Total vulnerabilities in the database
glusterfs is vulnerable to privilege escalation on gluster server nodes. An authenticated gluster client via TLS could use gluster cli with --remote-host command to add it self to trusted storage pool and perform privileged gluster operations like adding other machines to trusted storage pool, start, stop, and delete volumes.
Software | From | Fixed in |
---|---|---|
gluster / glusterfs | - | 4.1.8 |
debian / debian_linux | 9.0 | 9.0.x |