Bug 1582043 (CVE-2018-10841) - CVE-2018-10841 glusterfs: access trusted peer group via remote-host command
Summary: CVE-2018-10841 glusterfs: access trusted peer group via remote-host command
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-10841
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20180620:1000...
Depends On: 1582128 1582129 1593219 1593230 1593232 1593238 1593525 1593526
Blocks: 1578127
TreeView+ depends on / blocked
 
Reported: 2018-05-24 05:27 UTC by Siddharth Sharma
Modified: 2019-06-11 11:13 UTC (History)
30 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in glusterfs which can lead to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
Clone Of:
Environment:
Last Closed: 2019-06-10 10:26:29 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:1954 None None None 2018-06-20 10:32:37 UTC
Red Hat Product Errata RHSA-2018:1955 None None None 2018-06-20 10:30:16 UTC

Description Siddharth Sharma 2018-05-24 05:27:24 UTC
A flaw was found in glusterfs which can lead to privilege escalation on 
gluster server nodes.

It was found that any gluster client authenticated via TLS could use
gluster cli with --remote-host command to add itself to gluster trusted 
pool and perform all gluster operations like peer probe itself or other 
machines, start, stop, delete volumes etc.

Comment 11 Siddharth Sharma 2018-06-20 10:23:07 UTC
Created glusterfs tracking bugs for this issue:

Affects: fedora-all [bug 1593230]

Comment 12 errata-xmlrpc 2018-06-20 10:30:00 UTC
This issue has been addressed in the following products:

  Red Hat Gluster Storage 3.3 for RHEL 6
  Native Client for RHEL 6 for Red Hat Storage

Via RHSA-2018:1955 https://access.redhat.com/errata/RHSA-2018:1955

Comment 13 errata-xmlrpc 2018-06-20 10:32:27 UTC
This issue has been addressed in the following products:

  Red Hat Gluster Storage 3.3 for RHEL 7
  Native Client for RHEL 7 for Red Hat Storage

Via RHSA-2018:1954 https://access.redhat.com/errata/RHSA-2018:1954

Comment 14 Siddharth Sharma 2018-06-20 10:48:49 UTC
upstream fix:

https://review.gluster.org/#/c/20328/

Comment 15 Siddharth Sharma 2018-06-20 10:51:27 UTC
Created glusterfs tracking bugs for this issue:

Affects: epel-all [bug 1593238]

Comment 16 Siddharth Sharma 2018-06-21 06:08:46 UTC
Statement:

Red Hat Enterprise Linux 6, 7 are not affected by this flaw as it only affects glusterfs-server package. Red Hat Virtualization Hypervisor is not impacted by this flaw, as it uses gluster in a controlled manner via vdsm.


Note You need to log in before you can comment on or make changes to this bug.