The fix for CVE-2018-1088 in glusterfs introduced a new flaw where auth.allow allows all clients to mount volumes.
Upstream Fix(es): https://review.gluster.org/#/c/19899/1..2
External References: https://access.redhat.com/articles/3422521
Mitigation: 1. Use TLS Authentication to authenticate gluster clients to limit access to gluster storage volumes 2. The gluster server should be on LAN, firewalled to trusted systems, and not reachable from public networks.
Created glusterfs tracking bugs for this issue: Affects: fedora-all [bug 1571448]
Statement: This vulnerability affects gluster servers that use 'auth.allow' to restrict access to gluster volumes. Gluster servers using TLS to authenticate gluster clients are not affected by this. This vulnerability allows any client to connect to any gluster volume which only uses auth.allow to restrict access. This issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6 and 7 because only gluster client is shipped in these products. CVE-2018-1112 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.
This issue has been addressed in the following products: Red Hat Gluster Storage 3.3 for RHEL 6 Native Client for RHEL 6 for Red Hat Storage Via RHSA-2018:1268 https://access.redhat.com/errata/RHSA-2018:1268
This issue has been addressed in the following products: Red Hat Gluster Storage 3.3 for RHEL 7 Native Client for RHEL 7 for Red Hat Storage Via RHSA-2018:1269 https://access.redhat.com/errata/RHSA-2018:1269