An update for glusterfs is now available for openEuler-22.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2024-1268 Final 1.0 1.0 2024-03-15 Initial 2024-03-15 2024-03-15 openEuler SA Tool V1.0 2024-03-15 glusterfs security update An update for glusterfs is now available for openEuler-22.03-LTS-SP2. GlusterFS is a distributed file-system capable of scaling to several petabytes. It aggregates various storage bricks over TCP/IP interconnect into one large parallel network filesystem. GlusterFS is one of the most sophisticated file systems in terms of features and extensibility. It borrows a powerful concept called Translators from GNU Hurd kernel. Much of the code in GlusterFS is in user space and easily manageable. Security Fix(es): In Gluster GlusterFS 11.0, there is an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free.(CVE-2022-48340) An update for glusterfs is now available for openEuler-22.03-LTS-SP2. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High glusterfs https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1268 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-48340 https://nvd.nist.gov/vuln/detail/CVE-2022-48340 openEuler-22.03-LTS-SP2 libglusterfs0-10.0-9.oe2203sp2.aarch64.rpm python3-gluster-10.0-9.oe2203sp2.aarch64.rpm glusterfs-debuginfo-10.0-9.oe2203sp2.aarch64.rpm glusterfs-geo-replication-10.0-9.oe2203sp2.aarch64.rpm libgfxdr0-10.0-9.oe2203sp2.aarch64.rpm libglusterd0-10.0-9.oe2203sp2.aarch64.rpm libgfrpc0-10.0-9.oe2203sp2.aarch64.rpm libgfxdr-devel-10.0-9.oe2203sp2.aarch64.rpm glusterfs-help-10.0-9.oe2203sp2.aarch64.rpm glusterfs-thin-arbiter-10.0-9.oe2203sp2.aarch64.rpm libgfchangelog0-10.0-9.oe2203sp2.aarch64.rpm libgfrpc-devel-10.0-9.oe2203sp2.aarch64.rpm glusterfs-cli-10.0-9.oe2203sp2.aarch64.rpm glusterfs-cloudsync-plugins-10.0-9.oe2203sp2.aarch64.rpm glusterfs-client-xlators-10.0-9.oe2203sp2.aarch64.rpm glusterfs-events-10.0-9.oe2203sp2.aarch64.rpm libgfapi0-10.0-9.oe2203sp2.aarch64.rpm glusterfs-fuse-10.0-9.oe2203sp2.aarch64.rpm glusterfs-10.0-9.oe2203sp2.aarch64.rpm libgfchangelog-devel-10.0-9.oe2203sp2.aarch64.rpm glusterfs-extra-xlators-10.0-9.oe2203sp2.aarch64.rpm glusterfs-server-10.0-9.oe2203sp2.aarch64.rpm glusterfs-debugsource-10.0-9.oe2203sp2.aarch64.rpm libglusterfs-devel-10.0-9.oe2203sp2.aarch64.rpm libgfapi-devel-10.0-9.oe2203sp2.aarch64.rpm glusterfs-resource-agents-10.0-9.oe2203sp2.noarch.rpm glusterfs-10.0-9.oe2203sp2.src.rpm glusterfs-cli-10.0-9.oe2203sp2.x86_64.rpm glusterfs-server-10.0-9.oe2203sp2.x86_64.rpm libgfxdr0-10.0-9.oe2203sp2.x86_64.rpm glusterfs-extra-xlators-10.0-9.oe2203sp2.x86_64.rpm libglusterfs0-10.0-9.oe2203sp2.x86_64.rpm libgfrpc-devel-10.0-9.oe2203sp2.x86_64.rpm libgfchangelog0-10.0-9.oe2203sp2.x86_64.rpm glusterfs-cloudsync-plugins-10.0-9.oe2203sp2.x86_64.rpm python3-gluster-10.0-9.oe2203sp2.x86_64.rpm glusterfs-client-xlators-10.0-9.oe2203sp2.x86_64.rpm glusterfs-debuginfo-10.0-9.oe2203sp2.x86_64.rpm glusterfs-help-10.0-9.oe2203sp2.x86_64.rpm libgfapi0-10.0-9.oe2203sp2.x86_64.rpm libgfapi-devel-10.0-9.oe2203sp2.x86_64.rpm libgfxdr-devel-10.0-9.oe2203sp2.x86_64.rpm libgfrpc0-10.0-9.oe2203sp2.x86_64.rpm glusterfs-debugsource-10.0-9.oe2203sp2.x86_64.rpm glusterfs-events-10.0-9.oe2203sp2.x86_64.rpm libgfchangelog-devel-10.0-9.oe2203sp2.x86_64.rpm glusterfs-10.0-9.oe2203sp2.x86_64.rpm glusterfs-geo-replication-10.0-9.oe2203sp2.x86_64.rpm glusterfs-fuse-10.0-9.oe2203sp2.x86_64.rpm glusterfs-thin-arbiter-10.0-9.oe2203sp2.x86_64.rpm libglusterfs-devel-10.0-9.oe2203sp2.x86_64.rpm libglusterd0-10.0-9.oe2203sp2.x86_64.rpm In Gluster GlusterFS 11.0, there is an xlators/cluster/dht/src/dht-common.c dht_setxattr_mds_cbk use-after-free. 2024-03-15 CVE-2022-48340 openEuler-22.03-LTS-SP2 High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H glusterfs security update 2024-03-15 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1268