A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1136 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1137 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1275 - Vendor Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1524 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1558721 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201904-06 - Third Party Advisory |
Information
Published : 2018-04-18 16:29
Updated : 2024-11-21 03:59
NVD link : CVE-2018-1088
Mitre link : CVE-2018-1088
CVE.ORG link : CVE-2018-1088
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- virtualization
- gluster_storage
- virtualization_host
opensuse
- leap
debian
- debian_linux
CWE