<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">glusterfs-9.1-1.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10794</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">glusterfs-9.1-1.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the glusterfs-9.1-1.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10794</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10794</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-1088/</URL>
      <Description>SUSE CVE CVE-2018-1088 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10904/</URL>
      <Description>SUSE CVE CVE-2018-10904 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10911/</URL>
      <Description>SUSE CVE CVE-2018-10911 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10914/</URL>
      <Description>SUSE CVE CVE-2018-10914 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10924/</URL>
      <Description>SUSE CVE CVE-2018-10924 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10927/</URL>
      <Description>SUSE CVE CVE-2018-10927 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10928/</URL>
      <Description>SUSE CVE CVE-2018-10928 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-10930/</URL>
      <Description>SUSE CVE CVE-2018-10930 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="glusterfs-9.1-1.3">
      <FullProductName ProductID="glusterfs-9.1-1.3">glusterfs-9.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="glusterfs-devel-9.1-1.3">
      <FullProductName ProductID="glusterfs-devel-9.1-1.3">glusterfs-devel-9.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgfapi0-9.1-1.3">
      <FullProductName ProductID="libgfapi0-9.1-1.3">libgfapi0-9.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgfchangelog0-9.1-1.3">
      <FullProductName ProductID="libgfchangelog0-9.1-1.3">libgfchangelog0-9.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgfrpc0-9.1-1.3">
      <FullProductName ProductID="libgfrpc0-9.1-1.3">libgfrpc0-9.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgfxdr0-9.1-1.3">
      <FullProductName ProductID="libgfxdr0-9.1-1.3">libgfxdr0-9.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libglusterd0-9.1-1.3">
      <FullProductName ProductID="libglusterd0-9.1-1.3">libglusterd0-9.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libglusterfs0-9.1-1.3">
      <FullProductName ProductID="libglusterfs0-9.1-1.3">libglusterfs0-9.1-1.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-gluster-9.1-1.3">
      <FullProductName ProductID="python3-gluster-9.1-1.3">python3-gluster-9.1-1.3</FullProductName>
    </Branch>
    <Relationship ProductReference="glusterfs-9.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glusterfs-9.1-1.3">glusterfs-9.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="glusterfs-devel-9.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:glusterfs-devel-9.1-1.3">glusterfs-devel-9.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgfapi0-9.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgfapi0-9.1-1.3">libgfapi0-9.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgfchangelog0-9.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgfchangelog0-9.1-1.3">libgfchangelog0-9.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgfrpc0-9.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgfrpc0-9.1-1.3">libgfrpc0-9.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgfxdr0-9.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libgfxdr0-9.1-1.3">libgfxdr0-9.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libglusterd0-9.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libglusterd0-9.1-1.3">libglusterd0-9.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libglusterfs0-9.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libglusterfs0-9.1-1.3">libglusterfs0-9.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-gluster-9.1-1.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:python3-gluster-9.1-1.3">python3-gluster-9.1-1.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.</Note>
    </Notes>
    <CVE>CVE-2018-1088</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glusterfs-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glusterfs-devel-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfapi0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfchangelog0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfrpc0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfxdr0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterd0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterfs0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-gluster-9.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1088.html</URL>
        <Description>CVE-2018-1088</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090084</URL>
        <Description>SUSE Bug 1090084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. Attacker can use this flaw to create files and execute arbitrary code. To exploit this attacker would require sufficient access to modify the extended attributes of files on a gluster volume.</Note>
    </Notes>
    <CVE>CVE-2018-10904</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glusterfs-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glusterfs-devel-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfapi0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfchangelog0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfrpc0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfxdr0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterd0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterfs0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-gluster-9.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10904.html</URL>
        <Description>CVE-2018-10904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105776</URL>
        <Description>SUSE Bug 1105776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107018</URL>
        <Description>SUSE Bug 1107018</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the way dic_unserialize function of glusterfs does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.</Note>
    </Notes>
    <CVE>CVE-2018-10911</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glusterfs-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glusterfs-devel-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfapi0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfchangelog0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfrpc0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfxdr0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterd0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterfs0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-gluster-9.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10911.html</URL>
        <Description>CVE-2018-10911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105776</URL>
        <Description>SUSE Bug 1105776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107020</URL>
        <Description>SUSE Bug 1107020</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.</Note>
    </Notes>
    <CVE>CVE-2018-10914</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glusterfs-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glusterfs-devel-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfapi0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfchangelog0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfrpc0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfxdr0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterd0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterfs0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-gluster-9.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10914.html</URL>
        <Description>CVE-2018-10914</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105776</URL>
        <Description>SUSE Bug 1105776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107022</URL>
        <Description>SUSE Bug 1107022</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was discovered that fsync(2) system call in glusterfs client code leaks memory. An authenticated attacker could use this flaw to launch a denial of service attack by making gluster clients consume memory of the host machine.</Note>
    </Notes>
    <CVE>CVE-2018-10924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glusterfs-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glusterfs-devel-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfapi0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfchangelog0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfrpc0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfxdr0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterd0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterfs0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-gluster-9.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10924.html</URL>
        <Description>CVE-2018-10924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105776</URL>
        <Description>SUSE Bug 1105776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107024</URL>
        <Description>SUSE Bug 1107024</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.</Note>
    </Notes>
    <CVE>CVE-2018-10927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glusterfs-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glusterfs-devel-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfapi0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfchangelog0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfrpc0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfxdr0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterd0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterfs0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-gluster-9.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10927.html</URL>
        <Description>CVE-2018-10927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105776</URL>
        <Description>SUSE Bug 1105776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107026</URL>
        <Description>SUSE Bug 1107026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112909</URL>
        <Description>SUSE Bug 1112909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.</Note>
    </Notes>
    <CVE>CVE-2018-10928</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glusterfs-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glusterfs-devel-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfapi0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfchangelog0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfrpc0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfxdr0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterd0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterfs0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-gluster-9.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10928.html</URL>
        <Description>CVE-2018-10928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105776</URL>
        <Description>SUSE Bug 1105776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107027</URL>
        <Description>SUSE Bug 1107027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112909</URL>
        <Description>SUSE Bug 1112909</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.</Note>
    </Notes>
    <CVE>CVE-2018-10930</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:glusterfs-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:glusterfs-devel-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfapi0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfchangelog0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfrpc0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libgfxdr0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterd0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:libglusterfs0-9.1-1.3</ProductID>
        <ProductID>openSUSE Tumbleweed:python3-gluster-9.1-1.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-10930.html</URL>
        <Description>CVE-2018-10930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1105776</URL>
        <Description>SUSE Bug 1105776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107029</URL>
        <Description>SUSE Bug 1107029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112909</URL>
        <Description>SUSE Bug 1112909</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
