A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00035.html | Mailing List Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:1136 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:1137 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:1275 | Vendor Advisory |
https://access.redhat.com/errata/RHSA-2018:1524 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1558721 | Issue Tracking Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/201904-06 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2018-04-18T16:00:00Z
Updated: 2021-11-02T02:06:20
Reserved: 2017-12-04T00:00:00
Link: CVE-2018-1088
JSON object: View
NVD Information
Status : Modified
Published: 2018-04-18T16:29:00.323
Modified: 2023-02-13T04:53:13.673
Link: CVE-2018-1088
JSON object: View
Redhat Information
No data.