Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3644 glusterfs security update 2 November 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: glusterfs Publisher: Debian Operating System: Debian GNU/Linux Impact/Access: Increased Privileges -- Remote/Unauthenticated Execute Arbitrary Code/Commands -- Existing Account Modify Arbitrary Files -- Existing Account Denial of Service -- Remote with User Interaction Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-14661 CVE-2018-14660 CVE-2018-14659 CVE-2018-14653 CVE-2018-14652 CVE-2018-10930 CVE-2018-10928 CVE-2018-10927 CVE-2018-10926 CVE-2018-10914 CVE-2018-10913 CVE-2018-10911 CVE-2018-10907 CVE-2018-10904 CVE-2018-10841 CVE-2018-1465 CVE-2018-1092 CVE-2018-1088 Reference: ASB-2019.0002 ESB-2020.1817 ESB-2019.2341 ESB-2019.1800 ESB-2019.0833 Original Bulletin: https://lists.debian.org/debian-lts-announce/2021/11/msg00000.html - --------------------------BEGIN INCLUDED TEXT-------------------- - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2806-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany November 01, 2021 https://wiki.debian.org/LTS - ------------------------------------------------------------------------- Package : glusterfs Version : 3.8.8-1+deb9u1 CVE ID : CVE-2018-1088 CVE-2018-10841 CVE-2018-10904 CVE-2018-10907= =20 CVE-2018-10911 CVE-2018-10913 CVE-2018-10914 CVE-2018-1092= 3=20 CVE-2018-10926 CVE-2018-10927 CVE-2018-10928 CVE-2018-1092= 9=20 CVE-2018-10930 CVE-2018-14652 CVE-2018-14653 CVE-2018-1465= 4=20 CVE-2018-14659 CVE-2018-14660 CVE-2018-14661 Debian Bug : 909215 Multiple security vulnerabilities were discovered in GlusterFS, a clustered file system. Buffer overflows and path traversal issues may lead to information disclosure, denial-of-service or the execution of arbitrary code. For Debian 9 stretch, these problems have been fixed in version 3.8.8-1+deb9u1. We recommend that you upgrade your glusterfs packages. For the detailed security status of glusterfs please refer to its security tracker page at: https://security-tracker.debian.org/tracker/glusterfs Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQKTBAABCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmGAd1pfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeSkow/7BbIj0fUJOM5kRtCo1oPI5c0TOxO9qi5CKpEDl4GYatpnyFRIkvwDZkti MWLyEnNhhJLM8DwSjYcak17liLFfa+IT+lV7p94fZo/nh1lg/GedwmCYWPpAOJgh PAm9/44xStyOSPjL3r7Qbyh4/APwKG1iYrnXcw7lHci9gmZBbZG9UmyyoF3pQ+YJ +u07z39aixH4+8GklmtPteY+OsnPp5ogepS+s1tOkdVEph23SkBXbycHIjGJ9EhK QYeDFrsmbyphmp//mtF7sk1Y8UtbJBmg6Kfw84siujhZqv7VCAQBn2To4vs0wl73 5XIe2Rqc1WVkThra0bzHhk2ellX8f1lQukcaSH1GERUa7AIw5vWoLO4cdL5Vxc0R uC339iMuJkXp7dYqnUlWomr2LMPKlc4AC7NMCHdLLF8BS9uoiwB5Lej+dn660Yav V9n1duORJRfzyeIHIq5U8FiSbSgehg2Ppc+zXBakOI9ttKTEPNGNMc16giCKQq0O x1i13E0tVfnjSiQjqEGZpVBYmfTP+LarfeOiNnBW9poC6jdbj5z3jyfl9t+/H+cg YoOqfPPVaLHkUVYWwFuCpxaQY35b+0zw7sEcs6y5LuPiOYKlIqoAMx1MHCJ3xbkr ODBDAYqTu0pGEccVK1h7e6IeEy8hcTp98DPYDZewyNUCTI+p0nA= =+cPy - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYYCvcONLKJtyKPYoAQhCkhAAsSuTpZ3E5ozFZKJ+tp5Mu9A66LWtmwUM ThL3pY4nhOxivpelgy46NSHOJDLafYY4UtORIcyCwzQQFZHfnTRYdNonHYB7bMIV AunHvPf/z8mDzll5hDFyj0BxInKSeDJnKRozF6ENRifB3eL9iA9YSG2qXQ6mJSF9 ADFeaKrkrqhnBu3v2zX2Oh/TK2Geg5yUFLXe/1YUpv6TP+4fZH94ZTBXJX4Zfv4U 1azPnmywZsvhMxsJrAPlZ8KoaIWS8sPtKzXhvgg/bNL+67CgASCLGoSkultKy3W0 Bgb0TOYVPADoWd+9M6qKCAB0vS1IxAPLM8Va7JwkbySHEaN24n5pGBR2FaHzpnsI XkBgLTCK7SnB+lRFQ6ocPnqToW+FpSiHMNcB/EUCDL6mXlhPZPoJzvCRN9JFbAAf mVy7joex6vky6LOQspP4X/RBQqfOm+ZufCspXpK788Pjufhc/oRuA1TVnSa3ra3u G2lV2ow2CwBKG97W1U82VMtqb6Z/YhMq5v8loO5vzWjIaDIATFqwoHQCx2mtPvo3 qNLANveM9gVgNwjPiTK+w1ELKDbhlq2/zKbhJlJLbX+Syb7UBXt1AkNsOyNzkEfr B/RAjLdwYrRbVXWm/6auaL+pbzh+s1VxdKn2JGzcm3oIaE6kRNy8hnMxu4xjJt7N LfTRKltWnnc= =N/y6 -----END PGP SIGNATURE-----