Redhat

Gluster Storage

25 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Published 08.10.2018 15:29:00
  • Last modified 21.11.2024 03:40:23

Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. Th...

  • EPSS 0.48%
  • Published 11.09.2018 15:29:00
  • Last modified 21.11.2024 03:59:14

Tendrl API in Red Hat Gluster Storage before 3.4.0 does not immediately remove session tokens after a user logs out. Session tokens remain active for a few minutes allowing attackers to replay tokens acquired via sniffing/MITM attacks and authenticat...

  • EPSS 0.85%
  • Published 04.09.2018 15:29:00
  • Last modified 21.11.2024 03:42:19

A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing any...

  • EPSS 19.42%
  • Published 26.07.2018 18:29:00
  • Last modified 21.11.2024 03:08:56

It was found that samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8 did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in pl...

  • EPSS 27.33%
  • Published 26.07.2018 16:29:00
  • Last modified 21.11.2024 03:08:57

An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to ...

  • EPSS 3.69%
  • Published 19.07.2018 13:29:00
  • Last modified 21.11.2024 03:31:59

Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting ...

  • EPSS 0.06%
  • Published 13.07.2018 22:29:00
  • Last modified 21.11.2024 03:42:11

A flaw was found in ansible. ansible.cfg is read from the current working directory which can be altered to make it point to a plugin or a module path under the control of an attacker, thus allowing the attacker to execute arbitrary code.

  • EPSS 5.68%
  • Published 18.04.2018 16:29:00
  • Last modified 21.11.2024 03:59:09

A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.

  • EPSS 0.53%
  • Published 08.11.2017 19:29:00
  • Last modified 20.04.2025 01:37:25

It was discovered that the fix for CVE-2017-12163 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.

  • EPSS 0.39%
  • Published 08.11.2017 19:29:00
  • Last modified 20.04.2025 01:37:25

It was discovered that the fix for CVE-2017-12151 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.