Release date:
2026-04-30 16:32:33 UTC
Description:
* SECURITY UPDATE: privilege escalation on glusterd nodes via the CLI
RPC program being exposed on the TCP listener when management-plane
SSL is enabled, allowing a TLS-authenticated client outside the
trusted storage pool to issue privileged volume-management commands
via gluster --remote-host
- debian/patches/CVE-2018-10841.patch: drop gd_inet_programs[1] =
&gd_svc_cli_prog rebinding in glusterd init() so the trusted-pool
CLI program remains bound to the TCP listener and the full CLI
RPC program continues to be served only over the local UNIX
domain socket
- CVE-2018-10841
Updated packages:
-
glusterfs-client_3.7.6-1ubuntu1+tuxcare.els2_amd64.deb
sha:f256d87c468b2fd050abdac2fc4363aa8b02a130
-
glusterfs-common_3.7.6-1ubuntu1+tuxcare.els2_amd64.deb
sha:03440a8a27d14c1256f1dee6cc1b9de63e9ffb15
-
glusterfs-server_3.7.6-1ubuntu1+tuxcare.els2_amd64.deb
sha:9f015fc8712fe9175c11febed8b8c25c5c44c8f3
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.