An update for glusterfs is now available for openEuler-22.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1268
Final
1.0
1.0
2024-03-15
Initial
2024-03-15
2024-03-15
openEuler SA Tool V1.0
2024-03-15
glusterfs security update
An update for glusterfs is now available for openEuler-22.03-LTS-SP2.
GlusterFS is a distributed file-system capable of scaling to several petabytes. It aggregates various storage bricks over TCP/IP interconnect into one large parallel network filesystem. GlusterFS is one of the most sophisticated file systems in terms of features and extensibility. It borrows a powerful concept called Translators from GNU Hurd kernel. Much of the code in GlusterFS is in user space and easily manageable.
Security Fix(es):
In Gluster GlusterFS 11.0, there is an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free.(CVE-2022-48340)
An update for glusterfs is now available for openEuler-22.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
glusterfs
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1268
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-48340
https://nvd.nist.gov/vuln/detail/CVE-2022-48340
openEuler-22.03-LTS-SP2
libglusterfs0-10.0-9.oe2203sp2.aarch64.rpm
python3-gluster-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-debuginfo-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-geo-replication-10.0-9.oe2203sp2.aarch64.rpm
libgfxdr0-10.0-9.oe2203sp2.aarch64.rpm
libglusterd0-10.0-9.oe2203sp2.aarch64.rpm
libgfrpc0-10.0-9.oe2203sp2.aarch64.rpm
libgfxdr-devel-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-help-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-thin-arbiter-10.0-9.oe2203sp2.aarch64.rpm
libgfchangelog0-10.0-9.oe2203sp2.aarch64.rpm
libgfrpc-devel-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-cli-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-cloudsync-plugins-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-client-xlators-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-events-10.0-9.oe2203sp2.aarch64.rpm
libgfapi0-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-fuse-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-10.0-9.oe2203sp2.aarch64.rpm
libgfchangelog-devel-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-extra-xlators-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-server-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-debugsource-10.0-9.oe2203sp2.aarch64.rpm
libglusterfs-devel-10.0-9.oe2203sp2.aarch64.rpm
libgfapi-devel-10.0-9.oe2203sp2.aarch64.rpm
glusterfs-resource-agents-10.0-9.oe2203sp2.noarch.rpm
glusterfs-10.0-9.oe2203sp2.src.rpm
glusterfs-cli-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-server-10.0-9.oe2203sp2.x86_64.rpm
libgfxdr0-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-extra-xlators-10.0-9.oe2203sp2.x86_64.rpm
libglusterfs0-10.0-9.oe2203sp2.x86_64.rpm
libgfrpc-devel-10.0-9.oe2203sp2.x86_64.rpm
libgfchangelog0-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-cloudsync-plugins-10.0-9.oe2203sp2.x86_64.rpm
python3-gluster-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-client-xlators-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-debuginfo-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-help-10.0-9.oe2203sp2.x86_64.rpm
libgfapi0-10.0-9.oe2203sp2.x86_64.rpm
libgfapi-devel-10.0-9.oe2203sp2.x86_64.rpm
libgfxdr-devel-10.0-9.oe2203sp2.x86_64.rpm
libgfrpc0-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-debugsource-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-events-10.0-9.oe2203sp2.x86_64.rpm
libgfchangelog-devel-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-geo-replication-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-fuse-10.0-9.oe2203sp2.x86_64.rpm
glusterfs-thin-arbiter-10.0-9.oe2203sp2.x86_64.rpm
libglusterfs-devel-10.0-9.oe2203sp2.x86_64.rpm
libglusterd0-10.0-9.oe2203sp2.x86_64.rpm
In Gluster GlusterFS 11.0, there is an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free.
2024-03-15
CVE-2022-48340
openEuler-22.03-LTS-SP2
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
glusterfs security update
2024-03-15
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1268