First published: Thu May 24 2018(Updated: )
A flaw was found in glusterfs which can lead to privilege escalation on gluster server nodes. It was found that any gluster client authenticated via TLS could use gluster cli with --remote-host command to add itself to gluster trusted pool and perform all gluster operations like peer probe itself or other machines, start, stop, delete volumes etc.
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS GlusterFS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1582043 is considered high due to its potential for privilege escalation.
To fix REDHAT-BUG-1582043, ensure you apply the relevant security updates provided by Red Hat for glusterfs.
Users running glusterfs that allow authenticated TLS clients to connect are affected by REDHAT-BUG-1582043.
REDHAT-BUG-1582043 affects all versions of glusterfs that do not contain the necessary security patches.
Yes, unauthorized clients could potentially exploit REDHAT-BUG-1582043 if they gain access to a client authenticated via TLS.