Login
Newsletter
Werbung

Sicherheit: Denial of Service in GlusterFS
Aktuelle Meldungen Distributionen
Name: Denial of Service in GlusterFS
ID: FEDORA-2017-a47c76eeb1
Distribution: Fedora
Plattformen: Fedora 26
Datum: Mi, 1. November 2017, 17:43
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15096
Applikationen: GlusterFS

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2017-a47c76eeb1
2017-10-31 23:12:40.428357
-------------------------------------------------------------------------------
-

Name : glusterfs
Product : Fedora 26
Version : 3.10.6
Release : 4.fc26
URL : http://gluster.readthedocs.io/en/latest/
Summary : Distributed File System
Description :
GlusterFS is a distributed file-system capable of scaling to several
petabytes. It aggregates various storage bricks over Infiniband RDMA
or TCP/IP interconnect into one large parallel network file
system. GlusterFS is one of the most sophisticated file systems in
terms of features and extensibility. It borrows a powerful concept
called Translators from GNU Hurd kernel. Much of the code in GlusterFS
is in user space and easily manageable.

This package includes the glusterfs binary, the glusterfsd daemon and the
libglusterfs and glusterfs translator modules common to both GlusterFS server
and client framework.

-------------------------------------------------------------------------------
-
Update Information:

3.10.6 bz #1504256
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1504256 - CVE-2017-15096 glusterfs: Null pointer dereference in
send_brick_req function in glusterfsd/src/gf_attach.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1504256
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade glusterfs' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung