----------------------------------------------------------------------------------
@MSGID:
<30b9c3b3-a9d4-cb36-bfeb-38d2b3174833@canonical.com> 81791079
@REPLYADDR Ian Constantin
<ian.constantin@canonical.com>
@REPLYTO 2:5075/128 Ian Constantin
@CHRS: CP866 2
@RFC: 1 0
@RFC-Message-ID:
<30b9c3b3-a9d4-cb36-bfeb-38d2b3174833@canonical.com>
@RFC-MIME-Version: 1.0
@RFC-Content-Type: multipart/mixed;
boundary="===============1807367322216393486=="
@RFC-Content-Transfer-Encoding: 8bit
@TZUTC: 0300
@TID: FIDOGATE-5.12-ge4e8b94
==========================================================================
Ubuntu Security Notice USN-5989-1
March 30, 2023
glusterfs vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
GlusterFS could be made to crash if it received a specially
crafted request.
Software Description:
- glusterfs: clustered file-system
Details:
Tao Lyu discovered that GlusterFS did not properly handle certain
event notifications. An attacker could possibly use this issue to
cause a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 ESM:
glusterfs-client 3.7.6-1ubuntu1+esm2
glusterfs-common 3.7.6-1ubuntu1+esm2
glusterfs-server 3.7.6-1ubuntu1+esm2
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5989-1
CVE-2023-26253
--- FIDOGATE 5.12-ge4e8b94
* Origin: Usenet Network (2:5075/128)
SEEN-BY: 221/6 301/1 467/888 5001/100 5005/49
5015/255 5019/40 5020/715 848
SEEN-BY: 5020/1042 4441 12000 5030/49 1081 5075/35
128
@PATH: 5075/128 5020/1042 4441