A flaw was found in glusterfs which can lead to privilege escalation on gluster server nodes. It was found that any gluster client authenticated via TLS could use gluster cli with --remote-host command to add itself to gluster trusted pool and perform all gluster operations like peer probe itself or other machines, start, stop, delete volumes etc. Gentoo Security Scout Florian Schuhmacher
Upstream patch: http://git.gluster.org/cgit/glusterfs.git/commit/?id=e8d928e34680079e42be6947ffacc4ddd7defca2
Maintainers, please confirm. https://review.gluster.org/#/c/glusterfs/+/20328/
Upstream released 4.1.8... 22 hours ago and the patch is in that release.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7ad0e566365b914c27b06a36e7a26209c957511c commit 7ad0e566365b914c27b06a36e7a26209c957511c Author: Aaron Bauman <bman@gentoo.org> AuthorDate: 2019-03-28 20:40:20 +0000 Commit: Aaron Bauman <bman@gentoo.org> CommitDate: 2019-03-28 20:43:19 +0000 sys-cluster/glusterfs: bup to fix outstanding security issues * This bump addresses multiple CVEs that have been fixed upstream Bug: https://bugs.gentoo.org/658606 Bug: https://bugs.gentoo.org/664336 Bug: https://bugs.gentoo.org/670088 Signed-off-by: Aaron Bauman <bman@gentoo.org> sys-cluster/glusterfs/Manifest | 1 + sys-cluster/glusterfs/glusterfs-4.1.8.ebuild | 226 +++++++++++++++++++++++++++ 2 files changed, 227 insertions(+)
This issue was resolved and addressed in GLSA 201904-06 at https://security.gentoo.org/glsa/201904-06 by GLSA coordinator Aaron Bauman (b-man).