A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1558721 | Issue Tracking Patch Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:1137 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:1136 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:1275 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:1524 | Vendor Advisory |
https://security.gentoo.org/glsa/201904-06 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-04-18 09:29
Updated : 2023-02-12 20:53
NVD link : CVE-2018-1088
Mitre link : CVE-2018-1088
JSON object : View
CWE
CWE-266
Incorrect Privilege Assignment
Products Affected
redhat
- virtualization
- gluster_storage
- virtualization_host
- enterprise_linux_server
opensuse
- leap
debian
- debian_linux