ID REDHAT-RHSA-2018-2607.NASL Type nessus Reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-01-02T00:00:00
Description
Updated glusterfs packages that fix multiple security issues and bugs,
and add various enhancements are now available for Red Hat Gluster
Storage 3.4 on Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
GlusterFS is a key building block of Red Hat Gluster Storage. It is
based on a stackable user-space design and can deliver exceptional
performance for diverse workloads. GlusterFS aggregates various
storage servers over network interconnections into one large, parallel
network file system.
Security Fix(es) :
glusterfs: Unsanitized file names in debug/io-stats translator can
allow remote attackers to execute arbitrary code (CVE-2018-10904)
glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows
remote attackers to execute arbitrary code (CVE-2018-10907)
glusterfs: I/O to arbitrary devices on storage server
(CVE-2018-10923)
glusterfs: Device files can be created in arbitrary locations
(CVE-2018-10926)
glusterfs: File status information leak and denial of service
(CVE-2018-10927)
glusterfs: Improper resolution of symlinks allows for privilege
escalation (CVE-2018-10928)
glusterfs: Arbitrary file creation on storage server allows for
execution of arbitrary code (CVE-2018-10929)
glusterfs: Files can be renamed outside volume (CVE-2018-10930)
glusterfs: Improper deserialization in dict.c:dict_unserialize() can
allow attackers to read arbitrary memory (CVE-2018-10911)
glusterfs: remote denial of service of gluster volumes via
posix_get_file_contents function in posix-helpers.c (CVE-2018-10914)
glusterfs: Information Exposure in posix_get_file_contents function
in posix-helpers.c (CVE-2018-10913)
For more details about the security issue(s), including the impact, a
CVSS score, and other related information, refer to the CVE page(s)
listed in the References section.
Red Hat would like to thank Michael Hanselmann (hansmi.ch) for
reporting these issues.
Additional Changes :
These updated glusterfs packages include numerous bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Users are directed to the Red Hat Gluster Storage 3.4
Release Notes for information on the most significant of these
changes :
All users of Red Hat Gluster Storage are advised to upgrade to these
updated packages, which provide numerous bug fixes and enhancements.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2018:2607. The text
# itself is copyright (C) Red Hat, Inc.
#
include("compat.inc");
if (description)
{
script_id(117317);
script_version("1.6");
script_cvs_date("Date: 2019/10/24 15:35:45");
script_cve_id("CVE-2018-10904", "CVE-2018-10907", "CVE-2018-10911", "CVE-2018-10913", "CVE-2018-10914", "CVE-2018-10923", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10928", "CVE-2018-10929", "CVE-2018-10930");
script_xref(name:"RHSA", value:"2018:2607");
script_name(english:"RHEL 7 : Gluster Storage (RHSA-2018:2607)");
script_summary(english:"Checks the rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Red Hat host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"Updated glusterfs packages that fix multiple security issues and bugs,
and add various enhancements are now available for Red Hat Gluster
Storage 3.4 on Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
GlusterFS is a key building block of Red Hat Gluster Storage. It is
based on a stackable user-space design and can deliver exceptional
performance for diverse workloads. GlusterFS aggregates various
storage servers over network interconnections into one large, parallel
network file system.
Security Fix(es) :
* glusterfs: Unsanitized file names in debug/io-stats translator can
allow remote attackers to execute arbitrary code (CVE-2018-10904)
* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows
remote attackers to execute arbitrary code (CVE-2018-10907)
* glusterfs: I/O to arbitrary devices on storage server
(CVE-2018-10923)
* glusterfs: Device files can be created in arbitrary locations
(CVE-2018-10926)
* glusterfs: File status information leak and denial of service
(CVE-2018-10927)
* glusterfs: Improper resolution of symlinks allows for privilege
escalation (CVE-2018-10928)
* glusterfs: Arbitrary file creation on storage server allows for
execution of arbitrary code (CVE-2018-10929)
* glusterfs: Files can be renamed outside volume (CVE-2018-10930)
* glusterfs: Improper deserialization in dict.c:dict_unserialize() can
allow attackers to read arbitrary memory (CVE-2018-10911)
* glusterfs: remote denial of service of gluster volumes via
posix_get_file_contents function in posix-helpers.c (CVE-2018-10914)
* glusterfs: Information Exposure in posix_get_file_contents function
in posix-helpers.c (CVE-2018-10913)
For more details about the security issue(s), including the impact, a
CVSS score, and other related information, refer to the CVE page(s)
listed in the References section.
Red Hat would like to thank Michael Hanselmann (hansmi.ch) for
reporting these issues.
Additional Changes :
These updated glusterfs packages include numerous bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Users are directed to the Red Hat Gluster Storage 3.4
Release Notes for information on the most significant of these
changes :
https://access.redhat.com/site/documentation/en-US/red_hat_gluster_sto
rage/3.4/ html/3.4_release_notes/
All users of Red Hat Gluster Storage are advised to upgrade to these
updated packages, which provide numerous bug fixes and enhancements."
);
# https://access.redhat.com/site/documentation/en-US/red_hat_gluster_storage/
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?d6c2aef9"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/errata/RHSA-2018:2607"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10904"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10907"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10911"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10913"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10914"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10923"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10926"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10927"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10928"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10929"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2018-10930"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-api");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-api-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-cli");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-client-xlators");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-events");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-fuse");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-ganesha");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-geo-replication");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-libs");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-rdma");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-resource-agents");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:glusterfs-server");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:python2-gluster");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:redhat-release-server");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:redhat-storage-server");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:7");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/09/04");
script_set_attribute(attribute:"patch_publication_date", value:"2019/01/07");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/09/06");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Red Hat Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 7.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2018:2607";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (! (rpm_exists(release:"RHEL7", rpm:"glusterfs-3.12.2"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "Gluster Storage");
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-api-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-api-devel-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-cli-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-client-xlators-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-debuginfo-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-devel-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-events-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-fuse-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-ganesha-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-geo-replication-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-libs-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-rdma-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", reference:"glusterfs-resource-agents-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"glusterfs-server-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"python2-gluster-3.12.2-18.el7")) flag++;
if (rpm_check(release:"RHEL7", cpu:"x86_64", reference:"redhat-release-server-7.5-11.el7")) flag++;
if (rpm_check(release:"RHEL7", reference:"redhat-storage-server-3.4.0.0-1.el7")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get() + redhat_report_package_caveat()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "glusterfs / glusterfs-api / glusterfs-api-devel / glusterfs-cli / etc");
}
}
{"id": "REDHAT-RHSA-2018-2607.NASL", "bulletinFamily": "scanner", "title": "RHEL 7 : Gluster Storage (RHSA-2018:2607)", "description": "Updated glusterfs packages that fix multiple security issues and bugs,\nand add various enhancements are now available for Red Hat Gluster\nStorage 3.4 on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGlusterFS is a key building block of Red Hat Gluster Storage. It is\nbased on a stackable user-space design and can deliver exceptional\nperformance for diverse workloads. GlusterFS aggregates various\nstorage servers over network interconnections into one large, parallel\nnetwork file system.\n\nSecurity Fix(es) :\n\n* glusterfs: Unsanitized file names in debug/io-stats translator can\nallow remote attackers to execute arbitrary code (CVE-2018-10904)\n\n* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows\nremote attackers to execute arbitrary code (CVE-2018-10907)\n\n* glusterfs: I/O to arbitrary devices on storage server\n(CVE-2018-10923)\n\n* glusterfs: Device files can be created in arbitrary locations\n(CVE-2018-10926)\n\n* glusterfs: File status information leak and denial of service\n(CVE-2018-10927)\n\n* glusterfs: Improper resolution of symlinks allows for privilege\nescalation (CVE-2018-10928)\n\n* glusterfs: Arbitrary file creation on storage server allows for\nexecution of arbitrary code (CVE-2018-10929)\n\n* glusterfs: Files can be renamed outside volume (CVE-2018-10930)\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can\nallow attackers to read arbitrary memory (CVE-2018-10911)\n\n* glusterfs: remote denial of service of gluster volumes via\nposix_get_file_contents function in posix-helpers.c (CVE-2018-10914)\n\n* glusterfs: Information Exposure in posix_get_file_contents function\nin posix-helpers.c (CVE-2018-10913)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for\nreporting these issues.\n\nAdditional Changes :\n\nThese updated glusterfs packages include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Gluster Storage 3.4\nRelease Notes for information on the most significant of these \nchanges :\n\nhttps://access.redhat.com/site/documentation/en-US/red_hat_gluster_sto\nrage/3.4/ html/3.4_release_notes/\n\nAll users of Red Hat Gluster Storage are advised to upgrade to these\nupdated packages, which provide numerous bug fixes and enhancements.", "published": "2018-09-06T00:00:00", "modified": "2021-01-02T00:00:00", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "href": "https://www.tenable.com/plugins/nessus/117317", "reporter": "This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://access.redhat.com/security/cve/cve-2018-10914", "https://access.redhat.com/errata/RHSA-2018:2607", "https://access.redhat.com/security/cve/cve-2018-10929", "https://access.redhat.com/security/cve/cve-2018-10913", "https://access.redhat.com/security/cve/cve-2018-10907", "http://www.nessus.org/u?d6c2aef9", "https://access.redhat.com/security/cve/cve-2018-10927", "https://access.redhat.com/security/cve/cve-2018-10928", "https://access.redhat.com/security/cve/cve-2018-10930", "https://access.redhat.com/security/cve/cve-2018-10911", "https://access.redhat.com/security/cve/cve-2018-10926", "https://access.redhat.com/security/cve/cve-2018-10904", "https://access.redhat.com/security/cve/cve-2018-10923"], "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "type": "nessus", "lastseen": "2021-01-01T05:13:42", "edition": 22, "viewCount": 13, "enchantments": {"dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310891510", "OPENVAS:1361412562311220201525", "OPENVAS:1361412562311220201720", "OPENVAS:1361412562311220191192", "OPENVAS:1361412562310891565", "OPENVAS:1361412562310875121", "OPENVAS:1361412562310875052", "OPENVAS:1361412562310852995", "OPENVAS:1361412562311220191387", "OPENVAS:1361412562311220201103"]}, {"type": "fedora", "idList": ["FEDORA:CB9466012FDA", "FEDORA:9FE6860C01B7", "FEDORA:EF6D4605A2BA"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1565-1:4716E", "DEBIAN:DLA-1510-1:F06C5"]}, {"type": "redhat", "idList": ["RHSA-2018:2608", "RHSA-2018:2892", "RHSA-2018:3470", "RHSA-2018:3242", "RHSA-2018:2607"]}, {"type": "nessus", "idList": ["FEDORA_2018-A54270A213.NASL", "EULEROS_SA-2020-2347.NASL", "REDHAT-RHSA-2018-2608.NASL", "DEBIAN_DLA-1510.NASL", "EULEROS_SA-2020-1720.NASL", "FEDORA_2018-4E660226E7.NASL", "EULEROS_SA-2020-1525.NASL", "FEDORA_2018-9A4D7EC61E.NASL", "EULEROS_SA-2020-1103.NASL", "CENTOS_RHSA-2018-2607.NASL"]}, {"type": "centos", "idList": ["CESA-2018:2892", "CESA-2018:2607"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2020:0079-1"]}, {"type": "cve", "idList": ["CVE-2018-10907", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10928", "CVE-2018-10930", "CVE-2018-10927", "CVE-2018-10914", "CVE-2018-10913", "CVE-2018-10904", "CVE-2018-10926"]}, {"type": "gentoo", "idList": ["GLSA-201904-06"]}, {"type": "oraclelinux", "idList": ["ELSA-2018-2892", "ELSA-2018-3242"]}, {"type": "amazon", "idList": ["ALAS2-2018-1128"]}], "modified": "2021-01-01T05:13:42", "rev": 2}, "score": {"value": 7.2, "vector": "NONE", "modified": "2021-01-01T05:13:42", "rev": 2}, "vulnersScore": 7.2}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:2607. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(117317);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/10/24 15:35:45\");\n\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_xref(name:\"RHSA\", value:\"2018:2607\");\n\n script_name(english:\"RHEL 7 : Gluster Storage (RHSA-2018:2607)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated glusterfs packages that fix multiple security issues and bugs,\nand add various enhancements are now available for Red Hat Gluster\nStorage 3.4 on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGlusterFS is a key building block of Red Hat Gluster Storage. It is\nbased on a stackable user-space design and can deliver exceptional\nperformance for diverse workloads. GlusterFS aggregates various\nstorage servers over network interconnections into one large, parallel\nnetwork file system.\n\nSecurity Fix(es) :\n\n* glusterfs: Unsanitized file names in debug/io-stats translator can\nallow remote attackers to execute arbitrary code (CVE-2018-10904)\n\n* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows\nremote attackers to execute arbitrary code (CVE-2018-10907)\n\n* glusterfs: I/O to arbitrary devices on storage server\n(CVE-2018-10923)\n\n* glusterfs: Device files can be created in arbitrary locations\n(CVE-2018-10926)\n\n* glusterfs: File status information leak and denial of service\n(CVE-2018-10927)\n\n* glusterfs: Improper resolution of symlinks allows for privilege\nescalation (CVE-2018-10928)\n\n* glusterfs: Arbitrary file creation on storage server allows for\nexecution of arbitrary code (CVE-2018-10929)\n\n* glusterfs: Files can be renamed outside volume (CVE-2018-10930)\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can\nallow attackers to read arbitrary memory (CVE-2018-10911)\n\n* glusterfs: remote denial of service of gluster volumes via\nposix_get_file_contents function in posix-helpers.c (CVE-2018-10914)\n\n* glusterfs: Information Exposure in posix_get_file_contents function\nin posix-helpers.c (CVE-2018-10913)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for\nreporting these issues.\n\nAdditional Changes :\n\nThese updated glusterfs packages include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Gluster Storage 3.4\nRelease Notes for information on the most significant of these \nchanges :\n\nhttps://access.redhat.com/site/documentation/en-US/red_hat_gluster_sto\nrage/3.4/ html/3.4_release_notes/\n\nAll users of Red Hat Gluster Storage are advised to upgrade to these\nupdated packages, which provide numerous bug fixes and enhancements.\"\n );\n # https://access.redhat.com/site/documentation/en-US/red_hat_gluster_storage/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d6c2aef9\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:2607\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10911\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10913\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10914\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10923\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10926\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10928\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10929\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-10930\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-api-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-client-xlators\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-events\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-ganesha\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-geo-replication\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-rdma\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-resource-agents\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python2-gluster\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-release-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-storage-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/09/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:2607\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n\n if (! (rpm_exists(release:\"RHEL7\", rpm:\"glusterfs-3.12.2\"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Gluster Storage\");\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-api-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-api-devel-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-cli-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-client-xlators-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-debuginfo-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-devel-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-events-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-fuse-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-ganesha-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-geo-replication-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-libs-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-rdma-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"glusterfs-resource-agents-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"glusterfs-server-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python2-gluster-3.12.2-18.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"redhat-release-server-7.5-11.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"redhat-storage-server-3.4.0.0-1.el7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glusterfs / glusterfs-api / glusterfs-api-devel / glusterfs-cli / etc\");\n }\n}\n", "naslFamily": "Red Hat Local Security Checks", "pluginID": "117317", "cpe": ["p-cpe:/a:redhat:enterprise_linux:glusterfs-api-devel", "p-cpe:/a:redhat:enterprise_linux:glusterfs-client-xlators", "p-cpe:/a:redhat:enterprise_linux:glusterfs-fuse", "p-cpe:/a:redhat:enterprise_linux:glusterfs-api", "p-cpe:/a:redhat:enterprise_linux:glusterfs", "p-cpe:/a:redhat:enterprise_linux:python2-gluster", "p-cpe:/a:redhat:enterprise_linux:glusterfs-server", "p-cpe:/a:redhat:enterprise_linux:glusterfs-devel", "p-cpe:/a:redhat:enterprise_linux:glusterfs-debuginfo", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:glusterfs-geo-replication", "p-cpe:/a:redhat:enterprise_linux:glusterfs-ganesha", "p-cpe:/a:redhat:enterprise_linux:redhat-release-server", "p-cpe:/a:redhat:enterprise_linux:glusterfs-rdma", "p-cpe:/a:redhat:enterprise_linux:glusterfs-libs", "p-cpe:/a:redhat:enterprise_linux:glusterfs-events", "p-cpe:/a:redhat:enterprise_linux:glusterfs-cli", "p-cpe:/a:redhat:enterprise_linux:glusterfs-resource-agents", "p-cpe:/a:redhat:enterprise_linux:redhat-storage-server"], "scheme": null, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}}
{"openvas": [{"lastseen": "2019-05-29T18:33:02", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-09-12T00:00:00", "id": "OPENVAS:1361412562310875052", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875052", "type": "openvas", "title": "Fedora Update for glusterfs FEDORA-2018-4e660226e7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_4e660226e7_glusterfs_fc28.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for glusterfs FEDORA-2018-4e660226e7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875052\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-09-12 07:16:29 +0200 (Wed, 12 Sep 2018)\");\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\",\n \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\",\n \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for glusterfs FEDORA-2018-4e660226e7\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'glusterfs'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n script_tag(name:\"affected\", value:\"glusterfs on Fedora 28\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-4e660226e7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHXLLFM52HYSYUAEI2NOOLILBPULECYD\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"glusterfs\", rpm:\"glusterfs~4.1.4~1.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:33:10", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-10-03T00:00:00", "id": "OPENVAS:1361412562310875121", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310875121", "type": "openvas", "title": "Fedora Update for glusterfs FEDORA-2018-9a4d7ec61e", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_9a4d7ec61e_glusterfs_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for glusterfs FEDORA-2018-9a4d7ec61e\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.875121\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-10-03 17:02:10 +0530 (Wed, 03 Oct 2018)\");\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\",\n \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\",\n \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for glusterfs FEDORA-2018-9a4d7ec61e\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'glusterfs'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n script_tag(name:\"affected\", value:\"glusterfs on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-9a4d7ec61e\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7GBEZYJ34Y33Y5HQ3FZWECH6NWTE446V\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"glusterfs\", rpm:\"glusterfs~3.12.14~1.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-01-29T20:09:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "description": "Multiple security vulnerabilities were discovered in GlusterFS, a\nclustered file system. Buffer overflows and path traversal issues may\nlead to information disclosure, denial-of-service or the execution of\narbitrary code.\n\nTo resolve the security vulnerabilities the following limitations were\nmade in GlusterFS:\n\n - open, read, write on special files like char and block are no longer\npermitted\n\n - io-stat xlator can dump stat info only to /run/gluster directory", "modified": "2020-01-29T00:00:00", "published": "2018-09-20T00:00:00", "id": "OPENVAS:1361412562310891510", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891510", "type": "openvas", "title": "Debian LTS: Security Advisory for glusterfs (DLA-1510-1)", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891510\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\", \"CVE-2018-10914\",\n \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\",\n \"CVE-2018-10930\");\n script_name(\"Debian LTS: Security Advisory for glusterfs (DLA-1510-1)\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-09-20 00:00:00 +0200 (Thu, 20 Sep 2018)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_tag(name:\"affected\", value:\"glusterfs on Debian Linux\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n3.5.2-2+deb8u4.\n\nWe recommend that you upgrade your glusterfs packages.\");\n\n script_tag(name:\"summary\", value:\"Multiple security vulnerabilities were discovered in GlusterFS, a\nclustered file system. Buffer overflows and path traversal issues may\nlead to information disclosure, denial-of-service or the execution of\narbitrary code.\n\nTo resolve the security vulnerabilities the following limitations were\nmade in GlusterFS:\n\n - open, read, write on special files like char and block are no longer\npermitted\n\n - io-stat xlator can dump stat info only to /run/gluster directory\");\n\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"glusterfs-client\", ver:\"3.5.2-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"glusterfs-common\", ver:\"3.5.2-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"glusterfs-dbg\", ver:\"3.5.2-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"glusterfs-server\", ver:\"3.5.2-2+deb8u4\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T19:56:14", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10914"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-07-03T00:00:00", "published": "2020-07-03T00:00:00", "id": "OPENVAS:1361412562311220201720", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201720", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for glusterfs (EulerOS-SA-2020-1720)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1720\");\n script_version(\"2020-07-03T06:18:38+0000\");\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-03 06:18:38 +0000 (Fri, 03 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 06:18:38 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for glusterfs (EulerOS-SA-2020-1720)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-3\\.0\\.6\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1720\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1720\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'glusterfs' package(s) announced via the EulerOS-SA-2020-1720 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.(CVE-2018-10930)\n\nA flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.(CVE-2018-10929)\n\nA flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.(CVE-2018-10928)\n\nA flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.(CVE-2018-10927)\n\nA flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.(CVE-2018-10926)\n\nIt was found that glusterfs server does not properly sanitize file paths in the 'trusted.io-stats-dump' extended attribute which is used by the 'debug/io-stats' translator. An attacker can use this flaw to create files and execute arbitrary code. To exploit this, the attacker would require sufficient access to modify the extended attributes of files on a gluster volume.(CVE-2018-10904)\n\nIt was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.(CVE-2018-10907)\n\nAn information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.(CVE-2018-10913)\n\nIt was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.(CVE-2018-10914)\n\nIt was found that the 'mknod' call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.(CVE-2018-10923)\");\n\n script_tag(name:\"affected\", value:\"'glusterfs' package(s) on Huawei EulerOS Virtualization 3.0.6.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-3.0.6.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs\", rpm:\"glusterfs~3.8.4~54.15.h7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-api\", rpm:\"glusterfs-api~3.8.4~54.15.h7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-cli\", rpm:\"glusterfs-cli~3.8.4~54.15.h7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-client-xlators\", rpm:\"glusterfs-client-xlators~3.8.4~54.15.h7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-libs\", rpm:\"glusterfs-libs~3.8.4~54.15.h7\", rls:\"EULEROSVIRT-3.0.6.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-05-06T01:10:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10914"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-04-30T00:00:00", "published": "2020-04-30T00:00:00", "id": "OPENVAS:1361412562311220201525", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201525", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for glusterfs (EulerOS-SA-2020-1525)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1525\");\n script_version(\"2020-04-30T12:11:27+0000\");\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-04-30 12:11:27 +0000 (Thu, 30 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-04-30 12:11:27 +0000 (Thu, 30 Apr 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for glusterfs (EulerOS-SA-2020-1525)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRTARM64-3\\.0\\.2\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1525\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1525\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'glusterfs' package(s) announced via the EulerOS-SA-2020-1525 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.(CVE-2018-10930)\n\nA flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.(CVE-2018-10929)\n\nA flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.(CVE-2018-10928)\n\nA flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.(CVE-2018-10927)\n\nA flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.(CVE-2018-10926)\n\nIt was found that glusterfs server does not properly sanitize file paths in the 'trusted.io-stats-dump' extended attribute which is used by the 'debug/io-stats' translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.(CVE-2018-10904)\n\nIt was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.(CVE-2018-10907)\n\nAn information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.(CVE-2018-10913)\n\nIt was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.(CVE-2018-10914)\n\nIt was found that the 'mknod' call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.(CVE-2018-10923)\");\n\n script_tag(name:\"affected\", value:\"'glusterfs' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.2.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRTARM64-3.0.2.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs\", rpm:\"glusterfs~3.8.4~54.15.h7\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-api\", rpm:\"glusterfs-api~3.8.4~54.15.h7\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-client-xlators\", rpm:\"glusterfs-client-xlators~3.8.4~54.15.h7\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-libs\", rpm:\"glusterfs-libs~3.8.4~54.15.h7\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-02-26T16:45:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10914"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-02-24T00:00:00", "published": "2020-02-24T00:00:00", "id": "OPENVAS:1361412562311220201103", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220201103", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for glusterfs (EulerOS-SA-2020-1103)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2020.1103\");\n script_version(\"2020-02-24T09:04:53+0000\");\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-02-24 09:04:53 +0000 (Mon, 24 Feb 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-02-24 09:04:53 +0000 (Mon, 24 Feb 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for glusterfs (EulerOS-SA-2020-1103)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2020-1103\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1103\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'glusterfs' package(s) announced via the EulerOS-SA-2020-1103 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.(CVE-2018-10929)\n\nA flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.(CVE-2018-10927)\n\nA flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.(CVE-2018-10926)\n\nA flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.(CVE-2018-10930)\n\nA flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.(CVE-2018-10928)\n\nIt was found that glusterfs server does not properly sanitize file paths in the 'trusted.io-stats-dump' extended attribute which is used by the 'debug/io-stats' translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.(CVE-2018-10904)\n\nIt was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.(CVE-2018-10907)\n\nAn information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.(CVE-2018-10913)\n\nIt was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.(CVE-2018-10914)\n\nIt was found that the 'mknod' call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.(CVE-2018-10923)\");\n\n script_tag(name:\"affected\", value:\"'glusterfs' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs\", rpm:\"glusterfs~3.8.4~54.15.h6.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-api\", rpm:\"glusterfs-api~3.8.4~54.15.h6.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-client-xlators\", rpm:\"glusterfs-client-xlators~3.8.4~54.15.h6.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-fuse\", rpm:\"glusterfs-fuse~3.8.4~54.15.h6.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-libs\", rpm:\"glusterfs-libs~3.8.4~54.15.h6.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-rdma\", rpm:\"glusterfs-rdma~3.8.4~54.15.h6.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-01-31T16:30:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10924", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-1088", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-1112", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2020-01-27T00:00:00", "id": "OPENVAS:1361412562310852995", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852995", "type": "openvas", "title": "openSUSE: Security Advisory for glusterfs (openSUSE-SU-2020:0079_1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852995\");\n script_version(\"2020-01-31T08:04:39+0000\");\n script_cve_id(\"CVE-2018-1088\", \"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10924\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\", \"CVE-2018-1112\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:04:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-27 09:17:28 +0000 (Mon, 27 Jan 2020)\");\n script_name(\"openSUSE: Security Advisory for glusterfs (openSUSE-SU-2020:0079_1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.1\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2020:0079-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'glusterfs'\n package(s) announced via the openSUSE-SU-2020:0079-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for glusterfs fixes the following issues:\n\n glusterfs was update to release 3.12.15:\n\n * Fixed a number of bugs and security issues:\n\n - CVE-2018-1088, CVE-2018-1112 [boo#1090084], CVE-2018-10904\n [boo#1107018], CVE-2018-10907 [boo#1107019], CVE-2018-10911\n [boo#1107020], CVE-2018-10913 [boo#1107021], CVE-2018-10914\n [boo#1107022], CVE-2018-10923 [boo#1107023], CVE-2018-10924\n [boo#1107024], CVE-2018-10926 [boo#1107025], CVE-2018-10927\n [boo#1107026], CVE-2018-10928 [boo#1107027], CVE-2018-10928\n [boo#1107027], CVE-2018-10929 [boo#1107028], CVE-2018-10930\n [boo#1107029], boo#1105776 .\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2020-79=1\");\n\n script_tag(name:\"affected\", value:\"'glusterfs' package(s) on openSUSE Leap 15.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs\", rpm:\"glusterfs~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-debuginfo\", rpm:\"glusterfs-debuginfo~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-debugsource\", rpm:\"glusterfs-debugsource~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-devel\", rpm:\"glusterfs-devel~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgfapi0\", rpm:\"libgfapi0~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgfapi0-debuginfo\", rpm:\"libgfapi0-debuginfo~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgfchangelog0\", rpm:\"libgfchangelog0~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgfchangelog0-debuginfo\", rpm:\"libgfchangelog0-debuginfo~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgfdb0\", rpm:\"libgfdb0~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgfdb0-debuginfo\", rpm:\"libgfdb0-debuginfo~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgfrpc0\", rpm:\"libgfrpc0~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgfrpc0-debuginfo\", rpm:\"libgfrpc0-debuginfo~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgfxdr0\", rpm:\"libgfxdr0~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libgfxdr0-debuginfo\", rpm:\"libgfxdr0-debuginfo~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libglusterfs0\", rpm:\"libglusterfs0~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"libglusterfs0-debuginfo\", rpm:\"libglusterfs0-debuginfo~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-gluster\", rpm:\"python-gluster~3.12.15~lp151.3.3.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-29T20:06:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-14653", "CVE-2018-10930", "CVE-2018-14651", "CVE-2018-14652", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-14661", "CVE-2018-10929", "CVE-2018-10928", "CVE-2018-14659"], "description": "Multiple security vulnerabilities were discovered in GlusterFS, a\nclustered file system. Buffer overflows and path traversal issues may\nlead to information disclosure, denial-of-service or the execution of\narbitrary code.\n\nCVE-2018-14651\n\nIt was found that the fix for CVE-2018-10927, CVE-2018-10928,\nCVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete.\nA remote, authenticated attacker could use one of these flaws to\nexecute arbitrary code, create arbitrary files, or cause denial of\nservice on glusterfs server nodes via symlinks to relative paths.\n\nCVE-2018-14652\n\nThe Gluster file system is vulnerable to a buffer overflow in the\n", "modified": "2020-01-29T00:00:00", "published": "2018-11-06T00:00:00", "id": "OPENVAS:1361412562310891565", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891565", "type": "openvas", "title": "Debian LTS: Security Advisory for glusterfs (DLA-1565-1)", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891565\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\",\n \"CVE-2018-14651\", \"CVE-2018-14652\", \"CVE-2018-14653\", \"CVE-2018-14659\", \"CVE-2018-14661\");\n script_name(\"Debian LTS: Security Advisory for glusterfs (DLA-1565-1)\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-11-06 00:00:00 +0100 (Tue, 06 Nov 2018)\");\n script_tag(name:\"cvss_base\", value:\"6.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2018/11/msg00003.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_tag(name:\"affected\", value:\"glusterfs on Debian Linux\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n3.5.2-2+deb8u5.\n\nWe recommend that you upgrade your glusterfs packages.\");\n\n script_tag(name:\"summary\", value:\"Multiple security vulnerabilities were discovered in GlusterFS, a\nclustered file system. Buffer overflows and path traversal issues may\nlead to information disclosure, denial-of-service or the execution of\narbitrary code.\n\nCVE-2018-14651\n\nIt was found that the fix for CVE-2018-10927, CVE-2018-10928,\nCVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete.\nA remote, authenticated attacker could use one of these flaws to\nexecute arbitrary code, create arbitrary files, or cause denial of\nservice on glusterfs server nodes via symlinks to relative paths.\n\nCVE-2018-14652\n\nThe Gluster file system is vulnerable to a buffer overflow in the\n'features/index' translator via the code handling the\n'GF_XATTR_CLRLK_CMD' xattr in the 'pl_getxattr' function. A remote\nauthenticated attacker could exploit this on a mounted volume to\ncause a denial of service.\n\nCVE-2018-14653\n\nThe Gluster file system is vulnerable to a heap-based buffer\noverflow in the '__server_getspec' function via the 'gf_getspec_req'\nRPC message. A remote authenticated attacker could exploit this to\ncause a denial of service or other potential unspecified impact.\n\nCVE-2018-14659\n\nThe Gluster file system is vulnerable to a denial of service attack\nvia use of the 'GF_XATTR_IOSTATS_DUMP_KEY' xattr. A remote,\nauthenticated attacker could exploit this by mounting a Gluster\nvolume and repeatedly calling 'setxattr(2)' to trigger a state dump\nand create an arbitrary number of files in the server's runtime\ndirectory.\n\nCVE-2018-14661\n\nIt was found that usage of snprintf function in feature/locks\ntranslator of glusterfs server was vulnerable to a format string\nattack. A remote, authenticated attacker could use this flaw to\ncause remote denial of service.\");\n\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"glusterfs-client\", ver:\"3.5.2-2+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"glusterfs-common\", ver:\"3.5.2-2+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"glusterfs-dbg\", ver:\"3.5.2-2+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"glusterfs-server\", ver:\"3.5.2-2+deb8u5\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:33:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10911"], "description": "Check the version of glusterfs", "modified": "2019-03-08T00:00:00", "published": "2018-10-10T00:00:00", "id": "OPENVAS:1361412562310882960", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882960", "type": "openvas", "title": "CentOS Update for glusterfs CESA-2018:2892 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2018_2892_glusterfs_centos6.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for glusterfs CESA-2018:2892 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882960\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-10-10 06:50:45 +0200 (Wed, 10 Oct 2018)\");\n script_cve_id(\"CVE-2018-10911\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for glusterfs CESA-2018:2892 centos6\");\n script_tag(name:\"summary\", value:\"Check the version of glusterfs\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n script_tag(name:\"insight\", value:\"GlusterFS is a key building block of Red Hat\n Gluster Storage. It is based on a stackable user-space design and can deliver\n exceptional performance for diverse workloads. GlusterFS aggregates various\n storage servers over network interconnections into one large, parallel network\n file system.\n\nThe glusterfs packages have been upgraded to upstream version 3.12.2, which\nprovides a number of bug fixes over the previous version. (BZ#1594203)\n\nSecurity Fix(es):\n\n * glusterfs: Improper deserialization in dict.c:dict_unserialize() can\nallow attackers to read arbitrary memory (CVE-2018-10911)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting\nthis issue.\");\n script_tag(name:\"affected\", value:\"glusterfs on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"CESA\", value:\"2018:2892\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2018-October/023058.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"glusterfs\", rpm:\"glusterfs~3.12.2~18.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"glusterfs-api\", rpm:\"glusterfs-api~3.12.2~18.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"glusterfs-api-devel\", rpm:\"glusterfs-api-devel~3.12.2~18.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"glusterfs-cli\", rpm:\"glusterfs-cli~3.12.2~18.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"glusterfs-client-xlators\", rpm:\"glusterfs-client-xlators~3.12.2~18.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"glusterfs-devel\", rpm:\"glusterfs-devel~3.12.2~18.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"glusterfs-fuse\", rpm:\"glusterfs-fuse~3.12.2~18.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"glusterfs-libs\", rpm:\"glusterfs-libs~3.12.2~18.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"glusterfs-rdma\", rpm:\"glusterfs-rdma~3.12.2~18.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python2-gluster\", rpm:\"python2-gluster~3.12.2~18.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-01-27T18:33:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10911"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191192", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191192", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for glusterfs (EulerOS-SA-2019-1192)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1192\");\n script_version(\"2020-01-23T11:34:07+0000\");\n script_cve_id(\"CVE-2018-10911\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:34:07 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:34:07 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for glusterfs (EulerOS-SA-2019-1192)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-2\\.5\\.4\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1192\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1192\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'glusterfs' package(s) announced via the EulerOS-SA-2019-1192 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)\");\n\n script_tag(name:\"affected\", value:\"'glusterfs' package(s) on Huawei EulerOS Virtualization 2.5.4.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-2.5.4\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs\", rpm:\"glusterfs~3.8.4~54.15.h1.eulerosv2r7\", rls:\"EULEROSVIRT-2.5.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-api\", rpm:\"glusterfs-api~3.8.4~54.15.h1.eulerosv2r7\", rls:\"EULEROSVIRT-2.5.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-cli\", rpm:\"glusterfs-cli~3.8.4~54.15.h1.eulerosv2r7\", rls:\"EULEROSVIRT-2.5.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-client-xlators\", rpm:\"glusterfs-client-xlators~3.8.4~54.15.h1.eulerosv2r7\", rls:\"EULEROSVIRT-2.5.4\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"glusterfs-libs\", rpm:\"glusterfs-libs~3.8.4~54.15.h1.eulerosv2r7\", rls:\"EULEROSVIRT-2.5.4\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "redhat": [{"lastseen": "2019-08-13T18:46:22", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10904", "CVE-2018-10907", "CVE-2018-10911", "CVE-2018-10913", "CVE-2018-10914", "CVE-2018-10923", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10928", "CVE-2018-10929", "CVE-2018-10930"], "description": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code (CVE-2018-10904)\n\n* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code (CVE-2018-10907)\n\n* glusterfs: I/O to arbitrary devices on storage server (CVE-2018-10923)\n\n* glusterfs: Device files can be created in arbitrary locations (CVE-2018-10926)\n\n* glusterfs: File status information leak and denial of service (CVE-2018-10927)\n\n* glusterfs: Improper resolution of symlinks allows for privilege escalation (CVE-2018-10928)\n\n* glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code (CVE-2018-10929)\n\n* glusterfs: Files can be renamed outside volume (CVE-2018-10930)\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)\n\n* glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c (CVE-2018-10914)\n\n* glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c (CVE-2018-10913)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting these issues.\n\nAdditional Changes:\n\nThese updated glusterfs packages include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Gluster Storage 3.4 Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/site/documentation/en-US/red_hat_gluster_storage/3.4/html/3.4_release_notes/\n\nAll users of Red Hat Gluster Storage are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.", "modified": "2019-01-07T10:14:10", "published": "2018-09-04T10:13:53", "id": "RHSA-2018:2607", "href": "https://access.redhat.com/errata/RHSA-2018:2607", "type": "redhat", "title": "(RHSA-2018:2607) Important: Red Hat Gluster Storage security, bug fix, and enhancement update", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:46:46", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10904", "CVE-2018-10907", "CVE-2018-10911", "CVE-2018-10913", "CVE-2018-10914", "CVE-2018-10923", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10928", "CVE-2018-10929", "CVE-2018-10930"], "description": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code (CVE-2018-10904)\n\n* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code (CVE-2018-10907)\n\n* glusterfs: I/O to arbitrary devices on storage server (CVE-2018-10923)\n\n* glusterfs: Device files can be created in arbitrary locations (CVE-2018-10926)\n\n* glusterfs: File status information leak and denial of service (CVE-2018-10927)\n\n* glusterfs: Improper resolution of symlinks allows for privilege escalation (CVE-2018-10928)\n\n* glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code (CVE-2018-10929)\n\n* glusterfs: Files can be renamed outside volume (CVE-2018-10930)\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)\n\n* glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c (CVE-2018-10914)\n\n* glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c (CVE-2018-10913)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting these issues.\n\nAdditional changes:\n\nThese updated Red Hat Gluster Storage packages include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Gluster Storage 3.4 Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.4/html/3.4_release_notes/\n\nAll users of Red Hat Gluster Storage are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.", "modified": "2018-09-04T20:49:21", "published": "2018-09-04T10:13:58", "id": "RHSA-2018:2608", "href": "https://access.redhat.com/errata/RHSA-2018:2608", "type": "redhat", "title": "(RHSA-2018:2608) Important: Red Hat Gluster Storage security, bug fix, and enhancement update", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2019-12-11T13:32:56", "bulletinFamily": "unix", "cvelist": ["CVE-2018-1000805", "CVE-2018-10858", "CVE-2018-10873", "CVE-2018-10904", "CVE-2018-10907", "CVE-2018-10911", "CVE-2018-10913", "CVE-2018-10914", "CVE-2018-10923", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10928", "CVE-2018-10929", "CVE-2018-10930", "CVE-2018-14652", "CVE-2018-14653", "CVE-2018-14654", "CVE-2018-14659", "CVE-2018-14660", "CVE-2018-14661"], "description": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* spice: Missing check in demarshal.py:write_validate_array_item() allows for buffer overflow and denial of service (CVE-2018-10873)\n\n* glusterfs: Multiple flaws (CVE-2018-10904, CVE-2018-10907, CVE-2018-10923, CVE-2018-10926, CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, CVE-2018-10911, CVE-2018-10914, CVE-2018-14652, CVE-2018-14653, CVE-2018-14654, CVE-2018-14659, CVE-2018-14660, CVE-2018-14661, CVE-2018-10913)\n\n* samba: Insufficient input validation in libsmbclient (CVE-2018-10858)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting CVE-2018-10904, CVE-2018-10907, CVE-2018-10923, CVE-2018-10926, CVE-2018-10927, CVE-2018-10928, CVE-2018-10929, CVE-2018-10930, CVE-2018-10911, CVE-2018-10914, CVE-2018-14652, CVE-2018-14653, CVE-2018-14654, CVE-2018-14659, CVE-2018-14660, CVE-2018-14661, and CVE-2018-10913. The CVE-2018-10873 issue was discovered by Frediano Ziglio (Red Hat).\n\nBug Fix(es):\n\n* When upgrading Red Hat Virtualization Host (RHVH), imgbased fails to run garbage collection on previous layers, so new logical volumes are removed, and the boot entry points to a logical volume that was removed.\n\nIf the RHVH upgrade finishes successfully, the hypervisor boots successfully, even if garbage collection fails. (BZ#1632058)\n\n* During the upgrade process, when lvremove runs garbage collection, it prompts for user confirmation, causing the upgrade process to fail. Now the process uses \"lvremove --force\" when trying to remove logical volumes and does not fail even if garbage collection fails, and as a result, the upgrade process finishes successfully. (BZ#1632585)", "modified": "2018-12-14T07:29:39", "published": "2018-11-05T18:52:45", "id": "RHSA-2018:3470", "href": "https://access.redhat.com/errata/RHSA-2018:3470", "type": "redhat", "title": "(RHSA-2018:3470) Moderate: Red Hat Virtualization security and bug fix update", "cvss": {"score": 8.5, "vector": "AV:N/AC:L/Au:S/C:N/I:C/A:C"}}, {"lastseen": "2019-08-13T18:44:57", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10911"], "description": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nThe glusterfs packages have been upgraded to upstream version 3.12.2, which provides a number of bug fixes over the previous version. (BZ#1594203)\n\nSecurity Fix(es):\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue.", "modified": "2018-10-09T19:02:19", "published": "2018-10-09T18:48:14", "id": "RHSA-2018:2892", "href": "https://access.redhat.com/errata/RHSA-2018:2892", "type": "redhat", "title": "(RHSA-2018:2892) Moderate: glusterfs security, bug fix, and enhancement update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-08-13T18:46:18", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10911"], "description": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nThe following packages have been upgraded to a later upstream version: glusterfs (3.12.2). (BZ#1579734)\n\nSecurity Fix(es):\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.", "modified": "2018-10-30T09:21:52", "published": "2018-10-30T08:33:39", "id": "RHSA-2018:3242", "href": "https://access.redhat.com/errata/RHSA-2018:3242", "type": "redhat", "title": "(RHSA-2018:3242) Moderate: glusterfs security, bug fix, and enhancement update", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "debian": [{"lastseen": "2020-08-12T01:02:34", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "description": "Package : glusterfs\nVersion : 3.5.2-2+deb8u4\nCVE ID : CVE-2018-10904 CVE-2018-10907 CVE-2018-10911\n CVE-2018-10913 CVE-2018-10914 CVE-2018-10923\n CVE-2018-10926 CVE-2018-10927 CVE-2018-10928\n CVE-2018-10929 CVE-2018-10930\nDebian Bug : 909215\n\nMultiple security vulnerabilities were discovered in GlusterFS, a\nclustered file system. Buffer overflows and path traversal issues may\nlead to information disclosure, denial-of-service or the execution of\narbitrary code.\n\nTo resolve the security vulnerabilities the following limitations were\nmade in GlusterFS:\n\n - open,read,write on special files like char and block are no longer\n permitted\n - io-stat xlator can dump stat info only to /run/gluster directory\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n3.5.2-2+deb8u4.\n\nWe recommend that you upgrade your glusterfs packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 11, "modified": "2018-09-20T10:16:49", "published": "2018-09-20T10:16:49", "id": "DEBIAN:DLA-1510-1:F06C5", "href": "https://lists.debian.org/debian-lts-announce/2018/debian-lts-announce-201809/msg00021.html", "title": "[SECURITY] [DLA 1510-1] glusterfs security update", "type": "debian", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-08-12T01:02:59", "bulletinFamily": "unix", "cvelist": ["CVE-2018-14653", "CVE-2018-10930", "CVE-2018-14651", "CVE-2018-14652", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-14661", "CVE-2018-10929", "CVE-2018-10928", "CVE-2018-14659"], "description": "Package : glusterfs\nVersion : 3.5.2-2+deb8u5\nCVE ID : CVE-2018-14651 CVE-2018-14652 CVE-2018-14653\n CVE-2018-14659 CVE-2018-14661\n\nMultiple security vulnerabilities were discovered in GlusterFS, a\nclustered file system. Buffer overflows and path traversal issues may\nlead to information disclosure, denial-of-service or the execution of\narbitrary code.\n\nCVE-2018-14651\n\n It was found that the fix for CVE-2018-10927, CVE-2018-10928,\n CVE-2018-10929, CVE-2018-10930, and CVE-2018-10926 was incomplete.\n A remote, authenticated attacker could use one of these flaws to\n execute arbitrary code, create arbitrary files, or cause denial of\n service on glusterfs server nodes via symlinks to relative paths.\n\nCVE-2018-14652\n\n The Gluster file system is vulnerable to a buffer overflow in the\n 'features/index' translator via the code handling the\n 'GF_XATTR_CLRLK_CMD' xattr in the 'pl_getxattr' function. A remote\n authenticated attacker could exploit this on a mounted volume to\n cause a denial of service.\n\nCVE-2018-14653\n\n The Gluster file system is vulnerable to a heap-based buffer\n overflow in the '__server_getspec' function via the 'gf_getspec_req'\n RPC message. A remote authenticated attacker could exploit this to\n cause a denial of service or other potential unspecified impact.\n\nCVE-2018-14659\n\n The Gluster file system is vulnerable to a denial of service attack\n via use of the 'GF_XATTR_IOSTATS_DUMP_KEY' xattr. A remote,\n authenticated attacker could exploit this by mounting a Gluster\n volume and repeatedly calling 'setxattr(2)' to trigger a state dump\n and create an arbitrary number of files in the server's runtime\n directory.\n\nCVE-2018-14661\n\n It was found that usage of snprintf function in feature/locks\n translator of glusterfs server was vulnerable to a format string\n attack. A remote, authenticated attacker could use this flaw to\n cause remote denial of service.\n\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n3.5.2-2+deb8u5.\n\nWe recommend that you upgrade your glusterfs packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 10, "modified": "2018-11-05T18:02:46", "published": "2018-11-05T18:02:46", "id": "DEBIAN:DLA-1565-1:4716E", "href": "https://lists.debian.org/debian-lts-announce/2018/debian-lts-announce-201811/msg00003.html", "title": "[SECURITY] [DLA 1565-1] glusterfs security update", "type": "debian", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2019-12-20T18:27:44", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "description": "**CentOS Errata and Security Advisory** CESA-2018:2607\n\n\nGlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code (CVE-2018-10904)\n\n* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code (CVE-2018-10907)\n\n* glusterfs: I/O to arbitrary devices on storage server (CVE-2018-10923)\n\n* glusterfs: Device files can be created in arbitrary locations (CVE-2018-10926)\n\n* glusterfs: File status information leak and denial of service (CVE-2018-10927)\n\n* glusterfs: Improper resolution of symlinks allows for privilege escalation (CVE-2018-10928)\n\n* glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code (CVE-2018-10929)\n\n* glusterfs: Files can be renamed outside volume (CVE-2018-10930)\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)\n\n* glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c (CVE-2018-10914)\n\n* glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c (CVE-2018-10913)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting these issues.\n\nAdditional Changes:\n\nThese updated glusterfs packages include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Gluster Storage 3.4 Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/site/documentation/en-US/red_hat_gluster_storage/3.4/html/3.4_release_notes/\n\nAll users of Red Hat Gluster Storage are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2018-November/005411.html\n\n**Affected packages:**\nglusterfs\nglusterfs-api\nglusterfs-api-devel\nglusterfs-cli\nglusterfs-client-xlators\nglusterfs-devel\nglusterfs-fuse\nglusterfs-libs\nglusterfs-rdma\npython2-gluster\n\n**Upstream details at:**\n", "edition": 3, "modified": "2018-11-15T18:45:47", "published": "2018-11-15T18:45:47", "id": "CESA-2018:2607", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2018-November/005411.html", "title": "glusterfs, python2 security update", "type": "centos", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-12-08T03:38:01", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10911"], "description": "**CentOS Errata and Security Advisory** CESA-2018:2892\n\n\nGlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nThe glusterfs packages have been upgraded to upstream version 3.12.2, which provides a number of bug fixes over the previous version. (BZ#1594203)\n\nSecurity Fix(es):\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2018-October/035096.html\n\n**Affected packages:**\nglusterfs\nglusterfs-api\nglusterfs-api-devel\nglusterfs-cli\nglusterfs-client-xlators\nglusterfs-devel\nglusterfs-fuse\nglusterfs-libs\nglusterfs-rdma\npython2-gluster\n\n**Upstream details at:**\n", "edition": 5, "modified": "2018-10-09T20:21:55", "published": "2018-10-09T20:21:55", "id": "CESA-2018:2892", "href": "http://lists.centos.org/pipermail/centos-announce/2018-October/035096.html", "title": "glusterfs, python2 security update", "type": "centos", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "nessus": [{"lastseen": "2021-01-07T10:20:26", "description": "4.1.5 GA\n\n----\n\n4.1.4 GA Security Fix for CVE-2018-10904 Security Fix for\nCVE-2018-10907 Security Fix for CVE-2018-10911 Security Fix for\nCVE-2018-10913 Security Fix for CVE-2018-10914 Security Fix for\nCVE-2018-10923 Security Fix for CVE-2018-10926 Security Fix for\nCVE-2018-10927 Security Fix for CVE-2018-10928 Security Fix for\nCVE-2018-10929 Security Fix for CVE-2018-10930\n\n----\n\nmissing /run/gluster/metrics, see bz#1624006\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 11, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-01-03T00:00:00", "title": "Fedora 29 : glusterfs (2018-a54270a213)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "modified": "2019-01-03T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:29", "p-cpe:/a:fedoraproject:fedora:glusterfs"], "id": "FEDORA_2018-A54270A213.NASL", "href": "https://www.tenable.com/plugins/nessus/120672", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-a54270a213.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(120672);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_xref(name:\"FEDORA\", value:\"2018-a54270a213\");\n\n script_name(english:\"Fedora 29 : glusterfs (2018-a54270a213)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"4.1.5 GA\n\n----\n\n4.1.4 GA Security Fix for CVE-2018-10904 Security Fix for\nCVE-2018-10907 Security Fix for CVE-2018-10911 Security Fix for\nCVE-2018-10913 Security Fix for CVE-2018-10914 Security Fix for\nCVE-2018-10923 Security Fix for CVE-2018-10926 Security Fix for\nCVE-2018-10927 Security Fix for CVE-2018-10928 Security Fix for\nCVE-2018-10929 Security Fix for CVE-2018-10930\n\n----\n\nmissing /run/gluster/metrics, see bz#1624006\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-a54270a213\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected glusterfs package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:glusterfs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:29\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/10/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^29([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 29\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC29\", reference:\"glusterfs-4.1.5-1.fc29\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glusterfs\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2019-02-21T01:42:20", "description": "Updated glusterfs packages that fix multiple security issues, several bugs, and adds various enhancements are now available for Red Hat Gluster Storage 3.4 on Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nGlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es) :\n\n* glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code (CVE-2018-10904)\n\n* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code (CVE-2018-10907)\n\n* glusterfs: I/O to arbitrary devices on storage server (CVE-2018-10923)\n\n* glusterfs: Device files can be created in arbitrary locations (CVE-2018-10926)\n\n* glusterfs: File status information leak and denial of service (CVE-2018-10927)\n\n* glusterfs: Improper resolution of symlinks allows for privilege escalation (CVE-2018-10928)\n\n* glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code (CVE-2018-10929)\n\n* glusterfs: Files can be renamed outside volume (CVE-2018-10930)\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)\n\n* glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c (CVE-2018-10914)\n\n* glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c (CVE-2018-10913)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting these issues.\n\nAdditional changes :\n\nThese updated Red Hat Gluster Storage packages include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Gluster Storage 3.4 Release Notes for information on the most significant of these changes :\n\nhttps://access.redhat.com/documentation/en-us/red_hat_gluster_storage/ 3.4/html/ 3.4_release_notes/\n\nAll users of Red Hat Gluster Storage are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.\n\nDisabled on 2018/11/06. Detection of Gluster Storage Server on RHEL 6 is no longer possible due to changes in Gluster package versioning.", "edition": 6, "published": "2018-09-06T00:00:00", "title": "RHEL 6 : Gluster Storage (RHSA-2018:2608) (deprecated)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "modified": "2018-11-07T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:glusterfs-api-devel", "p-cpe:/a:redhat:enterprise_linux:glusterfs-client-xlators", "p-cpe:/a:redhat:enterprise_linux:glusterfs-fuse", "p-cpe:/a:redhat:enterprise_linux:glusterfs-api", "p-cpe:/a:redhat:enterprise_linux:glusterfs", "p-cpe:/a:redhat:enterprise_linux:python2-gluster", "p-cpe:/a:redhat:enterprise_linux:glusterfs-server", "p-cpe:/a:redhat:enterprise_linux:glusterfs-devel", "p-cpe:/a:redhat:enterprise_linux:glusterfs-debuginfo", "p-cpe:/a:redhat:enterprise_linux:glusterfs-geo-replication", "p-cpe:/a:redhat:enterprise_linux:glusterfs-ganesha", "p-cpe:/a:redhat:enterprise_linux:redhat-release-server", "p-cpe:/a:redhat:enterprise_linux:glusterfs-rdma", "p-cpe:/a:redhat:enterprise_linux:glusterfs-libs", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:glusterfs-events", "p-cpe:/a:redhat:enterprise_linux:glusterfs-cli", "p-cpe:/a:redhat:enterprise_linux:redhat-storage-server"], "id": "REDHAT-RHSA-2018-2608.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=117318", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:2608. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n# @DEPRECATED@\n#\n# Disabled on 2018/11/06. Detection of Gluster Storage Server on\n# RHEL 6 is no longer possible due to changes in Gluster package versioning. \n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(117318);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/11/07 8:03:12\");\n\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_xref(name:\"RHSA\", value:\"2018:2608\");\n\n script_name(english:\"RHEL 6 : Gluster Storage (RHSA-2018:2608) (deprecated)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"This plugin has been deprecated.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated glusterfs packages that fix multiple security issues, several\nbugs, and adds various enhancements are now available for Red Hat\nGluster Storage 3.4 on Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGlusterFS is a key building block of Red Hat Gluster Storage. It is\nbased on a stackable user-space design and can deliver exceptional\nperformance for diverse workloads. GlusterFS aggregates various\nstorage servers over network interconnections into one large, parallel\nnetwork file system.\n\nSecurity Fix(es) :\n\n* glusterfs: Unsanitized file names in debug/io-stats translator can\nallow remote attackers to execute arbitrary code (CVE-2018-10904)\n\n* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows\nremote attackers to execute arbitrary code (CVE-2018-10907)\n\n* glusterfs: I/O to arbitrary devices on storage server\n(CVE-2018-10923)\n\n* glusterfs: Device files can be created in arbitrary locations\n(CVE-2018-10926)\n\n* glusterfs: File status information leak and denial of service\n(CVE-2018-10927)\n\n* glusterfs: Improper resolution of symlinks allows for privilege\nescalation (CVE-2018-10928)\n\n* glusterfs: Arbitrary file creation on storage server allows for\nexecution of arbitrary code (CVE-2018-10929)\n\n* glusterfs: Files can be renamed outside volume (CVE-2018-10930)\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can\nallow attackers to read arbitrary memory (CVE-2018-10911)\n\n* glusterfs: remote denial of service of gluster volumes via\nposix_get_file_contents function in posix-helpers.c (CVE-2018-10914)\n\n* glusterfs: Information Exposure in posix_get_file_contents function\nin posix-helpers.c (CVE-2018-10913)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for\nreporting these issues.\n\nAdditional changes :\n\nThese updated Red Hat Gluster Storage packages include numerous bug\nfixes and enhancements. Space precludes documenting all of these\nchanges in this advisory. Users are directed to the Red Hat Gluster\nStorage 3.4 Release Notes for information on the most significant of\nthese changes :\n\nhttps://access.redhat.com/documentation/en-us/red_hat_gluster_storage/\n3.4/html/ 3.4_release_notes/\n\nAll users of Red Hat Gluster Storage are advised to upgrade to these\nupdated packages, which provide numerous bug fixes and enhancements.\n\nDisabled on 2018/11/06. Detection of Gluster Storage Server on RHEL 6\nis no longer possible due to changes in Gluster package versioning.\"\n );\n # https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.4/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?69f9b995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://rhn.redhat.com/errata/RHSA-2018-2608.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10904.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10907.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10911.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10913.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10914.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10923.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10926.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10927.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10928.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10929.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.redhat.com/security/data/cve/CVE-2018-10930.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"n/a.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-api-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-client-xlators\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-events\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-ganesha\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-geo-replication\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-rdma\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:glusterfs-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python2-gluster\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-release-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-storage-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/09/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/09/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\nexit(0, \"This plugin has been deprecated. Detection of Gluster Storage Server on RHEL 6 is no longer possible due to changes in Gluster package versioning.\");\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:2608\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n\n if (! (rpm_exists(release:\"RHEL6\", rpm:\"glusterfs-3.12.2\"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Gluster Storage\");\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-api-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-api-devel-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-cli-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-client-xlators-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-debuginfo-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-devel-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-events-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-fuse-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-ganesha-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-geo-replication-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-libs-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-rdma-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"glusterfs-server-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"python2-gluster-3.12.2-18.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"redhat-release-server-6Server-6.10.0.24.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"redhat-storage-server-3.4.0.0-1.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glusterfs / glusterfs-api / glusterfs-api-devel / glusterfs-cli / etc\");\n }\n}\n", "cvss": {"score": 6.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2021-01-01T01:29:14", "description": "Updated glusterfs packages that fix multiple security issues and bugs,\nand add various enhancements are now available for Red Hat Gluster\nStorage 3.4 on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGlusterFS is a key building block of Red Hat Gluster Storage. It is\nbased on a stackable user-space design and can deliver exceptional\nperformance for diverse workloads. GlusterFS aggregates various\nstorage servers over network interconnections into one large, parallel\nnetwork file system.\n\nSecurity Fix(es) :\n\n* glusterfs: Unsanitized file names in debug/io-stats translator can\nallow remote attackers to execute arbitrary code (CVE-2018-10904)\n\n* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows\nremote attackers to execute arbitrary code (CVE-2018-10907)\n\n* glusterfs: I/O to arbitrary devices on storage server\n(CVE-2018-10923)\n\n* glusterfs: Device files can be created in arbitrary locations\n(CVE-2018-10926)\n\n* glusterfs: File status information leak and denial of service\n(CVE-2018-10927)\n\n* glusterfs: Improper resolution of symlinks allows for privilege\nescalation (CVE-2018-10928)\n\n* glusterfs: Arbitrary file creation on storage server allows for\nexecution of arbitrary code (CVE-2018-10929)\n\n* glusterfs: Files can be renamed outside volume (CVE-2018-10930)\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can\nallow attackers to read arbitrary memory (CVE-2018-10911)\n\n* glusterfs: remote denial of service of gluster volumes via\nposix_get_file_contents function in posix-helpers.c (CVE-2018-10914)\n\n* glusterfs: Information Exposure in posix_get_file_contents function\nin posix-helpers.c (CVE-2018-10913)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for\nreporting these issues.\n\nAdditional Changes :\n\nThese updated glusterfs packages include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Gluster Storage 3.4\nRelease Notes for information on the most significant of these \nchanges :\n\nhttps://access.redhat.com/site/documentation/en-US/red_hat_gluster_sto\nrage/3.4/ html/3.4_release_notes/\n\nAll users of Red Hat Gluster Storage are advised to upgrade to these\nupdated packages, which provide numerous bug fixes and enhancements.", "edition": 19, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-11-16T00:00:00", "title": "CentOS 7 : glusterfs (CESA-2018:2607)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:centos:centos:glusterfs-cli", "p-cpe:/a:centos:centos:glusterfs-devel", "cpe:/o:centos:centos:7", "p-cpe:/a:centos:centos:python2-gluster", "p-cpe:/a:centos:centos:glusterfs", "p-cpe:/a:centos:centos:glusterfs-api", "p-cpe:/a:centos:centos:glusterfs-rdma", "p-cpe:/a:centos:centos:glusterfs-client-xlators", "p-cpe:/a:centos:centos:glusterfs-libs", "p-cpe:/a:centos:centos:glusterfs-fuse", "p-cpe:/a:centos:centos:glusterfs-api-devel"], "id": "CENTOS_RHSA-2018-2607.NASL", "href": "https://www.tenable.com/plugins/nessus/118982", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:2607 and \n# CentOS Errata and Security Advisory 2018:2607 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(118982);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/12/31\");\n\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_xref(name:\"RHSA\", value:\"2018:2607\");\n\n script_name(english:\"CentOS 7 : glusterfs (CESA-2018:2607)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated glusterfs packages that fix multiple security issues and bugs,\nand add various enhancements are now available for Red Hat Gluster\nStorage 3.4 on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nGlusterFS is a key building block of Red Hat Gluster Storage. It is\nbased on a stackable user-space design and can deliver exceptional\nperformance for diverse workloads. GlusterFS aggregates various\nstorage servers over network interconnections into one large, parallel\nnetwork file system.\n\nSecurity Fix(es) :\n\n* glusterfs: Unsanitized file names in debug/io-stats translator can\nallow remote attackers to execute arbitrary code (CVE-2018-10904)\n\n* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows\nremote attackers to execute arbitrary code (CVE-2018-10907)\n\n* glusterfs: I/O to arbitrary devices on storage server\n(CVE-2018-10923)\n\n* glusterfs: Device files can be created in arbitrary locations\n(CVE-2018-10926)\n\n* glusterfs: File status information leak and denial of service\n(CVE-2018-10927)\n\n* glusterfs: Improper resolution of symlinks allows for privilege\nescalation (CVE-2018-10928)\n\n* glusterfs: Arbitrary file creation on storage server allows for\nexecution of arbitrary code (CVE-2018-10929)\n\n* glusterfs: Files can be renamed outside volume (CVE-2018-10930)\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can\nallow attackers to read arbitrary memory (CVE-2018-10911)\n\n* glusterfs: remote denial of service of gluster volumes via\nposix_get_file_contents function in posix-helpers.c (CVE-2018-10914)\n\n* glusterfs: Information Exposure in posix_get_file_contents function\nin posix-helpers.c (CVE-2018-10913)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for\nreporting these issues.\n\nAdditional Changes :\n\nThese updated glusterfs packages include numerous bug fixes and\nenhancements. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Gluster Storage 3.4\nRelease Notes for information on the most significant of these \nchanges :\n\nhttps://access.redhat.com/site/documentation/en-US/red_hat_gluster_sto\nrage/3.4/ html/3.4_release_notes/\n\nAll users of Red Hat Gluster Storage are advised to upgrade to these\nupdated packages, which provide numerous bug fixes and enhancements.\"\n );\n # https://lists.centos.org/pipermail/centos-cr-announce/2018-November/005411.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?12b2bbf4\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected glusterfs packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-10904\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glusterfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glusterfs-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glusterfs-api-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glusterfs-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glusterfs-client-xlators\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glusterfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glusterfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glusterfs-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glusterfs-rdma\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:python2-gluster\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 7.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"glusterfs-3.12.2-18.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"glusterfs-api-3.12.2-18.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"glusterfs-api-devel-3.12.2-18.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"glusterfs-cli-3.12.2-18.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"glusterfs-client-xlators-3.12.2-18.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"glusterfs-devel-3.12.2-18.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"glusterfs-fuse-3.12.2-18.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"glusterfs-libs-3.12.2-18.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"glusterfs-rdma-3.12.2-18.el7\")) flag++;\nif (rpm_check(release:\"CentOS-7\", cpu:\"x86_64\", reference:\"python2-gluster-3.12.2-18.el7\")) flag++;\n\n\nif (flag)\n{\n cr_plugin_caveat = '\\n' +\n 'NOTE: The security advisory associated with this vulnerability has a\\n' +\n 'fixed package version that may only be available in the continuous\\n' +\n 'release (CR) repository for CentOS, until it is present in the next\\n' +\n 'point release of CentOS.\\n\\n' +\n\n 'If an equal or higher package level does not exist in the baseline\\n' +\n 'repository for your major version of CentOS, then updates from the CR\\n' +\n 'repository will need to be applied in order to address the\\n' +\n 'vulnerability.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + cr_plugin_caveat\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glusterfs / glusterfs-api / glusterfs-api-devel / glusterfs-cli / etc\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:20:01", "description": "3.12.14 GA Security Fix for CVE-2018-10904 Security Fix for\nCVE-2018-10907 Security Fix for CVE-2018-10911 Security Fix for\nCVE-2018-10913 Security Fix for CVE-2018-10914 Security Fix for\nCVE-2018-10923 Security Fix for CVE-2018-10926 Security Fix for\nCVE-2018-10927 Security Fix for CVE-2018-10928 Security Fix for\nCVE-2018-10929 Security Fix for CVE-2018-10930\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 16, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-10-01T00:00:00", "title": "Fedora 27 : glusterfs (2018-9a4d7ec61e)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "modified": "2018-10-01T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:27", "p-cpe:/a:fedoraproject:fedora:glusterfs"], "id": "FEDORA_2018-9A4D7EC61E.NASL", "href": "https://www.tenable.com/plugins/nessus/117841", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-9a4d7ec61e.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(117841);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_xref(name:\"FEDORA\", value:\"2018-9a4d7ec61e\");\n\n script_name(english:\"Fedora 27 : glusterfs (2018-9a4d7ec61e)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"3.12.14 GA Security Fix for CVE-2018-10904 Security Fix for\nCVE-2018-10907 Security Fix for CVE-2018-10911 Security Fix for\nCVE-2018-10913 Security Fix for CVE-2018-10914 Security Fix for\nCVE-2018-10923 Security Fix for CVE-2018-10926 Security Fix for\nCVE-2018-10927 Security Fix for CVE-2018-10928 Security Fix for\nCVE-2018-10929 Security Fix for CVE-2018-10930\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-9a4d7ec61e\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected glusterfs package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:glusterfs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:27\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/09/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/10/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^27([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 27\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC27\", reference:\"glusterfs-3.12.14-1.fc27\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glusterfs\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-01-12T09:39:51", "description": "Multiple security vulnerabilities were discovered in GlusterFS, a\nclustered file system. Buffer overflows and path traversal issues may\nlead to information disclosure, denial of service or the execution of\narbitrary code.\n\nTo resolve the security vulnerabilities the following limitations were\nmade in GlusterFS :\n\n - open,read,write on special files like char and block are\n no longer permitted\n\n - io-stat xlator can dump stat info only to /run/gluster\n directory\n\nFor Debian 8 'Jessie', these problems have been fixed in version\n3.5.2-2+deb8u4.\n\nWe recommend that you upgrade your glusterfs packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.", "edition": 20, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-09-21T00:00:00", "title": "Debian DLA-1510-1 : glusterfs security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "modified": "2018-09-21T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:glusterfs-server", "cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:glusterfs-common", "p-cpe:/a:debian:debian_linux:glusterfs-dbg", "p-cpe:/a:debian:debian_linux:glusterfs-client"], "id": "DEBIAN_DLA-1510.NASL", "href": "https://www.tenable.com/plugins/nessus/117618", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-1510-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(117618);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n\n script_name(english:\"Debian DLA-1510-1 : glusterfs security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Multiple security vulnerabilities were discovered in GlusterFS, a\nclustered file system. Buffer overflows and path traversal issues may\nlead to information disclosure, denial of service or the execution of\narbitrary code.\n\nTo resolve the security vulnerabilities the following limitations were\nmade in GlusterFS :\n\n - open,read,write on special files like char and block are\n no longer permitted\n\n - io-stat xlator can dump stat info only to /run/gluster\n directory\n\nFor Debian 8 'Jessie', these problems have been fixed in version\n3.5.2-2+deb8u4.\n\nWe recommend that you upgrade your glusterfs packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2018/09/msg00021.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/glusterfs\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:glusterfs-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:glusterfs-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:glusterfs-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:glusterfs-server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/09/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/09/21\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"glusterfs-client\", reference:\"3.5.2-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"glusterfs-common\", reference:\"3.5.2-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"glusterfs-dbg\", reference:\"3.5.2-2+deb8u4\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"glusterfs-server\", reference:\"3.5.2-2+deb8u4\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:18:05", "description": "4.1.4 GA Security Fix for CVE-2018-10904 Security Fix for\nCVE-2018-10907 Security Fix for CVE-2018-10911 Security Fix for\nCVE-2018-10913 Security Fix for CVE-2018-10914 Security Fix for\nCVE-2018-10923 Security Fix for CVE-2018-10926 Security Fix for\nCVE-2018-10927 Security Fix for CVE-2018-10928 Security Fix for\nCVE-2018-10929 Security Fix for CVE-2018-10930\n\n----\n\nmissing /run/gluster/metrics, see bz#1624006\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 11, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-01-03T00:00:00", "title": "Fedora 28 : glusterfs (2018-4e660226e7)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "modified": "2019-01-03T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:glusterfs", "cpe:/o:fedoraproject:fedora:28"], "id": "FEDORA_2018-4E660226E7.NASL", "href": "https://www.tenable.com/plugins/nessus/120410", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2018-4e660226e7.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(120410);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2018-10904\", \"CVE-2018-10907\", \"CVE-2018-10911\", \"CVE-2018-10913\", \"CVE-2018-10914\", \"CVE-2018-10923\", \"CVE-2018-10926\", \"CVE-2018-10927\", \"CVE-2018-10928\", \"CVE-2018-10929\", \"CVE-2018-10930\");\n script_xref(name:\"FEDORA\", value:\"2018-4e660226e7\");\n\n script_name(english:\"Fedora 28 : glusterfs (2018-4e660226e7)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"4.1.4 GA Security Fix for CVE-2018-10904 Security Fix for\nCVE-2018-10907 Security Fix for CVE-2018-10911 Security Fix for\nCVE-2018-10913 Security Fix for CVE-2018-10914 Security Fix for\nCVE-2018-10923 Security Fix for CVE-2018-10926 Security Fix for\nCVE-2018-10927 Security Fix for CVE-2018-10928 Security Fix for\nCVE-2018-10929 Security Fix for CVE-2018-10930\n\n----\n\nmissing /run/gluster/metrics, see bz#1624006\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2018-4e660226e7\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected glusterfs package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:glusterfs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/09/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/09/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"glusterfs-4.1.4-1.fc28\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glusterfs\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T09:04:07", "description": "According to the versions of the glusterfs packages installed, the\nEulerOS Virtualization for ARM 64 installation on the remote host is\naffected by the following vulnerabilities :\n\n - A flaw was found in RPC request using gfs3_rename_req\n in glusterfs server. An authenticated attacker could\n use this flaw to write to a destination outside the\n gluster volume.(CVE-2018-10930)\n\n - A flaw was found in RPC request using gfs2_create_req\n in glusterfs server. An authenticated attacker could\n use this flaw to create arbitrary files and execute\n arbitrary code on glusterfs server\n nodes.(CVE-2018-10929)\n\n - A flaw was found in RPC request using gfs3_symlink_req\n in glusterfs server which allows symlink destinations\n to point to file paths outside of the gluster volume.\n An authenticated attacker could use this flaw to create\n arbitrary symlinks pointing anywhere on the server and\n execute arbitrary code on glusterfs server\n nodes.(CVE-2018-10928)\n\n - A flaw was found in RPC request using gfs3_lookup_req\n in glusterfs server. An authenticated attacker could\n use this flaw to leak information and execute remote\n denial of service by crashing gluster brick\n process.(CVE-2018-10927)\n\n - A flaw was found in RPC request using gfs3_mknod_req\n supported by glusterfs server. An authenticated\n attacker could use this flaw to write files to an\n arbitrary location via path traversal and execute\n arbitrary code on a glusterfs server\n node.(CVE-2018-10926)\n\n - It was found that glusterfs server does not properly\n sanitize file paths in the 'trusted.io-stats-dump'\n extended attribute which is used by the\n 'debug/io-stats' translator. Attacker can use this flaw\n to create files and execute arbitrary code. To exploit\n this attacker would require sufficient access to modify\n the extended attributes of files on a gluster\n volume.(CVE-2018-10904)\n\n - It was found that glusterfs server is vulnerable to\n multiple stack based buffer overflows due to functions\n in server-rpc-fopc.c allocating fixed size buffers\n using 'alloca(3)'. An authenticated attacker could\n exploit this by mounting a gluster volume and sending a\n string longer that the fixed buffer size to cause crash\n or potential code execution.(CVE-2018-10907)\n\n - An information disclosure vulnerability was discovered\n in glusterfs server. An attacker could issue a xattr\n request via glusterfs FUSE to determine the existence\n of any file.(CVE-2018-10913)\n\n - It was found that an attacker could issue a xattr\n request via glusterfs FUSE to cause gluster brick\n process to crash which will result in a remote denial\n of service. If gluster multiplexing is enabled this\n will result in a crash of multiple bricks and gluster\n volumes.(CVE-2018-10914)\n\n - It was found that the 'mknod' call derived from\n mknod(2) can create files pointing to devices on a\n glusterfs server node. An authenticated attacker could\n use this to create an arbitrary device and read data\n from any device attached to the glusterfs server\n node.(CVE-2018-10923)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 5, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-05-01T00:00:00", "title": "EulerOS Virtualization for ARM 64 3.0.2.0 : glusterfs (EulerOS-SA-2020-1525)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10914"], "modified": "2020-05-01T00:00:00", "cpe": ["cpe:/o:huawei:euleros:uvp:3.0.2.0", "p-cpe:/a:huawei:euleros:glusterfs-client-xlators", "p-cpe:/a:huawei:euleros:glusterfs-api", "p-cpe:/a:huawei:euleros:glusterfs-libs", "p-cpe:/a:huawei:euleros:glusterfs"], "id": "EULEROS_SA-2020-1525.NASL", "href": "https://www.tenable.com/plugins/nessus/136228", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(136228);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-10904\",\n \"CVE-2018-10907\",\n \"CVE-2018-10913\",\n \"CVE-2018-10914\",\n \"CVE-2018-10923\",\n \"CVE-2018-10926\",\n \"CVE-2018-10927\",\n \"CVE-2018-10928\",\n \"CVE-2018-10929\",\n \"CVE-2018-10930\"\n );\n\n script_name(english:\"EulerOS Virtualization for ARM 64 3.0.2.0 : glusterfs (EulerOS-SA-2020-1525)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization for ARM 64 host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the glusterfs packages installed, the\nEulerOS Virtualization for ARM 64 installation on the remote host is\naffected by the following vulnerabilities :\n\n - A flaw was found in RPC request using gfs3_rename_req\n in glusterfs server. An authenticated attacker could\n use this flaw to write to a destination outside the\n gluster volume.(CVE-2018-10930)\n\n - A flaw was found in RPC request using gfs2_create_req\n in glusterfs server. An authenticated attacker could\n use this flaw to create arbitrary files and execute\n arbitrary code on glusterfs server\n nodes.(CVE-2018-10929)\n\n - A flaw was found in RPC request using gfs3_symlink_req\n in glusterfs server which allows symlink destinations\n to point to file paths outside of the gluster volume.\n An authenticated attacker could use this flaw to create\n arbitrary symlinks pointing anywhere on the server and\n execute arbitrary code on glusterfs server\n nodes.(CVE-2018-10928)\n\n - A flaw was found in RPC request using gfs3_lookup_req\n in glusterfs server. An authenticated attacker could\n use this flaw to leak information and execute remote\n denial of service by crashing gluster brick\n process.(CVE-2018-10927)\n\n - A flaw was found in RPC request using gfs3_mknod_req\n supported by glusterfs server. An authenticated\n attacker could use this flaw to write files to an\n arbitrary location via path traversal and execute\n arbitrary code on a glusterfs server\n node.(CVE-2018-10926)\n\n - It was found that glusterfs server does not properly\n sanitize file paths in the 'trusted.io-stats-dump'\n extended attribute which is used by the\n 'debug/io-stats' translator. Attacker can use this flaw\n to create files and execute arbitrary code. To exploit\n this attacker would require sufficient access to modify\n the extended attributes of files on a gluster\n volume.(CVE-2018-10904)\n\n - It was found that glusterfs server is vulnerable to\n multiple stack based buffer overflows due to functions\n in server-rpc-fopc.c allocating fixed size buffers\n using 'alloca(3)'. An authenticated attacker could\n exploit this by mounting a gluster volume and sending a\n string longer that the fixed buffer size to cause crash\n or potential code execution.(CVE-2018-10907)\n\n - An information disclosure vulnerability was discovered\n in glusterfs server. An attacker could issue a xattr\n request via glusterfs FUSE to determine the existence\n of any file.(CVE-2018-10913)\n\n - It was found that an attacker could issue a xattr\n request via glusterfs FUSE to cause gluster brick\n process to crash which will result in a remote denial\n of service. If gluster multiplexing is enabled this\n will result in a crash of multiple bricks and gluster\n volumes.(CVE-2018-10914)\n\n - It was found that the 'mknod' call derived from\n mknod(2) can create files pointing to devices on a\n glusterfs server node. An authenticated attacker could\n use this to create an arbitrary device and read data\n from any device attached to the glusterfs server\n node.(CVE-2018-10923)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1525\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?b4bb456c\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected glusterfs packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/04/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-client-xlators\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.2.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.2.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"glusterfs-3.8.4-54.15.h7\",\n \"glusterfs-api-3.8.4-54.15.h7\",\n \"glusterfs-client-xlators-3.8.4-54.15.h7\",\n \"glusterfs-libs-3.8.4-54.15.h7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glusterfs\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T09:05:05", "description": "According to the versions of the glusterfs packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - A flaw was found in RPC request using gfs3_rename_req\n in glusterfs server. An authenticated attacker could\n use this flaw to write to a destination outside the\n gluster volume.(CVE-2018-10930)\n\n - A flaw was found in RPC request using gfs2_create_req\n in glusterfs server. An authenticated attacker could\n use this flaw to create arbitrary files and execute\n arbitrary code on glusterfs server\n nodes.(CVE-2018-10929)\n\n - A flaw was found in RPC request using gfs3_symlink_req\n in glusterfs server which allows symlink destinations\n to point to file paths outside of the gluster volume.\n An authenticated attacker could use this flaw to create\n arbitrary symlinks pointing anywhere on the server and\n execute arbitrary code on glusterfs server\n nodes.(CVE-2018-10928)\n\n - A flaw was found in RPC request using gfs3_lookup_req\n in glusterfs server. An authenticated attacker could\n use this flaw to leak information and execute remote\n denial of service by crashing gluster brick\n process.(CVE-2018-10927)\n\n - A flaw was found in RPC request using gfs3_mknod_req\n supported by glusterfs server. An authenticated\n attacker could use this flaw to write files to an\n arbitrary location via path traversal and execute\n arbitrary code on a glusterfs server\n node.(CVE-2018-10926)\n\n - It was found that glusterfs server does not properly\n sanitize file paths in the 'trusted.io-stats-dump'\n extended attribute which is used by the\n 'debug/io-stats' translator. An attacker can use this\n flaw to create files and execute arbitrary code. To\n exploit this, the attacker would require sufficient\n access to modify the extended attributes of files on a\n gluster volume.(CVE-2018-10904)\n\n - It was found that glusterfs server is vulnerable to\n mulitple stack based buffer overflows due to functions\n in server-rpc-fopc.c allocating fixed size buffers\n using 'alloca(3)'. An authenticated attacker could\n exploit this by mounting a gluster volume and sending a\n string longer that the fixed buffer size to cause crash\n or potential code execution.(CVE-2018-10907)\n\n - An information disclosure vulnerability was discovered\n in glusterfs server. An attacker could issue a xattr\n request via glusterfs FUSE to determine the existence\n of any file.(CVE-2018-10913)\n\n - It was found that an attacker could issue a xattr\n request via glusterfs FUSE to cause gluster brick\n process to crash which will result in a remote denial\n of service. If gluster multiplexing is enabled this\n will result in a crash of multiple bricks and gluster\n volumes.(CVE-2018-10914)\n\n - It was found that the 'mknod' call derived from\n mknod(2) can create files pointing to devices on a\n glusterfs server node. An authenticated attacker could\n use this to create an arbitrary device and read data\n from any device attached to the glusterfs server\n node.(CVE-2018-10923)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 5, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-01T00:00:00", "title": "EulerOS Virtualization 3.0.6.0 : glusterfs (EulerOS-SA-2020-1720)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10914"], "modified": "2020-07-01T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:glusterfs-client-xlators", "cpe:/o:huawei:euleros:uvp:3.0.6.0", "p-cpe:/a:huawei:euleros:glusterfs-cli", "p-cpe:/a:huawei:euleros:glusterfs-api", "p-cpe:/a:huawei:euleros:glusterfs-libs", "p-cpe:/a:huawei:euleros:glusterfs"], "id": "EULEROS_SA-2020-1720.NASL", "href": "https://www.tenable.com/plugins/nessus/137939", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(137939);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-10904\",\n \"CVE-2018-10907\",\n \"CVE-2018-10913\",\n \"CVE-2018-10914\",\n \"CVE-2018-10923\",\n \"CVE-2018-10926\",\n \"CVE-2018-10927\",\n \"CVE-2018-10928\",\n \"CVE-2018-10929\",\n \"CVE-2018-10930\"\n );\n\n script_name(english:\"EulerOS Virtualization 3.0.6.0 : glusterfs (EulerOS-SA-2020-1720)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the glusterfs packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - A flaw was found in RPC request using gfs3_rename_req\n in glusterfs server. An authenticated attacker could\n use this flaw to write to a destination outside the\n gluster volume.(CVE-2018-10930)\n\n - A flaw was found in RPC request using gfs2_create_req\n in glusterfs server. An authenticated attacker could\n use this flaw to create arbitrary files and execute\n arbitrary code on glusterfs server\n nodes.(CVE-2018-10929)\n\n - A flaw was found in RPC request using gfs3_symlink_req\n in glusterfs server which allows symlink destinations\n to point to file paths outside of the gluster volume.\n An authenticated attacker could use this flaw to create\n arbitrary symlinks pointing anywhere on the server and\n execute arbitrary code on glusterfs server\n nodes.(CVE-2018-10928)\n\n - A flaw was found in RPC request using gfs3_lookup_req\n in glusterfs server. An authenticated attacker could\n use this flaw to leak information and execute remote\n denial of service by crashing gluster brick\n process.(CVE-2018-10927)\n\n - A flaw was found in RPC request using gfs3_mknod_req\n supported by glusterfs server. An authenticated\n attacker could use this flaw to write files to an\n arbitrary location via path traversal and execute\n arbitrary code on a glusterfs server\n node.(CVE-2018-10926)\n\n - It was found that glusterfs server does not properly\n sanitize file paths in the 'trusted.io-stats-dump'\n extended attribute which is used by the\n 'debug/io-stats' translator. An attacker can use this\n flaw to create files and execute arbitrary code. To\n exploit this, the attacker would require sufficient\n access to modify the extended attributes of files on a\n gluster volume.(CVE-2018-10904)\n\n - It was found that glusterfs server is vulnerable to\n mulitple stack based buffer overflows due to functions\n in server-rpc-fopc.c allocating fixed size buffers\n using 'alloca(3)'. An authenticated attacker could\n exploit this by mounting a gluster volume and sending a\n string longer that the fixed buffer size to cause crash\n or potential code execution.(CVE-2018-10907)\n\n - An information disclosure vulnerability was discovered\n in glusterfs server. An attacker could issue a xattr\n request via glusterfs FUSE to determine the existence\n of any file.(CVE-2018-10913)\n\n - It was found that an attacker could issue a xattr\n request via glusterfs FUSE to cause gluster brick\n process to crash which will result in a remote denial\n of service. If gluster multiplexing is enabled this\n will result in a crash of multiple bricks and gluster\n volumes.(CVE-2018-10914)\n\n - It was found that the 'mknod' call derived from\n mknod(2) can create files pointing to devices on a\n glusterfs server node. An authenticated attacker could\n use this to create an arbitrary device and read data\n from any device attached to the glusterfs server\n node.(CVE-2018-10923)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1720\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?830c92dd\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected glusterfs packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-client-xlators\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.6.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.6.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.6.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"glusterfs-3.8.4-54.15.h7\",\n \"glusterfs-api-3.8.4-54.15.h7\",\n \"glusterfs-cli-3.8.4-54.15.h7\",\n \"glusterfs-client-xlators-3.8.4-54.15.h7\",\n \"glusterfs-libs-3.8.4-54.15.h7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glusterfs\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T09:06:35", "description": "According to the versions of the glusterfs packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - A flaw was found in RPC request using gfs3_lookup_req\n in glusterfs server. An authenticated attacker could\n use this flaw to leak information and execute remote\n denial of service by crashing gluster brick\n process.(CVE-2018-10927)\n\n - A flaw was found in RPC request using gfs3_mknod_req\n supported by glusterfs server. An authenticated\n attacker could use this flaw to write files to an\n arbitrary location via path traversal and execute\n arbitrary code on a glusterfs server\n node.(CVE-2018-10926)\n\n - It was found that the 'mknod' call derived from\n mknod(2) can create files pointing to devices on a\n glusterfs server node. An authenticated attacker could\n use this to create an arbitrary device and read data\n from any device attached to the glusterfs server\n node.(CVE-2018-10923)\n\n - A flaw was found in RPC request using gfs3_rename_req\n in glusterfs server. An authenticated attacker could\n use this flaw to write to a destination outside the\n gluster volume.(CVE-2018-10930)\n\n - It was found that glusterfs server does not properly\n sanitize file paths in the 'trusted.io-stats-dump'\n extended attribute which is used by the\n 'debug/io-stats' translator. Attacker can use this flaw\n to create files and execute arbitrary code. To exploit\n this attacker would require sufficient access to modify\n the extended attributes of files on a gluster\n volume.(CVE-2018-10904)\n\n - It was found that glusterfs server is vulnerable to\n multiple stack based buffer overflows due to functions\n in server-rpc-fopc.c allocating fixed size buffers\n using 'alloca(3)'. An authenticated attacker could\n exploit this by mounting a gluster volume and sending a\n string longer that the fixed buffer size to cause crash\n or potential code execution.(CVE-2018-10907)\n\n - It was found that an attacker could issue a xattr\n request via glusterfs FUSE to cause gluster brick\n process to crash which will result in a remote denial\n of service. If gluster multiplexing is enabled this\n will result in a crash of multiple bricks and gluster\n volumes.(CVE-2018-10914)\n\n - An information disclosure vulnerability was discovered\n in glusterfs server. An attacker could issue a xattr\n request via glusterfs FUSE to determine the existence\n of any file.(CVE-2018-10913)\n\n - A flaw was found in RPC request using gfs2_create_req\n in glusterfs server. An authenticated attacker could\n use this flaw to create arbitrary files and execute\n arbitrary code on glusterfs server\n nodes.(CVE-2018-10929)\n\n - A flaw was found in RPC request using gfs3_symlink_req\n in glusterfs server which allows symlink destinations\n to point to file paths outside of the gluster volume.\n An authenticated attacker could use this flaw to create\n arbitrary symlinks pointing anywhere on the server and\n execute arbitrary code on glusterfs server\n nodes.(CVE-2018-10928)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-10-21T00:00:00", "title": "EulerOS Virtualization 3.0.2.2 : glusterfs (EulerOS-SA-2020-2187)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10914"], "modified": "2020-10-21T00:00:00", "cpe": ["cpe:/o:huawei:euleros:uvp:3.0.2.2", "p-cpe:/a:huawei:euleros:glusterfs-client-xlators", "p-cpe:/a:huawei:euleros:glusterfs-cli", "p-cpe:/a:huawei:euleros:glusterfs-api", "p-cpe:/a:huawei:euleros:glusterfs-libs", "p-cpe:/a:huawei:euleros:glusterfs"], "id": "EULEROS_SA-2020-2187.NASL", "href": "https://www.tenable.com/plugins/nessus/141768", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(141768);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-10904\",\n \"CVE-2018-10907\",\n \"CVE-2018-10913\",\n \"CVE-2018-10914\",\n \"CVE-2018-10923\",\n \"CVE-2018-10926\",\n \"CVE-2018-10927\",\n \"CVE-2018-10928\",\n \"CVE-2018-10929\",\n \"CVE-2018-10930\"\n );\n\n script_name(english:\"EulerOS Virtualization 3.0.2.2 : glusterfs (EulerOS-SA-2020-2187)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the glusterfs packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - A flaw was found in RPC request using gfs3_lookup_req\n in glusterfs server. An authenticated attacker could\n use this flaw to leak information and execute remote\n denial of service by crashing gluster brick\n process.(CVE-2018-10927)\n\n - A flaw was found in RPC request using gfs3_mknod_req\n supported by glusterfs server. An authenticated\n attacker could use this flaw to write files to an\n arbitrary location via path traversal and execute\n arbitrary code on a glusterfs server\n node.(CVE-2018-10926)\n\n - It was found that the 'mknod' call derived from\n mknod(2) can create files pointing to devices on a\n glusterfs server node. An authenticated attacker could\n use this to create an arbitrary device and read data\n from any device attached to the glusterfs server\n node.(CVE-2018-10923)\n\n - A flaw was found in RPC request using gfs3_rename_req\n in glusterfs server. An authenticated attacker could\n use this flaw to write to a destination outside the\n gluster volume.(CVE-2018-10930)\n\n - It was found that glusterfs server does not properly\n sanitize file paths in the 'trusted.io-stats-dump'\n extended attribute which is used by the\n 'debug/io-stats' translator. Attacker can use this flaw\n to create files and execute arbitrary code. To exploit\n this attacker would require sufficient access to modify\n the extended attributes of files on a gluster\n volume.(CVE-2018-10904)\n\n - It was found that glusterfs server is vulnerable to\n multiple stack based buffer overflows due to functions\n in server-rpc-fopc.c allocating fixed size buffers\n using 'alloca(3)'. An authenticated attacker could\n exploit this by mounting a gluster volume and sending a\n string longer that the fixed buffer size to cause crash\n or potential code execution.(CVE-2018-10907)\n\n - It was found that an attacker could issue a xattr\n request via glusterfs FUSE to cause gluster brick\n process to crash which will result in a remote denial\n of service. If gluster multiplexing is enabled this\n will result in a crash of multiple bricks and gluster\n volumes.(CVE-2018-10914)\n\n - An information disclosure vulnerability was discovered\n in glusterfs server. An attacker could issue a xattr\n request via glusterfs FUSE to determine the existence\n of any file.(CVE-2018-10913)\n\n - A flaw was found in RPC request using gfs2_create_req\n in glusterfs server. An authenticated attacker could\n use this flaw to create arbitrary files and execute\n arbitrary code on glusterfs server\n nodes.(CVE-2018-10929)\n\n - A flaw was found in RPC request using gfs3_symlink_req\n in glusterfs server which allows symlink destinations\n to point to file paths outside of the gluster volume.\n An authenticated attacker could use this flaw to create\n arbitrary symlinks pointing anywhere on the server and\n execute arbitrary code on glusterfs server\n nodes.(CVE-2018-10928)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-2187\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?856c3735\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected glusterfs packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/10/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/10/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-cli\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-client-xlators\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.2.2\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.2.2\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.2.2\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"glusterfs-3.8.4-54.15.h7.eulerosv2r7\",\n \"glusterfs-api-3.8.4-54.15.h7.eulerosv2r7\",\n \"glusterfs-cli-3.8.4-54.15.h7.eulerosv2r7\",\n \"glusterfs-client-xlators-3.8.4-54.15.h7.eulerosv2r7\",\n \"glusterfs-libs-3.8.4-54.15.h7.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glusterfs\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T09:02:10", "description": "According to the versions of the glusterfs packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - A flaw was found in RPC request using gfs2_create_req\n in glusterfs server. An authenticated attacker could\n use this flaw to create arbitrary files and execute\n arbitrary code on glusterfs server\n nodes.(CVE-2018-10929)\n\n - A flaw was found in RPC request using gfs3_lookup_req\n in glusterfs server. An authenticated attacker could\n use this flaw to leak information and execute remote\n denial of service by crashing gluster brick\n process.(CVE-2018-10927)\n\n - A flaw was found in RPC request using gfs3_mknod_req\n supported by glusterfs server. An authenticated\n attacker could use this flaw to write files to an\n arbitrary location via path traversal and execute\n arbitrary code on a glusterfs server\n node.(CVE-2018-10926)\n\n - A flaw was found in RPC request using gfs3_rename_req\n in glusterfs server. An authenticated attacker could\n use this flaw to write to a destination outside the\n gluster volume.(CVE-2018-10930)\n\n - A flaw was found in RPC request using gfs3_symlink_req\n in glusterfs server which allows symlink destinations\n to point to file paths outside of the gluster volume.\n An authenticated attacker could use this flaw to create\n arbitrary symlinks pointing anywhere on the server and\n execute arbitrary code on glusterfs server\n nodes.(CVE-2018-10928)\n\n - It was found that glusterfs server does not properly\n sanitize file paths in the 'trusted.io-stats-dump'\n extended attribute which is used by the\n 'debug/io-stats' translator. Attacker can use this flaw\n to create files and execute arbitrary code. To exploit\n this attacker would require sufficient access to modify\n the extended attributes of files on a gluster\n volume.(CVE-2018-10904)\n\n - It was found that glusterfs server is vulnerable to\n multiple stack based buffer overflows due to functions\n in server-rpc-fopc.c allocating fixed size buffers\n using 'alloca(3)'. An authenticated attacker could\n exploit this by mounting a gluster volume and sending a\n string longer that the fixed buffer size to cause crash\n or potential code execution.(CVE-2018-10907)\n\n - An information disclosure vulnerability was discovered\n in glusterfs server. An attacker could issue a xattr\n request via glusterfs FUSE to determine the existence\n of any file.(CVE-2018-10913)\n\n - It was found that an attacker could issue a xattr\n request via glusterfs FUSE to cause gluster brick\n process to crash which will result in a remote denial\n of service. If gluster multiplexing is enabled this\n will result in a crash of multiple bricks and gluster\n volumes.(CVE-2018-10914)\n\n - It was found that the 'mknod' call derived from\n mknod(2) can create files pointing to devices on a\n glusterfs server node. An authenticated attacker could\n use this to create an arbitrary device and read data\n from any device attached to the glusterfs server\n node.(CVE-2018-10923)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 5, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-02-24T00:00:00", "title": "EulerOS 2.0 SP5 : glusterfs (EulerOS-SA-2020-1103)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10914"], "modified": "2020-02-24T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:glusterfs-client-xlators", "p-cpe:/a:huawei:euleros:glusterfs-api", "p-cpe:/a:huawei:euleros:glusterfs-rdma", "p-cpe:/a:huawei:euleros:glusterfs-libs", "p-cpe:/a:huawei:euleros:glusterfs", "p-cpe:/a:huawei:euleros:glusterfs-fuse", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2020-1103.NASL", "href": "https://www.tenable.com/plugins/nessus/133904", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(133904);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-10904\",\n \"CVE-2018-10907\",\n \"CVE-2018-10913\",\n \"CVE-2018-10914\",\n \"CVE-2018-10923\",\n \"CVE-2018-10926\",\n \"CVE-2018-10927\",\n \"CVE-2018-10928\",\n \"CVE-2018-10929\",\n \"CVE-2018-10930\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : glusterfs (EulerOS-SA-2020-1103)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the glusterfs packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - A flaw was found in RPC request using gfs2_create_req\n in glusterfs server. An authenticated attacker could\n use this flaw to create arbitrary files and execute\n arbitrary code on glusterfs server\n nodes.(CVE-2018-10929)\n\n - A flaw was found in RPC request using gfs3_lookup_req\n in glusterfs server. An authenticated attacker could\n use this flaw to leak information and execute remote\n denial of service by crashing gluster brick\n process.(CVE-2018-10927)\n\n - A flaw was found in RPC request using gfs3_mknod_req\n supported by glusterfs server. An authenticated\n attacker could use this flaw to write files to an\n arbitrary location via path traversal and execute\n arbitrary code on a glusterfs server\n node.(CVE-2018-10926)\n\n - A flaw was found in RPC request using gfs3_rename_req\n in glusterfs server. An authenticated attacker could\n use this flaw to write to a destination outside the\n gluster volume.(CVE-2018-10930)\n\n - A flaw was found in RPC request using gfs3_symlink_req\n in glusterfs server which allows symlink destinations\n to point to file paths outside of the gluster volume.\n An authenticated attacker could use this flaw to create\n arbitrary symlinks pointing anywhere on the server and\n execute arbitrary code on glusterfs server\n nodes.(CVE-2018-10928)\n\n - It was found that glusterfs server does not properly\n sanitize file paths in the 'trusted.io-stats-dump'\n extended attribute which is used by the\n 'debug/io-stats' translator. Attacker can use this flaw\n to create files and execute arbitrary code. To exploit\n this attacker would require sufficient access to modify\n the extended attributes of files on a gluster\n volume.(CVE-2018-10904)\n\n - It was found that glusterfs server is vulnerable to\n multiple stack based buffer overflows due to functions\n in server-rpc-fopc.c allocating fixed size buffers\n using 'alloca(3)'. An authenticated attacker could\n exploit this by mounting a gluster volume and sending a\n string longer that the fixed buffer size to cause crash\n or potential code execution.(CVE-2018-10907)\n\n - An information disclosure vulnerability was discovered\n in glusterfs server. An attacker could issue a xattr\n request via glusterfs FUSE to determine the existence\n of any file.(CVE-2018-10913)\n\n - It was found that an attacker could issue a xattr\n request via glusterfs FUSE to cause gluster brick\n process to crash which will result in a remote denial\n of service. If gluster multiplexing is enabled this\n will result in a crash of multiple bricks and gluster\n volumes.(CVE-2018-10914)\n\n - It was found that the 'mknod' call derived from\n mknod(2) can create files pointing to devices on a\n glusterfs server node. An authenticated attacker could\n use this to create an arbitrary device and read data\n from any device attached to the glusterfs server\n node.(CVE-2018-10923)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2020-1103\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5df7eb52\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected glusterfs packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-client-xlators\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:glusterfs-rdma\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"glusterfs-3.8.4-54.15.h6.eulerosv2r7\",\n \"glusterfs-api-3.8.4-54.15.h6.eulerosv2r7\",\n \"glusterfs-client-xlators-3.8.4-54.15.h6.eulerosv2r7\",\n \"glusterfs-fuse-3.8.4-54.15.h6.eulerosv2r7\",\n \"glusterfs-libs-3.8.4-54.15.h6.eulerosv2r7\",\n \"glusterfs-rdma-3.8.4-54.15.h6.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"glusterfs\");\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10904", "CVE-2018-10907", "CVE-2018-10911", "CVE-2018-10913", "CVE-2018-10914", "CVE-2018-10923", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10928", "CVE-2018-10929", "CVE-2018-10930"], "description": "GlusterFS is a distributed file-system capable of scaling to several petabytes. It aggregates various storage bricks over Infiniband RDMA or TCP/IP interconnect into one large parallel network file system. GlusterFS is one of the most sophisticated file systems in terms of features and extensibility. It borrows a powerful concept called Translators from GNU Hurd kernel. Much of the code in GlusterFS is in user space and easily manageable. This package includes the glusterfs binary, the glusterfsd daemon and the libglusterfs and glusterfs translator modules common to both GlusterFS serv er and client framework. ", "modified": "2018-09-11T17:04:27", "published": "2018-09-11T17:04:27", "id": "FEDORA:EF6D4605A2BA", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: glusterfs-4.1.4-1.fc28", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10904", "CVE-2018-10907", "CVE-2018-10911", "CVE-2018-10913", "CVE-2018-10914", "CVE-2018-10923", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10928", "CVE-2018-10929", "CVE-2018-10930"], "description": "GlusterFS is a distributed file-system capable of scaling to several petabytes. It aggregates various storage bricks over Infiniband RDMA or TCP/IP interconnect into one large parallel network file system. GlusterFS is one of the most sophisticated file systems in terms of features and extensibility. It borrows a powerful concept called Translators from GNU Hurd kernel. Much of the code in GlusterFS is in user space and easily manageable. This package includes the glusterfs binary, the glusterfsd daemon and the libglusterfs and glusterfs translator modules common to both GlusterFS serv er and client framework. ", "modified": "2018-10-02T19:35:20", "published": "2018-10-02T19:35:20", "id": "FEDORA:CB9466012FDA", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: glusterfs-4.1.5-1.fc29", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10904", "CVE-2018-10907", "CVE-2018-10911", "CVE-2018-10913", "CVE-2018-10914", "CVE-2018-10923", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-10928", "CVE-2018-10929", "CVE-2018-10930"], "description": "GlusterFS is a distributed file-system capable of scaling to several petabytes. It aggregates various storage bricks over Infiniband RDMA or TCP/IP interconnect into one large parallel network file system. GlusterFS is one of the most sophisticated file systems in terms of features and extensibility. It borrows a powerful concept called Translators from GNU Hurd kernel. Much of the code in GlusterFS is in user space and easily manageable. This package includes the glusterfs binary, the glusterfsd daemon and the libglusterfs and glusterfs translator modules common to both GlusterFS serv er and client framework. ", "modified": "2018-09-28T17:14:10", "published": "2018-09-28T17:14:10", "id": "FEDORA:9FE6860C01B7", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 27 Update: glusterfs-3.12.14-1.fc27", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2020-01-20T08:25:53", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10930", "CVE-2018-10907", "CVE-2018-10924", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-1088", "CVE-2018-10923", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-1112", "CVE-2018-10928", "CVE-2018-10904", "CVE-2018-10911", "CVE-2018-10914"], "description": "This update for glusterfs fixes the following issues:\n\n glusterfs was update to release 3.12.15:\n\n * Fixed a number of bugs and security issues:\n\n - CVE-2018-1088, CVE-2018-1112 [boo#1090084], CVE-2018-10904\n [boo#1107018], CVE-2018-10907 [boo#1107019], CVE-2018-10911\n [boo#1107020], CVE-2018-10913 [boo#1107021], CVE-2018-10914\n [boo#1107022], CVE-2018-10923 [boo#1107023], CVE-2018-10924\n [boo#1107024], CVE-2018-10926 [boo#1107025], CVE-2018-10927\n [boo#1107026], CVE-2018-10928 [boo#1107027], CVE-2018-10928\n [boo#1107027], CVE-2018-10929 [boo#1107028], CVE-2018-10930\n [boo#1107029], boo#1105776 .\n\n", "edition": 1, "modified": "2020-01-20T06:11:03", "published": "2020-01-20T06:11:03", "id": "OPENSUSE-SU-2020:0079-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html", "title": "Security update for glusterfs (moderate)", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2020-12-09T20:25:31", "description": "A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 8.1, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.2}, "published": "2018-09-04T15:29:00", "title": "CVE-2018-10927", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10927"], "modified": "2020-10-15T13:28:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/a:redhat:virtualization_host:4.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2018-10927", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10927", "cvss": {"score": 5.5, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:25:31", "description": "A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.", "edition": 7, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-09-04T15:29:00", "title": "CVE-2018-10926", "type": "cve", "cwe": ["CWE-22"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10926"], "modified": "2020-10-15T13:28:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/o:redhat:enterprise_linux:7.0", "cpe:/a:redhat:virtualization_host:4.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux:6.0"], "id": "CVE-2018-10926", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10926", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:25:31", "description": "It was found that glusterfs server does not properly sanitize file paths in the \"trusted.io-stats-dump\" extended attribute which is used by the \"debug/io-stats\" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.", "edition": 7, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-09-04T13:29:00", "title": "CVE-2018-10904", "type": "cve", "cwe": ["CWE-426"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10904"], "modified": "2020-10-15T13:28:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/a:redhat:virtualization_host:4.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2018-10904", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10904", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:25:31", "description": "A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 6.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-09-04T16:29:00", "title": "CVE-2018-10930", "type": "cve", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10930"], "modified": "2020-10-15T13:28:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/o:redhat:enterprise_linux:7.0", "cpe:/a:redhat:virtualization_host:4.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux:6.0"], "id": "CVE-2018-10930", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10930", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:25:31", "description": "It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.", "edition": 8, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2018-09-04T13:29:00", "title": "CVE-2018-10907", "type": "cve", "cwe": ["CWE-787"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10907"], "modified": "2020-10-15T13:28:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:opensuse:leap:15.1", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/a:redhat:virtualization_host:4.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2018-10907", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10907", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:25:31", "description": "It was found that the \"mknod\" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.", "edition": 7, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 8.1, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.2}, "published": "2018-09-04T14:29:00", "title": "CVE-2018-10923", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10923"], "modified": "2020-10-15T13:28:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/a:redhat:virtualization_host:4.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2018-10923", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10923", "cvss": {"score": 5.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:25:31", "description": "A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.", "edition": 7, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-09-04T16:29:00", "title": "CVE-2018-10929", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10929"], "modified": "2020-10-15T13:28:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/a:redhat:virtualization_host:4.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2018-10929", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10929", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:25:31", "description": "It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.", "edition": 7, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-09-04T14:29:00", "title": "CVE-2018-10914", "type": "cve", "cwe": ["CWE-476"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10914"], "modified": "2020-10-15T13:28:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/a:redhat:virtualization_host:4.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2018-10914", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10914", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:25:31", "description": "An information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.", "edition": 7, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 6.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-09-04T14:29:00", "title": "CVE-2018-10913", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.0, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10913"], "modified": "2020-10-15T13:28:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/a:redhat:virtualization_host:4.0", "cpe:/o:redhat:enterprise_linux_server:6.0"], "id": "CVE-2018-10913", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10913", "cvss": {"score": 4.0, "vector": "AV:N/AC:L/Au:S/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:25:31", "description": "A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.", "edition": 7, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-09-04T15:29:00", "title": "CVE-2018-10928", "type": "cve", "cwe": ["CWE-59"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10928"], "modified": "2020-10-15T13:28:00", "cpe": ["cpe:/a:redhat:gluster_storage:3.0", "cpe:/o:debian:debian_linux:8.0", "cpe:/o:redhat:enterprise_linux_server:7.0", "cpe:/o:redhat:enterprise_linux:7.0", "cpe:/a:redhat:virtualization_host:4.0", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/o:redhat:enterprise_linux:6.0"], "id": "CVE-2018-10928", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10928", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"]}], "gentoo": [{"lastseen": "2019-04-02T08:46:19", "bulletinFamily": "unix", "cvelist": ["CVE-2018-14653", "CVE-2018-10930", "CVE-2018-10907", "CVE-2018-14651", "CVE-2018-10841", "CVE-2018-14660", "CVE-2018-10924", "CVE-2018-14652", "CVE-2018-10926", "CVE-2018-10927", "CVE-2018-1088", "CVE-2018-10923", "CVE-2018-14661", "CVE-2018-10929", "CVE-2018-10913", "CVE-2018-10928", "CVE-2018-14659", "CVE-2018-10904", "CVE-2018-14654", "CVE-2018-10911", "CVE-2018-10914"], "description": "### Background\n\nA free and open source software scalable network filesystem.\n\n### Description\n\nMultiple vulnerabilities have been discovered in GlusterFS. Please review the referenced CVE identifiers for details. \n\n### Impact\n\nPlease review the referenced CVE identifiers for details.\n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll GlusterFS users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=sys-cluster/glusterfs-4.1.8\"", "edition": 1, "modified": "2019-04-02T00:00:00", "published": "2019-04-02T00:00:00", "id": "GLSA-201904-06", "href": "https://security.gentoo.org/glsa/201904-06", "title": "GlusterFS: Multiple Vulnerabilities", "type": "gentoo", "cvss": {"score": 8.5, "vector": "AV:NETWORK/AC:LOW/Au:SINGLE_INSTANCE/C:NONE/I:COMPLETE/A:COMPLETE/"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:34:39", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10911"], "description": "[3.12.2-18]\n- fixes bugs bz#1524336 bz#1622029 bz#1622452\n[3.12.2-17]\n- fixes bugs bz#1615578 bz#1619416 bz#1619538 bz#1620469 bz#1620765\n[3.12.2-16]\n- fixes bugs bz#1569657 bz#1608352 bz#1609163 bz#1609724 bz#1610825\n bz#1611151 bz#1612098 bz#1615338 bz#1615440\n[3.12.2-15]\n- fixes bugs bz#1589279 bz#1598384 bz#1599362 bz#1599998 bz#1600790\n bz#1601331 bz#1603103\n[3.12.2-14]\n- fixes bugs bz#1547903 bz#1566336 bz#1568896 bz#1578716 bz#1581047\n bz#1581231 bz#1582066 bz#1593865 bz#1597506 bz#1597511 bz#1597654 bz#1597768\n bz#1598105 bz#1598356 bz#1599037 bz#1599823 bz#1600057 bz#1601314\n[3.12.2-13]\n- fixes bugs bz#1493085 bz#1518710 bz#1554255 bz#1558948 bz#1558989\n bz#1559452 bz#1567001 bz#1569312 bz#1569951 bz#1575539 bz#1575557 bz#1577051\n bz#1580120 bz#1581184 bz#1581553 bz#1581647 bz#1582119 bz#1582129 bz#1582417\n bz#1583047 bz#1588408 bz#1592666 bz#1594658\n[3.12.2-12]\n- fixes bugs bz#1558989 bz#1580344 bz#1581057 bz#1581219\n[3.12.2-11]\n- fixes bugs bz#1558989 bz#1575555 bz#1578647\n[3.12.2-10]\n- fixes bugs bz#1488120 bz#1565577 bz#1568297 bz#1570586 bz#1572043\n bz#1572075 bz#1575840 bz#1575877\n[3.12.2-9]\n- fixes bugs bz#1546717 bz#1557551 bz#1558948 bz#1561999 bz#1563804\n bz#1565015 bz#1565119 bz#1565399 bz#1565577 bz#1567100 bz#1567899 bz#1568374\n bz#1568969 bz#1569490 bz#1570514 bz#1570541 bz#1570582 bz#1571645 bz#1572087\n bz#1572585 bz#1575895\n[3.12.2-8]\n- fixes bugs bz#1466129 bz#1475779 bz#1523216 bz#1535281 bz#1546941\n bz#1550315 bz#1550991 bz#1553677 bz#1554291 bz#1559452 bz#1560955 bz#1562744\n bz#1563692 bz#1565962 bz#1567110 bz#1569457\n[3.12.2-7]\n- fixes bugs bz#958062 bz#1186664 bz#1226874 bz#1446046 bz#1529451 bz#1550315\n bz#1557365 bz#1559884 bz#1561733\n[3.12.2-6]\n- fixes bugs bz#1491785 bz#1518710 bz#1523599 bz#1528733 bz#1550474\n bz#1550982 bz#1551186 bz#1552360 bz#1552414 bz#1552425 bz#1554255 bz#1554905\n bz#1555261 bz#1556895 bz#1557297 bz#1559084 bz#1559788\n[3.12.2-5]\n- fixes bugs bz#1378371 bz#1384983 bz#1472445 bz#1493085 bz#1508999\n bz#1516638 bz#1518260 bz#1529072 bz#1530519 bz#1537357 bz#1540908 bz#1541122\n bz#1541932 bz#1543068 bz#1544382 bz#1544852 bz#1545570 bz#1546075 bz#1546945\n bz#1546960 bz#1547012 bz#1549497\n[3.12.2-4]\n- fixes bugs bz#1446125 bz#1467536 bz#1530146 bz#1540600 bz#1540664\n bz#1540961 bz#1541830 bz#1543296\n[3.12.2-3]\n- fixes bugs bz#1446125 bz#1463592 bz#1516249 bz#1517463 bz#1527309\n bz#1530325 bz#1531041 bz#1539699 bz#1540011\n[3.12.2-2]\n- fixes bugs bz#1264911 bz#1277924 bz#1286820 bz#1360331 bz#1401969\n bz#1410719 bz#1419438 bz#1426042 bz#1444820 bz#1459101 bz#1464150 bz#1464350\n bz#1466122 bz#1466129 bz#1467903 bz#1468972 bz#1476876 bz#1484446 bz#1492591\n bz#1498391 bz#1498730 bz#1499865 bz#1500704 bz#1501345 bz#1505570 bz#1507361\n bz#1507394 bz#1509102 bz#1509191 bz#1509810 bz#1509833 bz#1511766 bz#1512470\n bz#1512496 bz#1512963 bz#1515051 bz#1519076 bz#1519740 bz#1534253 bz#1534530\n[3.12.2-1]\n- rebase to upstream glusterfs at v3.12.2\n- fixes bugs bz#1442983 bz#1474745 bz#1503244 bz#1505363 bz#1509102", "edition": 3, "modified": "2018-10-09T00:00:00", "published": "2018-10-09T00:00:00", "id": "ELSA-2018-2892", "href": "http://linux.oracle.com/errata/ELSA-2018-2892.html", "title": "glusterfs security, bug fix, and enhancement update", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-10-22T17:04:23", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10911"], "description": "[3.12.2-18]\n- fixes bugs bz#1524336 bz#1622029 bz#1622452\n[3.12.2-17]\n- fixes bugs bz#1615578 bz#1619416 bz#1619538 bz#1620469 bz#1620765\n[3.12.2-16]\n- fixes bugs bz#1569657 bz#1608352 bz#1609163 bz#1609724 bz#1610825\n bz#1611151 bz#1612098 bz#1615338 bz#1615440\n[3.12.2-15]\n- fixes bugs bz#1589279 bz#1598384 bz#1599362 bz#1599998 bz#1600790\n bz#1601331 bz#1603103\n[3.12.2-14]\n- fixes bugs bz#1547903 bz#1566336 bz#1568896 bz#1578716 bz#1581047\n bz#1581231 bz#1582066 bz#1593865 bz#1597506 bz#1597511 bz#1597654 bz#1597768\n bz#1598105 bz#1598356 bz#1599037 bz#1599823 bz#1600057 bz#1601314\n[3.12.2-13]\n- fixes bugs bz#1493085 bz#1518710 bz#1554255 bz#1558948 bz#1558989\n bz#1559452 bz#1567001 bz#1569312 bz#1569951 bz#1575539 bz#1575557 bz#1577051\n bz#1580120 bz#1581184 bz#1581553 bz#1581647 bz#1582119 bz#1582129 bz#1582417\n bz#1583047 bz#1588408 bz#1592666 bz#1594658\n[3.12.2-12]\n- fixes bugs bz#1558989 bz#1580344 bz#1581057 bz#1581219\n[3.12.2-11]\n- fixes bugs bz#1558989 bz#1575555 bz#1578647\n[3.12.2-10]\n- fixes bugs bz#1488120 bz#1565577 bz#1568297 bz#1570586 bz#1572043\n bz#1572075 bz#1575840 bz#1575877\n[3.12.2-9]\n- fixes bugs bz#1546717 bz#1557551 bz#1558948 bz#1561999 bz#1563804\n bz#1565015 bz#1565119 bz#1565399 bz#1565577 bz#1567100 bz#1567899 bz#1568374\n bz#1568969 bz#1569490 bz#1570514 bz#1570541 bz#1570582 bz#1571645 bz#1572087\n bz#1572585 bz#1575895\n[3.12.2-8]\n- fixes bugs bz#1466129 bz#1475779 bz#1523216 bz#1535281 bz#1546941\n bz#1550315 bz#1550991 bz#1553677 bz#1554291 bz#1559452 bz#1560955 bz#1562744\n bz#1563692 bz#1565962 bz#1567110 bz#1569457\n[3.12.2-7]\n- fixes bugs bz#958062 bz#1186664 bz#1226874 bz#1446046 bz#1529451 bz#1550315\n bz#1557365 bz#1559884 bz#1561733\n[3.12.2-6]\n- fixes bugs bz#1491785 bz#1518710 bz#1523599 bz#1528733 bz#1550474\n bz#1550982 bz#1551186 bz#1552360 bz#1552414 bz#1552425 bz#1554255 bz#1554905\n bz#1555261 bz#1556895 bz#1557297 bz#1559084 bz#1559788\n[3.12.2-5]\n- fixes bugs bz#1378371 bz#1384983 bz#1472445 bz#1493085 bz#1508999\n bz#1516638 bz#1518260 bz#1529072 bz#1530519 bz#1537357 bz#1540908 bz#1541122\n bz#1541932 bz#1543068 bz#1544382 bz#1544852 bz#1545570 bz#1546075 bz#1546945\n bz#1546960 bz#1547012 bz#1549497\n[3.12.2-4]\n- fixes bugs bz#1446125 bz#1467536 bz#1530146 bz#1540600 bz#1540664\n bz#1540961 bz#1541830 bz#1543296\n[3.12.2-3]\n- fixes bugs bz#1446125 bz#1463592 bz#1516249 bz#1517463 bz#1527309\n bz#1530325 bz#1531041 bz#1539699 bz#1540011\n[3.12.2-2]\n- fixes bugs bz#1264911 bz#1277924 bz#1286820 bz#1360331 bz#1401969\n bz#1410719 bz#1419438 bz#1426042 bz#1444820 bz#1459101 bz#1464150 bz#1464350\n bz#1466122 bz#1466129 bz#1467903 bz#1468972 bz#1476876 bz#1484446 bz#1492591\n bz#1498391 bz#1498730 bz#1499865 bz#1500704 bz#1501345 bz#1505570 bz#1507361\n bz#1507394 bz#1509102 bz#1509191 bz#1509810 bz#1509833 bz#1511766 bz#1512470\n bz#1512496 bz#1512963 bz#1515051 bz#1519076 bz#1519740 bz#1534253 bz#1534530\n[3.12.2-1]\n- rebase to upstream glusterfs at v3.12.2\n- fixes bugs bz#1442983 bz#1474745 bz#1503244 bz#1505363 bz#1509102", "edition": 4, "modified": "2018-11-05T00:00:00", "published": "2018-11-05T00:00:00", "id": "ELSA-2018-3242", "href": "http://linux.oracle.com/errata/ELSA-2018-3242.html", "title": "glusterfs security, bug fix, and enhancement update", "type": "oraclelinux", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}], "amazon": [{"lastseen": "2020-11-10T12:34:53", "bulletinFamily": "unix", "cvelist": ["CVE-2018-10911"], "description": "**Issue Overview:**\n\nA flaw was found in dict.c:dict_unserialize function of glusterfs, dic_unserialize function does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.([CVE-2018-10911 __](<https://access.redhat.com/security/cve/CVE-2018-10911>))\n\n \n**Affected Packages:** \n\n\nglusterfs\n\n \n**Issue Correction:** \nRun _yum update glusterfs_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n aarch64: \n glusterfs-3.12.2-18.amzn2.aarch64 \n glusterfs-api-3.12.2-18.amzn2.aarch64 \n glusterfs-api-devel-3.12.2-18.amzn2.aarch64 \n glusterfs-cli-3.12.2-18.amzn2.aarch64 \n glusterfs-devel-3.12.2-18.amzn2.aarch64 \n glusterfs-fuse-3.12.2-18.amzn2.aarch64 \n glusterfs-libs-3.12.2-18.amzn2.aarch64 \n python2-gluster-3.12.2-18.amzn2.aarch64 \n glusterfs-rdma-3.12.2-18.amzn2.aarch64 \n glusterfs-client-xlators-3.12.2-18.amzn2.aarch64 \n glusterfs-debuginfo-3.12.2-18.amzn2.aarch64 \n \n i686: \n glusterfs-3.12.2-18.amzn2.i686 \n glusterfs-api-3.12.2-18.amzn2.i686 \n glusterfs-api-devel-3.12.2-18.amzn2.i686 \n glusterfs-cli-3.12.2-18.amzn2.i686 \n glusterfs-devel-3.12.2-18.amzn2.i686 \n glusterfs-fuse-3.12.2-18.amzn2.i686 \n glusterfs-libs-3.12.2-18.amzn2.i686 \n python2-gluster-3.12.2-18.amzn2.i686 \n glusterfs-rdma-3.12.2-18.amzn2.i686 \n glusterfs-client-xlators-3.12.2-18.amzn2.i686 \n glusterfs-debuginfo-3.12.2-18.amzn2.i686 \n \n src: \n glusterfs-3.12.2-18.amzn2.src \n \n x86_64: \n glusterfs-3.12.2-18.amzn2.x86_64 \n glusterfs-api-3.12.2-18.amzn2.x86_64 \n glusterfs-api-devel-3.12.2-18.amzn2.x86_64 \n glusterfs-cli-3.12.2-18.amzn2.x86_64 \n glusterfs-devel-3.12.2-18.amzn2.x86_64 \n glusterfs-fuse-3.12.2-18.amzn2.x86_64 \n glusterfs-libs-3.12.2-18.amzn2.x86_64 \n python2-gluster-3.12.2-18.amzn2.x86_64 \n glusterfs-rdma-3.12.2-18.amzn2.x86_64 \n glusterfs-client-xlators-3.12.2-18.amzn2.x86_64 \n glusterfs-debuginfo-3.12.2-18.amzn2.x86_64 \n \n \n", "edition": 1, "modified": "2018-12-13T20:16:00", "published": "2018-12-13T20:16:00", "id": "ALAS2-2018-1128", "href": "https://alas.aws.amazon.com/AL2/ALAS-2018-1128.html", "title": "Medium: glusterfs", "type": "amazon", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}]}