8.3
CWE
266
Advisory Published
CVE Published
CVE Published
Updated

CVE-2018-1088

First published: Tue Mar 20 2018(Updated: )

A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/glusterfs<0:3.8.4-54.7.el6
0:3.8.4-54.7.el6
redhat/glusterfs<0:3.8.4-54.6.el7
0:3.8.4-54.6.el7
redhat/redhat-release-virtualization-host<0:4.1-11.0.el7
0:4.1-11.0.el7
redhat/imgbased<0:1.0.16-0.1.el7e
0:1.0.16-0.1.el7e
redhat/ovirt-node-ng<0:4.2.0-0.20170814.0.el7
0:4.2.0-0.20170814.0.el7
redhat/redhat-release-virtualization-host<0:4.2-3.0.el7
0:4.2-3.0.el7
redhat gluster storage>=3.0<=3.13.2
Red Hat Enterprise Virtualization=4.0
redhat virtualization host=4.0
redhat enterprise Linux server=6.0
redhat enterprise Linux server=7.0
openSUSE=15.1
Debian Debian Linux=9.0

Remedy

To limit exposure of gluster server nodes : 1. gluster server should be on LAN and not reachable from public networks. 2. Use gluster auth.allow and auth.reject. 3. Use TLS certificates between gluster server nodes and clients. Caveat: This would only mitigate attacks from unauthorized malicious clients. gluster clients allowed by auth.allow or having signed TLS client certificates would still be able to trigger this attack.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2018-1088?

    CVE-2018-1088 is a privilege escalation flaw in the gluster snapshot scheduler.

  • What is the severity of CVE-2018-1088?

    CVE-2018-1088 has a severity rating of 8.3 (high).

  • How can an attacker exploit CVE-2018-1088?

    An attacker can exploit CVE-2018-1088 by mounting shared gluster storage volume and scheduling a malicious cronjob via symlink.

  • Which version of gluster is affected by CVE-2018-1088?

    Gluster versions up to exclusive 3.8.4-54.7.el6 and up to exclusive 3.8.4-54.6.el7 are affected by CVE-2018-1088.

  • What is the remedy for CVE-2018-1088?

    To remediate CVE-2018-1088, upgrade to gluster versions that are equal to or above 3.8.4-54.7.el6 and 3.8.4-54.6.el7.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203