Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in glusterfs
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in glusterfs
ID: FEDORA-2018-4e660226e7
Distribution: Fedora
Plattformen: Fedora 28
Datum: Mi, 12. September 2018, 07:36
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911
https://bugzilla.redhat.com/show_bug.cgi?id=1614769
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10913
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10928
https://bugzilla.redhat.com/show_bug.cgi?id=1624006
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10904
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10923
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10914
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10930
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10926
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10907
Applikationen: GlusterFS

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2018-4e660226e7
2018-09-11 16:50:57.490321
-------------------------------------------------------------------------------
-

Name : glusterfs
Product : Fedora 28
Version : 4.1.4
Release : 1.fc28
URL : http://docs.gluster.org/
Summary : Distributed File System
Description :
GlusterFS is a distributed file-system capable of scaling to several
petabytes. It aggregates various storage bricks over Infiniband RDMA
or TCP/IP interconnect into one large parallel network file
system. GlusterFS is one of the most sophisticated file systems in
terms of features and extensibility. It borrows a powerful concept
called Translators from GNU Hurd kernel. Much of the code in GlusterFS
is in user space and easily manageable.

This package includes the glusterfs binary, the glusterfsd daemon and the
libglusterfs and glusterfs translator modules common to both GlusterFS server
and client framework.

-------------------------------------------------------------------------------
-
Update Information:

4.1.4 GA Security Fix for CVE-2018-10904 Security Fix for CVE-2018-10907
Security Fix for CVE-2018-10911 Security Fix for CVE-2018-10913 Security Fix
for
CVE-2018-10914 Security Fix for CVE-2018-10923 Security Fix for CVE-2018-10926
Security Fix for CVE-2018-10927 Security Fix for CVE-2018-10928 Security Fix
for
CVE-2018-10929 Security Fix for CVE-2018-10930 ---- missing
/run/gluster/metrics, see bz#1624006
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Sep 6 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com> - 4.1.4-1
- 4.1.4 GA
* Tue Sep 4 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com> - 4.1.3-2
- missing /run/gluster/metrics, see bz#1624006
* Tue Sep 4 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com>
- --with-ipv6-default bz#1614769
* Mon Aug 27 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com> - 4.1.3-1
- 4.1.3 GA
* Wed Jul 25 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com> - 4.1.2-2
- 4.1.2, again
* Tue Jul 24 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com> - 4.1.2-1
- 4.1.2 GA (includes gsyncd.conf)
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> -
4.1.1-2.1
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Wed Jul 11 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com> - 4.1.1-2
- missed python->python2 in shebang
* Tue Jun 26 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com> - 4.1.1-1
- 4.1.1 GA
* Tue Jun 12 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com> - 4.1.0-1
- 4.1.0 GA
* Fri Jun 1 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com> - 4.1.0rc0
- 4.1.0 RC0
* Tue Apr 24 2018 Niels de Vos <ndevos@redhat.com> - 4.0.2-1
- 4.0.2 GA
* Thu Apr 19 2018 Kaleb S. KEITHLEY <kkeithle[at]redhat.com> - 4.0.1-3
- 4.0.1, restore python->python2 -prettytable
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1625067 - CVE-2018-10927 glusterfs: File status information leak
and denial of service [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625067
[ 2 ] Bug #1625068 - CVE-2018-10928 glusterfs: Improper resolution of
symlinks allows for privilege escalation [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625068
[ 3 ] Bug #1625069 - CVE-2018-10929 glusterfs: Arbitrary file creation on
storage server allows for execution of arbitrary code [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625069
[ 4 ] Bug #1625074 - CVE-2018-10913 glusterfs: Information Exposure in
posix_get_file_contents function in posix-helpers.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625074
[ 5 ] Bug #1625075 - CVE-2018-10914 glusterfs: remote denial of service of
gluster volumes via posix_get_file_contents function in posix-helpers.c [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625075
[ 6 ] Bug #1625079 - CVE-2018-10911 glusterfs: Improper deserialization in
dict.c:dict_unserialize() can allow attackers to read arbitrary memory [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625079
[ 7 ] Bug #1625080 - CVE-2018-10907 glusterfs: Stack-based buffer overflow in
server-rpc-fops.c allows remote attackers to execute arbitrary code [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625080
[ 8 ] Bug #1625085 - CVE-2018-10930 glusterfs: Files can be renamed outside
volume [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625085
[ 9 ] Bug #1625086 - CVE-2018-10926 glusterfs: Device files can be created in
arbitrary locations [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625086
[ 10 ] Bug #1625091 - CVE-2018-10923 glusterfs: I/O to arbitrary devices on
storage server [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625091
[ 11 ] Bug #1625103 - CVE-2018-10904 glusterfs: Unsanitized file names in
debug/io-stats translator can allow remote attackers to execute arbitrary code [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1625103
[ 12 ] Bug #1624006 - /var/run/gluster/metrics/ wasn't created
automatically
https://bugzilla.redhat.com/show_bug.cgi?id=1624006
[ 13 ] Bug #1614769 - Typo in build flag
https://bugzilla.redhat.com/show_bug.cgi?id=1614769
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-4e660226e7' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung