First published: Tue Mar 20 2018(Updated: )
A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/glusterfs | <0:3.8.4-54.7.el6 | 0:3.8.4-54.7.el6 |
redhat/glusterfs | <0:3.8.4-54.6.el7 | 0:3.8.4-54.6.el7 |
redhat/redhat-release-virtualization-host | <0:4.1-11.0.el7 | 0:4.1-11.0.el7 |
redhat/imgbased | <0:1.0.16-0.1.el7e | 0:1.0.16-0.1.el7e |
redhat/ovirt-node-ng | <0:4.2.0-0.20170814.0.el7 | 0:4.2.0-0.20170814.0.el7 |
redhat/redhat-release-virtualization-host | <0:4.2-3.0.el7 | 0:4.2-3.0.el7 |
redhat gluster storage | >=3.0<=3.13.2 | |
Red Hat Enterprise Virtualization | =4.0 | |
redhat virtualization host | =4.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
openSUSE | =15.1 | |
Debian Debian Linux | =9.0 |
To limit exposure of gluster server nodes : 1. gluster server should be on LAN and not reachable from public networks. 2. Use gluster auth.allow and auth.reject. 3. Use TLS certificates between gluster server nodes and clients. Caveat: This would only mitigate attacks from unauthorized malicious clients. gluster clients allowed by auth.allow or having signed TLS client certificates would still be able to trigger this attack.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-1088 is a privilege escalation flaw in the gluster snapshot scheduler.
CVE-2018-1088 has a severity rating of 8.3 (high).
An attacker can exploit CVE-2018-1088 by mounting shared gluster storage volume and scheduling a malicious cronjob via symlink.
Gluster versions up to exclusive 3.8.4-54.7.el6 and up to exclusive 3.8.4-54.6.el7 are affected by CVE-2018-1088.
To remediate CVE-2018-1088, upgrade to gluster versions that are equal to or above 3.8.4-54.7.el6 and 3.8.4-54.6.el7.