--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2018-a54270a213
2018-10-02 19:26:59.107998
--------------------------------------------------------------------------------Name        : glusterfs
Product     : Fedora 29
Version     : 4.1.5
Release     : 1.fc29
URL         : https://docs.gluster.org/en/latest/
Summary     : Distributed File System
Description :
GlusterFS is a distributed file-system capable of scaling to several
petabytes. It aggregates various storage bricks over Infiniband RDMA
or TCP/IP interconnect into one large parallel network file
system. GlusterFS is one of the most sophisticated file systems in
terms of features and extensibility.  It borrows a powerful concept
called Translators from GNU Hurd kernel. Much of the code in GlusterFS
is in user space and easily manageable.

This package includes the glusterfs binary, the glusterfsd daemon and the
libglusterfs and glusterfs translator modules common to both GlusterFS server
and client framework.

--------------------------------------------------------------------------------Update Information:

4.1.5 GA  ----  4.1.4 GA Security Fix for CVE-2018-10904 Security Fix for
CVE-2018-10907 Security Fix for CVE-2018-10911 Security Fix for CVE-2018-10913
Security Fix for CVE-2018-10914 Security Fix for CVE-2018-10923 Security Fix for
CVE-2018-10926 Security Fix for CVE-2018-10927 Security Fix for CVE-2018-10928
Security Fix for CVE-2018-10929 Security Fix for CVE-2018-10930  ----  missing
/run/gluster/metrics, see bz#1624006
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1625067 - CVE-2018-10927 glusterfs: File status information leak and denial of service [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625067
  [ 2 ] Bug #1625068 - CVE-2018-10928 glusterfs: Improper resolution of symlinks allows for privilege escalation [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625068
  [ 3 ] Bug #1625069 - CVE-2018-10929 glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625069
  [ 4 ] Bug #1625074 - CVE-2018-10913 glusterfs:  Information Exposure in posix_get_file_contents function in posix-helpers.c [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625074
  [ 5 ] Bug #1625075 - CVE-2018-10914 glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625075
  [ 6 ] Bug #1625079 - CVE-2018-10911 glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625079
  [ 7 ] Bug #1625080 - CVE-2018-10907 glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625080
  [ 8 ] Bug #1625085 - CVE-2018-10930 glusterfs: Files can be renamed outside volume [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625085
  [ 9 ] Bug #1625086 - CVE-2018-10926 glusterfs: Device files can be created in arbitrary locations [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625086
  [ 10 ] Bug #1625091 - CVE-2018-10923 glusterfs: I/O to arbitrary devices on storage server [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625091
  [ 11 ] Bug #1625103 - CVE-2018-10904 glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1625103
  [ 12 ] Bug #1624006 - /var/run/gluster/metrics/ wasn't created automatically
        https://bugzilla.redhat.com/show_bug.cgi?id=1624006
  [ 13 ] Bug #1614769 - Typo in build flag
        https://bugzilla.redhat.com/show_bug.cgi?id=1614769
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2018-a54270a213' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Fedora 29: glusterfs Security Update

October 2, 2018
4.1.5 GA ---- 4.1.4 GA Security Fix for CVE-2018-10904 Security Fix for CVE-2018-10907 Security Fix for CVE-2018-10911 Security Fix for CVE-2018-10913 Security Fix for CVE-2018-109...

Summary

GlusterFS is a distributed file-system capable of scaling to several

petabytes. It aggregates various storage bricks over Infiniband RDMA

or TCP/IP interconnect into one large parallel network file

system. GlusterFS is one of the most sophisticated file systems in

terms of features and extensibility. It borrows a powerful concept

called Translators from GNU Hurd kernel. Much of the code in GlusterFS

is in user space and easily manageable.

This package includes the glusterfs binary, the glusterfsd daemon and the

libglusterfs and glusterfs translator modules common to both GlusterFS server

and client framework.

4.1.5 GA ---- 4.1.4 GA Security Fix for CVE-2018-10904 Security Fix for

CVE-2018-10907 Security Fix for CVE-2018-10911 Security Fix for CVE-2018-10913

Security Fix for CVE-2018-10914 Security Fix for CVE-2018-10923 Security Fix for

CVE-2018-10926 Security Fix for CVE-2018-10927 Security Fix for CVE-2018-10928

Security Fix for CVE-2018-10929 Security Fix for CVE-2018-10930 ---- missing

/run/gluster/metrics, see bz#1624006

[ 1 ] Bug #1625067 - CVE-2018-10927 glusterfs: File status information leak and denial of service [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625067

[ 2 ] Bug #1625068 - CVE-2018-10928 glusterfs: Improper resolution of symlinks allows for privilege escalation [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625068

[ 3 ] Bug #1625069 - CVE-2018-10929 glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625069

[ 4 ] Bug #1625074 - CVE-2018-10913 glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625074

[ 5 ] Bug #1625075 - CVE-2018-10914 glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625075

[ 6 ] Bug #1625079 - CVE-2018-10911 glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625079

[ 7 ] Bug #1625080 - CVE-2018-10907 glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625080

[ 8 ] Bug #1625085 - CVE-2018-10930 glusterfs: Files can be renamed outside volume [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625085

[ 9 ] Bug #1625086 - CVE-2018-10926 glusterfs: Device files can be created in arbitrary locations [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625086

[ 10 ] Bug #1625091 - CVE-2018-10923 glusterfs: I/O to arbitrary devices on storage server [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625091

[ 11 ] Bug #1625103 - CVE-2018-10904 glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code [fedora-all]

https://bugzilla.redhat.com/show_bug.cgi?id=1625103

[ 12 ] Bug #1624006 - /var/run/gluster/metrics/ wasn't created automatically

https://bugzilla.redhat.com/show_bug.cgi?id=1624006

[ 13 ] Bug #1614769 - Typo in build flag

https://bugzilla.redhat.com/show_bug.cgi?id=1614769

su -c 'dnf upgrade --advisory FEDORA-2018-a54270a213' at the command

line. For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/keys

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/

List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines

List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

FEDORA-2018-a54270a213 2018-10-02 19:26:59.107998 Product : Fedora 29 Version : 4.1.5 Release : 1.fc29 URL : https://docs.gluster.org/en/latest/ Summary : Distributed File System Description : GlusterFS is a distributed file-system capable of scaling to several petabytes. It aggregates various storage bricks over Infiniband RDMA or TCP/IP interconnect into one large parallel network file system. GlusterFS is one of the most sophisticated file systems in terms of features and extensibility. It borrows a powerful concept called Translators from GNU Hurd kernel. Much of the code in GlusterFS is in user space and easily manageable. This package includes the glusterfs binary, the glusterfsd daemon and the libglusterfs and glusterfs translator modules common to both GlusterFS server and client framework. 4.1.5 GA ---- 4.1.4 GA Security Fix for CVE-2018-10904 Security Fix for CVE-2018-10907 Security Fix for CVE-2018-10911 Security Fix for CVE-2018-10913 Security Fix for CVE-2018-10914 Security Fix for CVE-2018-10923 Security Fix for CVE-2018-10926 Security Fix for CVE-2018-10927 Security Fix for CVE-2018-10928 Security Fix for CVE-2018-10929 Security Fix for CVE-2018-10930 ---- missing /run/gluster/metrics, see bz#1624006 [ 1 ] Bug #1625067 - CVE-2018-10927 glusterfs: File status information leak and denial of service [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625067 [ 2 ] Bug #1625068 - CVE-2018-10928 glusterfs: Improper resolution of symlinks allows for privilege escalation [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625068 [ 3 ] Bug #1625069 - CVE-2018-10929 glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625069 [ 4 ] Bug #1625074 - CVE-2018-10913 glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625074 [ 5 ] Bug #1625075 - CVE-2018-10914 glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625075 [ 6 ] Bug #1625079 - CVE-2018-10911 glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625079 [ 7 ] Bug #1625080 - CVE-2018-10907 glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625080 [ 8 ] Bug #1625085 - CVE-2018-10930 glusterfs: Files can be renamed outside volume [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625085 [ 9 ] Bug #1625086 - CVE-2018-10926 glusterfs: Device files can be created in arbitrary locations [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625086 [ 10 ] Bug #1625091 - CVE-2018-10923 glusterfs: I/O to arbitrary devices on storage server [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625091 [ 11 ] Bug #1625103 - CVE-2018-10904 glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1625103 [ 12 ] Bug #1624006 - /var/run/gluster/metrics/ wasn't created automatically https://bugzilla.redhat.com/show_bug.cgi?id=1624006 [ 13 ] Bug #1614769 - Typo in build flag https://bugzilla.redhat.com/show_bug.cgi?id=1614769 su -c 'dnf upgrade --advisory FEDORA-2018-a54270a213' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Change Log

References

Update Instructions

Severity
Product : Fedora 29
Version : 4.1.5
Release : 1.fc29
URL : https://docs.gluster.org/en/latest/
Summary : Distributed File System

Related News