First published: Thu May 24 2018(Updated: )
glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gluster GlusterFS | <4.1.8 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-10841.
The severity of CVE-2018-10841 is high with a CVSS score of 8.8.
Gluster GlusterFS versions up to 4.1.8 and Debian Linux version 9.0 are affected by CVE-2018-10841.
An authenticated gluster client could use the gluster cli with the --remote-host command to add itself to the trusted storage pool and perform privileged operations on the gluster server nodes.
Yes, you can find more information about CVE-2018-10841 at the following references: [Reference 1](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1593230), [Reference 2](https://access.redhat.com/errata/RHSA-2018:1955), [Reference 3](https://access.redhat.com/errata/RHSA-2018:1954).