CVE-2018-1088

NameCVE-2018-1088
DescriptionA privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2806-1
Debian Bugs896128

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
glusterfs (PTS)buster5.5-3fixed
bullseye9.2-1fixed
bookworm, sid10.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
glusterfssourcewheezy(not affected)
glusterfssourcejessie(not affected)
glusterfssourcestretch3.8.8-1+deb9u1DLA-2806-1
glusterfssource(unstable)4.0.2-1896128

Notes

[jessie] - glusterfs <not-affected> (vulnerable code not present)
[wheezy] - glusterfs <not-affected> (vulnerable code not present)
https://bugzilla.redhat.com/show_bug.cgi?id=1558721
https://review.gluster.org/#/c/19899/
https://review.gluster.org/#/c/19898/
When fixing the issue it's important to not apply the incomplete fix and open
CVE-2018-1112 causing that auth.allow allows all clients to mount volumes.
Cf. https://bugzilla.redhat.com/show_bug.cgi?id=1570891
Needs: https://review.gluster.org/#/c/19899/1..2

Search for package or bug name: Reporting problems