Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2017-0484.html | Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2017-0486.html | Vendor Advisory |
http://www.securityfocus.com/bid/99311 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038128 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1200927 | Issue Tracking Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
13 Feb 2023, 00:47
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root. |
02 Feb 2023, 20:20
Type | Values Removed | Values Added |
---|---|---|
Summary | It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. | |
References |
|
Information
Published : 2017-06-27 20:29
Updated : 2023-12-10 12:15
NVD link : CVE-2015-1795
Mitre link : CVE-2015-1795
CVE.ORG link : CVE-2015-1795
JSON object : View
Products Affected
redhat
- gluster_storage
- enterprise_linux
CWE
CWE-264
Permissions, Privileges, and Access Controls