{
  "threat_severity" : "Important",
  "public_date" : "2018-04-19T00:00:00Z",
  "bugzilla" : {
    "description" : "glusterfs: auth.allow allows unauthenticated clients to mount gluster volumes (CVE-2018-1088 regression)",
    "id" : "1570891",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1570891"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.0",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-287",
  "details" : [ "glusterfs server before versions 3.10.12, 4.0.2 is vulnerable when using 'auth.allow' option which allows any unauthenticated gluster client to connect from any network to mount gluster storage volumes. NOTE: this vulnerability exists because of a CVE-2018-1088 regression.", "It was found that fix for CVE-2018-1088 introduced a new vulnerability in the way 'auth.allow' is implemented in glusterfs server. An unauthenticated gluster client could mount gluster storage volumes." ],
  "statement" : "This vulnerability affects gluster servers that use 'auth.allow' to restrict access to gluster volumes. Gluster servers using TLS to authenticate gluster clients are not affected by this. This vulnerability allows any client to connect to any gluster volume which only uses auth.allow to restrict access.\nThis issue did not affect the versions of glusterfs as shipped with Red Hat Enterprise Linux 6 and 7 because only gluster client is shipped in these products. CVE-2018-1112 affects glusterfs-server package as shipped with Red Hat Gluster Storage 3.",
  "affected_release" : [ {
    "product_name" : "Native Client for RHEL 6 for Red Hat Storage",
    "release_date" : "2018-04-30T00:00:00Z",
    "advisory" : "RHSA-2018:1268",
    "cpe" : "cpe:/a:redhat:storage:3:client:el6",
    "package" : "glusterfs-0:3.8.4-54.9.el6"
  }, {
    "product_name" : "Native Client for RHEL 7 for Red Hat Storage",
    "release_date" : "2018-04-30T00:00:00Z",
    "advisory" : "RHSA-2018:1269",
    "cpe" : "cpe:/a:redhat:storage:3:client:el7",
    "package" : "glusterfs-0:3.8.4-54.8.el7"
  }, {
    "product_name" : "Red Hat Gluster Storage 3.3 for RHEL 6",
    "release_date" : "2018-04-30T00:00:00Z",
    "advisory" : "RHSA-2018:1268",
    "cpe" : "cpe:/a:redhat:storage:3.3:server:el6",
    "package" : "glusterfs-0:3.8.4-54.9.el6rhs"
  }, {
    "product_name" : "Red Hat Gluster Storage 3.3 for RHEL 7",
    "release_date" : "2018-04-30T00:00:00Z",
    "advisory" : "RHSA-2018:1269",
    "cpe" : "cpe:/a:redhat:storage:3.3:server:el7",
    "package" : "glusterfs-0:3.8.4-54.8.el7rhgs"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7",
    "release_date" : "2018-04-30T00:00:00Z",
    "advisory" : "RHSA-2018:1269",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7::hypervisor",
    "package" : "glusterfs-0:3.8.4-54.8.el7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "glusterfs",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "glusterfs",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "glusterfs",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-1112\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-1112\nhttps://access.redhat.com/articles/3422521" ],
  "csaw" : true,
  "name" : "CVE-2018-1112",
  "mitigation" : {
    "value" : "1. Use TLS Authentication to authenticate gluster clients to limit access to gluster storage volumes\n2. The gluster server should be on LAN, firewalled to trusted systems, and not reachable from public networks.",
    "lang" : "en:us"
  }
}