", "product_id": "glusterfs-0:3.8.4-54.9.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.src as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.9.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6.src", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.9.el6.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.9.el6.noarch", "relates_to_product_reference": "6Server-RHSClient" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1112", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1570891" } ], "notes": [ { "category": "description", "text": "It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that use \u0027auth.allow\u0027 to restrict access to gluster volumes. Gluster servers using TLS to authenticate gluster clients are not affected by this. This vulnerability allows any client to connect to any gluster volume which only uses auth.allow to restrict access.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6 and 7 because only gluster client is shipped in these products. CVE-2018-1112 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1112" }, { "category": "external", "summary": "RHBZ#1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1112", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" } ], "release_date": "2018-04-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-30T12:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "category": "workaround", "details": "1. Use TLS Authentication to authenticate gluster clients to limit access to gluster storage volumes\n\n2. The gluster server should be on LAN, firewalled to trusted systems, and not reachable from public networks.", "product_ids": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)" } ] }
RHSA-2018:1269
Vulnerability from csaf_redhat
Published
2018-04-30 12:51
Modified
2024-11-14 23:42
Summary
Red Hat Security Advisory: glusterfs security update
Notes
Topic
An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 7 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.
Security Fix(es):
* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way 'auth.allow' is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 7 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1269", "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" }, { "category": "external", "summary": "1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1269.json" } ], "title": "Red Hat Security Advisory: glusterfs security update", "tracking": { "current_release_date": "2024-11-14T23:42:24+00:00", "generator": { "date": "2024-11-14T23:42:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1269", "initial_release_date": "2018-04-30T12:51:26+00:00", "revision_history": [ { "date": "2018-04-30T12:51:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-04-30T12:51:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:42:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.3 on RHEL-7", "product": { "name": "Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.3:server:el7" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el7" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.8.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "product": { "name": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "product_id": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-resource-agents@3.8.4-54.8.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "product": { "name": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "product_id": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.8.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.8.el7.noarch", "product": { "name": "python-gluster-0:3.8.4-54.8.el7.noarch", "product_id": "python-gluster-0:3.8.4-54.8.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.8.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "product": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "product_id": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7.src", "product": { "name": "glusterfs-0:3.8.4-54.8.el7.src", "product_id": "glusterfs-0:3.8.4-54.8.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch" }, "product_reference": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.8.el7.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.8.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.src", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.8.el7.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.8.el7.noarch", "relates_to_product_reference": "7Server-RHSClient" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1112", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1570891" } ], "notes": [ { "category": "description", "text": "It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that use \u0027auth.allow\u0027 to restrict access to gluster volumes. Gluster servers using TLS to authenticate gluster clients are not affected by this. This vulnerability allows any client to connect to any gluster volume which only uses auth.allow to restrict access.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6 and 7 because only gluster client is shipped in these products. CVE-2018-1112 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1112" }, { "category": "external", "summary": "RHBZ#1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1112", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" } ], "release_date": "2018-04-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-30T12:51:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "category": "workaround", "details": "1. Use TLS Authentication to authenticate gluster clients to limit access to gluster storage volumes\n\n2. The gluster server should be on LAN, firewalled to trusted systems, and not reachable from public networks.", "product_ids": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)" } ] }
rhsa-2018:1269
Vulnerability from csaf_redhat
Published
2018-04-30 12:51
Modified
2024-11-14 23:42
Summary
Red Hat Security Advisory: glusterfs security update
Notes
Topic
An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 7 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.
Security Fix(es):
* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way 'auth.allow' is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 7 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1269", "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" }, { "category": "external", "summary": "1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1269.json" } ], "title": "Red Hat Security Advisory: glusterfs security update", "tracking": { "current_release_date": "2024-11-14T23:42:24+00:00", "generator": { "date": "2024-11-14T23:42:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1269", "initial_release_date": "2018-04-30T12:51:26+00:00", "revision_history": [ { "date": "2018-04-30T12:51:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-04-30T12:51:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:42:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.3 on RHEL-7", "product": { "name": "Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.3:server:el7" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el7" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.8.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.8.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "product": { "name": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "product_id": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-resource-agents@3.8.4-54.8.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "product": { "name": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "product_id": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.8.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.8.el7.noarch", "product": { "name": "python-gluster-0:3.8.4-54.8.el7.noarch", "product_id": "python-gluster-0:3.8.4-54.8.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.8.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "product": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "product_id": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.8.el7.src", "product": { "name": "glusterfs-0:3.8.4-54.8.el7.src", "product_id": "glusterfs-0:3.8.4-54.8.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.8.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch" }, "product_reference": "glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-7", "product_id": "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.8.el7.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.8.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.src", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.8.el7.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.8.el7.noarch", "relates_to_product_reference": "7Server-RHSClient" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1112", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1570891" } ], "notes": [ { "category": "description", "text": "It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that use \u0027auth.allow\u0027 to restrict access to gluster volumes. Gluster servers using TLS to authenticate gluster clients are not affected by this. This vulnerability allows any client to connect to any gluster volume which only uses auth.allow to restrict access.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6 and 7 because only gluster client is shipped in these products. CVE-2018-1112 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1112" }, { "category": "external", "summary": "RHBZ#1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1112", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" } ], "release_date": "2018-04-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-30T12:51:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "category": "workaround", "details": "1. Use TLS Authentication to authenticate gluster clients to limit access to gluster storage volumes\n\n2. The gluster server should be on LAN, firewalled to trusted systems, and not reachable from public networks.", "product_ids": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.src", "7Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:glusterfs-resource-agents-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.8.el7rhgs.x86_64", "7Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.8.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-54.8.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-54.8.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-54.8.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)" } ] }
RHSA-2018:1268
Vulnerability from csaf_redhat
Published
2018-04-30 12:48
Modified
2024-11-14 23:42
Summary
Red Hat Security Advisory: glusterfs security update
Notes
Topic
An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 6 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.
Security Fix(es):
* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way 'auth.allow' is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for glusterfs is now available for Native Client for Red Hat Enterprise Linux 6 for Red Hat Storage and Red Hat Gluster Storage 3.3 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes. (CVE-2018-1112)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1268", "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" }, { "category": "external", "summary": "1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1268.json" } ], "title": "Red Hat Security Advisory: glusterfs security update", "tracking": { "current_release_date": "2024-11-14T23:42:20+00:00", "generator": { "date": "2024-11-14T23:42:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:1268", "initial_release_date": "2018-04-30T12:48:37+00:00", "revision_history": [ { "date": "2018-04-30T12:48:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-04-30T12:48:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:42:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.3 on RHEL-6", "product": { "name": "Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.3:server:el6" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "product": { "name": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "product_id": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.9.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-54.9.el6.noarch", "product": { "name": "python-gluster-0:3.8.4-54.9.el6.noarch", "product_id": "python-gluster-0:3.8.4-54.9.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-54.9.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.9.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-54.9.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-54.9.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6rhs.src", "product": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.src", "product_id": "glusterfs-0:3.8.4-54.9.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6rhs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-54.9.el6.src", "product": { "name": "glusterfs-0:3.8.4-54.9.el6.src", "product_id": "glusterfs-0:3.8.4-54.9.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-54.9.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.src as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.9.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.3 on RHEL-6", "product_id": "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.9.el6rhs.noarch", "relates_to_product_reference": "6Server-RH-Gluster-3.3-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6.src", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-54.9.el6.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" }, "product_reference": "python-gluster-0:3.8.4-54.9.el6.noarch", "relates_to_product_reference": "6Server-RHSClient" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1112", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1570891" } ], "notes": [ { "category": "description", "text": "It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way \u0027auth.allow\u0027 is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability affects gluster servers that use \u0027auth.allow\u0027 to restrict access to gluster volumes. Gluster servers using TLS to authenticate gluster clients are not affected by this. This vulnerability allows any client to connect to any gluster volume which only uses auth.allow to restrict access.\n\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6 and 7 because only gluster client is shipped in these products. CVE-2018-1112 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1112" }, { "category": "external", "summary": "RHBZ#1570891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1112", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1112" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112" }, { "category": "external", "summary": "https://access.redhat.com/articles/3422521", "url": "https://access.redhat.com/articles/3422521" } ], "release_date": "2018-04-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-30T12:48:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "category": "workaround", "details": "1. Use TLS Authentication to authenticate gluster clients to limit access to gluster storage volumes\n\n2. The gluster server should be on LAN, firewalled to trusted systems, and not reachable from public networks.", "product_ids": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.src", "6Server-RH-Gluster-3.3-Server:glusterfs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-api-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-cli-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-client-xlators-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-debuginfo-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-devel-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-events-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-fuse-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-ganesha-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-geo-replication-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-libs-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-rdma-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:glusterfs-server-0:3.8.4-54.9.el6rhs.x86_64", "6Server-RH-Gluster-3.3-Server:python-gluster-0:3.8.4-54.9.el6rhs.noarch", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-54.9.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-54.9.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)" } ] }
gsd-2018-1112
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using 'auth.allow' option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-1112", "description": "glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using \u0027auth.allow\u0027 option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.", "id": "GSD-2018-1112", "references": [ "https://www.suse.com/security/cve/CVE-2018-1112.html", "https://access.redhat.com/errata/RHSA-2018:1269", "https://access.redhat.com/errata/RHSA-2018:1268" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-1112" ], "details": "glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using \u0027auth.allow\u0027 option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.", "id": "GSD-2018-1112", "modified": "2023-12-13T01:22:36.843736Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "glusterfs", "version": { "version_data": [ { "version_value": "glusterfs 3.10.12" }, { "version_value": " glusterfs 4.0.2" } ] } } ] }, "vendor_name": "" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using \u0027auth.allow\u0027 option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression." } ] }, "impact": { "cvss": [ [ { "vectorString": "8.0/CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112" }, { "name": "https://review.gluster.org/#/c/19899/1..2", "refsource": "CONFIRM", "url": "https://review.gluster.org/#/c/19899/1..2" }, { "name": "https://access.redhat.com/articles/3422521", "refsource": "CONFIRM", "url": "https://access.redhat.com/articles/3422521" }, { "name": "RHSA-2018:1268", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "name": "RHSA-2018:1269", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "name": "openSUSE-SU-2020:0079", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.10.12", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gluster:glusterfs:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1112" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using \u0027auth.allow\u0027 option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://review.gluster.org/#/c/19899/1..2", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://review.gluster.org/#/c/19899/1..2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112" }, { "name": "https://access.redhat.com/articles/3422521", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/articles/3422521" }, { "name": "RHSA-2018:1269", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "name": "RHSA-2018:1268", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "name": "openSUSE-SU-2020:0079", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-09T23:38Z", "publishedDate": "2018-04-25T12:29Z" } } }
cve-2018-1112
Vulnerability from fkie_nvd
Published
2018-04-25 12:29
Modified
2024-11-21 03:59
Severity ?
8.0 (High) - CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using 'auth.allow' option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3610741-E01E-4B62-954F-ACB672F09FBA", "versionEndExcluding": "3.10.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:gluster:glusterfs:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "B9925B2D-B825-4B8C-A41E-35E877328AD6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using \u0027auth.allow\u0027 option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression." }, { "lang": "es", "value": "El servidor glusterfs 3.10.12 y 4.0.2 es vulnerable cuando se emplea la opci\u00f3n \"auth.allow\", que permite que cualquier cliente de gluster no autenticado se conecte desde cualquier red para montar vol\u00famenes de almacenamiento de gluster. NOTA: esta vulnerabilidad existe debido a una regresi\u00f3n de CVE-2018-1088" } ], "id": "CVE-2018-1112", "lastModified": "2024-11-21T03:59:12.377", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-25T12:29:00.213", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/articles/3422521" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://review.gluster.org/#/c/19899/1..2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/articles/3422521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://review.gluster.org/#/c/19899/1..2" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-g75c-rwx3-m2xp
Vulnerability from github
Published
2022-05-13 01:33
Modified
2022-05-13 01:33
Severity ?
Details
glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using 'auth.allow' option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.
{ "affected": [], "aliases": [ "CVE-2018-1112" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-04-25T12:29:00Z", "severity": "HIGH" }, "details": "glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using \u0027auth.allow\u0027 option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.", "id": "GHSA-g75c-rwx3-m2xp", "modified": "2022-05-13T01:33:32Z", "published": "2022-05-13T01:33:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1112" }, { "type": "WEB", "url": "https://access.redhat.com/articles/3422521" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1268" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:1269" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1112" }, { "type": "WEB", "url": "https://review.gluster.org/#/c/19899/1..2" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.