drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in GlusterFS
Name: |
Denial of Service in GlusterFS |
|
ID: |
FEDORA-2017-150762f6be |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 25 |
|
Datum: |
Mi, 1. November 2017, 18:46 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15096 |
|
Applikationen: |
GlusterFS |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2017-150762f6be 2017-11-01 15:19:51.801447 ------------------------------------------------------------------------------- -
Name : glusterfs Product : Fedora 25 Version : 3.10.6 Release : 4.fc25 URL : http://gluster.readthedocs.io/en/latest/ Summary : Distributed File System Description : GlusterFS is a distributed file-system capable of scaling to several petabytes. It aggregates various storage bricks over Infiniband RDMA or TCP/IP interconnect into one large parallel network file system. GlusterFS is one of the most sophisticated file systems in terms of features and extensibility. It borrows a powerful concept called Translators from GNU Hurd kernel. Much of the code in GlusterFS is in user space and easily manageable.
This package includes the glusterfs binary, the glusterfsd daemon and the libglusterfs and glusterfs translator modules common to both GlusterFS server and client framework.
------------------------------------------------------------------------------- - Update Information:
3.10.6 bz #1504256 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1504256 - CVE-2017-15096 glusterfs: Null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1504256 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade glusterfs' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
|
|
|
|