Debian Package Tracker
Register | Log in
Subscribe

glusterfs

Choose email to subscribe with

general
  • source: glusterfs (main)
  • version: 9.0-1
  • maintainer: Patrick Matthäi (DMD)
  • arch: any
  • std-ver: 4.5.1
  • VCS: unknown
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.5.2-2+deb8u3
  • o-o-sec: 3.5.2-2+deb8u5
  • oldstable: 3.8.8-1
  • old-bpo: 4.1.5-1~bpo9+1
  • stable: 5.5-3
  • stable-bpo: 8.0-2~bpo10+1
  • testing: 8.3-1
  • unstable: 9.0-1
versioned links
  • 3.5.2-2+deb8u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.5.2-2+deb8u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.8.8-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.1.5-1~bpo9+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.5-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.0-2~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.3-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 9.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • glusterfs-client
  • glusterfs-common
  • glusterfs-server
  • libgfapi0
  • libgfchangelog0
  • libgfrpc0
  • libgfxdr0
  • libglusterd0
  • libglusterfs-dev
  • libglusterfs0
action needed
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2021-01-20 Last update: 2021-01-22 20:31
Multiarch hinter reports 1 issue(s) normal
There are issues with the multiarch metadata for this package.
  • libglusterfs-dev could be marked Multi-Arch: same
Created: 2020-12-11 Last update: 2021-01-22 20:02
19 ignored security issues in stretch low
There are 19 open security issues in stretch.
19 issues skipped by the security teams:
  • CVE-2018-10841: glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
  • CVE-2018-1088: A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.
  • CVE-2018-10904: It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.
  • CVE-2018-10907: It was found that glusterfs server is vulnerable to multiple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.
  • CVE-2018-10911: A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.
  • CVE-2018-10913: An information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.
  • CVE-2018-10914: It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.
  • CVE-2018-10923: It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.
  • CVE-2018-10926: A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.
  • CVE-2018-10927: A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.
  • CVE-2018-10928: A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.
  • CVE-2018-10929: A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.
  • CVE-2018-10930: A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.
  • CVE-2018-14652: The Gluster file system through versions 3.12 and 4.1.4 is vulnerable to a buffer overflow in the 'features/index' translator via the code handling the 'GF_XATTR_CLRLK_CMD' xattr in the 'pl_getxattr' function. A remote authenticated attacker could exploit this on a mounted volume to cause a denial of service.
  • CVE-2018-14653: The Gluster file system through versions 4.1.4 and 3.12 is vulnerable to a heap-based buffer overflow in the '__server_getspec' function via the 'gf_getspec_req' RPC message. A remote authenticated attacker could exploit this to cause a denial of service or other potential unspecified impact.
  • CVE-2018-14654: The Gluster file system through version 4.1.4 is vulnerable to abuse of the 'features/index' translator. A remote attacker with access to mount volumes could exploit this via the 'GF_XATTROP_ENTRY_IN_KEY' xattrop to create arbitrary, empty files on the target server.
  • CVE-2018-14659: The Gluster file system through versions 4.1.4 and 3.1.2 is vulnerable to a denial of service attack via use of the 'GF_XATTR_IOSTATS_DUMP_KEY' xattr. A remote, authenticated attacker could exploit this by mounting a Gluster volume and repeatedly calling 'setxattr(2)' to trigger a state dump and create an arbitrary number of files in the server's runtime directory.
  • CVE-2018-14660: A flaw was found in glusterfs server through versions 4.1.4 and 3.1.2 which allowed repeated usage of GF_META_LOCK_KEY xattr. A remote, authenticated attacker could use this flaw to create multiple locks for single inode by using setxattr repetitively resulting in memory exhaustion of glusterfs server node.
  • CVE-2018-14661: It was found that usage of snprintf function in feature/locks translator of glusterfs server 3.8.4, as shipped with Red Hat Gluster Storage, was vulnerable to a format string attack. A remote, authenticated attacker could use this flaw to cause remote denial of service.
Please fix them.
Created: 2018-04-18 Last update: 2021-01-19 20:00
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2020-08-25 Last update: 2020-08-25 17:00
testing migrations
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migration status for glusterfs (8.3-1 to 9.0-1): Waiting for test results, another package or too young (no action required now - check later)
    • Issues preventing migration:
    • Too young, only 4 of 5 days old
    • Additional info:
    • Piuparts tested OK - https://piuparts.debian.org/sid/source/g/glusterfs.html
    • Not considered
news
[rss feed]
  • [2021-01-19] Accepted glusterfs 9.0-1 (source) into unstable (Patrick Matthäi)
  • [2020-12-14] glusterfs 8.3-1 MIGRATED to testing (Debian testing watch)
  • [2020-12-08] Accepted glusterfs 8.3-1 (source) into unstable (Patrick Matthäi)
  • [2020-11-25] glusterfs 8.2-3 MIGRATED to testing (Debian testing watch)
  • [2020-11-19] Accepted glusterfs 8.2-3 (source) into unstable (Patrick Matthäi)
  • [2020-11-18] glusterfs 8.2-2 MIGRATED to testing (Debian testing watch)
  • [2020-11-13] Accepted glusterfs 8.2-2 (source) into unstable (Patrick Matthäi)
  • [2020-09-22] glusterfs 8.2-1 MIGRATED to testing (Debian testing watch)
  • [2020-09-17] Accepted glusterfs 8.2-1 (source) into unstable (Patrick Matthäi)
  • [2020-08-31] glusterfs 8.1-1 MIGRATED to testing (Debian testing watch)
  • [2020-08-26] Accepted glusterfs 8.1-1 (source) into unstable (Patrick Matthäi)
  • [2020-08-25] Accepted glusterfs 8.0-3 (source) into unstable (Patrick Matthäi)
  • [2020-08-21] Accepted glusterfs 8.0-2~bpo10+1 (source amd64) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Christoph Martin)
  • [2020-08-04] glusterfs 8.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-07-30] Accepted glusterfs 8.0-2 (source) into unstable (Patrick Matthäi)
  • [2020-07-27] Accepted glusterfs 8.0-1 (source amd64) into unstable, unstable (Debian FTP Masters) (signed by: Patrick Matthäi)
  • [2020-05-26] glusterfs 7.6-1 MIGRATED to testing (Debian testing watch)
  • [2020-05-20] Accepted glusterfs 7.6-1 (source) into unstable (Patrick Matthäi)
  • [2020-04-25] glusterfs 7.5-1 MIGRATED to testing (Debian testing watch)
  • [2020-04-20] Accepted glusterfs 7.5-1 (source) into unstable (Patrick Matthäi)
  • [2020-04-06] glusterfs 7.4-1 MIGRATED to testing (Debian testing watch)
  • [2020-03-31] Accepted glusterfs 7.4-1 (source) into unstable (Patrick Matthäi)
  • [2020-03-07] glusterfs 7.3-1 MIGRATED to testing (Debian testing watch)
  • [2020-03-02] Accepted glusterfs 7.3-1 (source) into unstable (Patrick Matthäi)
  • [2020-01-29] glusterfs 7.2-2 MIGRATED to testing (Debian testing watch)
  • [2020-01-23] Accepted glusterfs 7.2-2 (source) into unstable (Patrick Matthäi)
  • [2020-01-20] Accepted glusterfs 7.2-1 (source) into unstable (Patrick Matthäi)
  • [2019-12-29] glusterfs 7.1-1 MIGRATED to testing (Debian testing watch)
  • [2019-12-24] Accepted glusterfs 7.1-1 (source) into unstable (Patrick Matthäi)
  • [2019-11-13] glusterfs 7.0-2 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 1
links
  • homepage
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 9.0-1
  • 20 bugs (2 patches)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing