Action not permitted
Modal body text goes here.
CVE-2017-15096
Vulnerability from cvelistv5
Published
2017-10-26 17:00
Modified
2024-08-05 19:50
Severity ?
EPSS score ?
Summary
A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1504255 | Issue Tracking, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1504255 | Issue Tracking, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Red Hat, Inc. | GlusterFS |
Version: Prior to 3.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:14.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504255" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GlusterFS", "vendor": "Red Hat, Inc.", "versions": [ { "status": "affected", "version": "Prior to 3.10" } ] } ], "datePublic": "2017-10-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-26T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504255" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-15096", "datePublished": "2017-10-26T17:00:00Z", "dateReserved": "2017-10-08T00:00:00", "dateUpdated": "2024-08-05T19:50:14.965Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-15096\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2017-10-26T17:29:00.343\",\"lastModified\":\"2024-11-21T03:14:03.860\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un fallo en versiones anteriores a la 3.10 de GlusterFS. Una desreferencia de puntero NULL en la funci\u00f3n send_brick_req en glusterfsd/src/gf_attach.c podr\u00eda emplearse para provocar una denegaci\u00f3n de servicio (DoS).\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.9.0\",\"matchCriteriaId\":\"4E400E3C-66C2-43AD-83C5-C17DF478059B\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1504255\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1504255\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
rhea-2019_3249
Vulnerability from csaf_redhat
Published
2019-10-30 12:20
Modified
2024-11-14 21:42
Summary
Red Hat Enhancement Advisory: glusterfs bug fix and enhancement update
Notes
Topic
Updated glusterfs packages that fix several bugs and add various enhancements are now available.
Details
Red Hat Gluster Storage is software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.
The glusterfs packages have been rebased to upstream version 6.
(BZ#1699719)
This advisory fixes the following bugs:
* O_TRUNC is ignored during open-fd heal to prevent invalid locks.(BZ#1706549)
* Reading from bad blocks is now prevented. (BZ#1732774)
* File descriptors are marked as bad when updates to file size or version
fails. (BZ#1745107)
* Stale linkto files are identified and deleted. (BZ#1672869)
* Network family sets correctly during socket initialization so events are
sent to consumers. (BZ#1732443)
* Dynamically allocated memory is freed correctly. (BZ#1734423, BZ#1736830)
* Non-root geo-replication sessions can now use gluster commands by setting
gluster-command-dir and gluster-command-slave-dir options. (BZ#1712591)
* New auto-invalidation and performance.global-cache-invalidation options
retain page cache content to improve performance. (BZ#1676468)
* Geo-replication now succeeds when a symbolic link is renamed multiple
times between syncs. (BZ#1670429)
* During geo-replication, workers now read stderr output while tarssh runs,
avoiding deadlocks. (BZ#1708116)
* Geo-replication no longer creates extra files when many different
files are renamed to the same destination path. (BZ#1708121)
* Fixed memory leak when viewing status of all volumes. (BZ#1670415,
BZ#1686255)
* Rebalance socket files are now named using a hash based on volume name
and UUID to avoid character limits and ensure rebalance occurs.
(BZ#1720192)
* Get-status now reports state more accurately. (BZ#1726991)
* Optimized retrieving volume information to prevent handshake timeouts
when 1500+ volumes are configured in a cluster. (BZ#1652461)
* Access Control List settings are correctly removed from volumes.
(BZ#1685246)
* When eager-lock lock acquisition failed during a write transaction, the
previous lock was retained, which blocked all subsequent writes and caused
a hang. This is now handled correctly and more specific log messages have
been added to assist in diagnosing related issues. (BZ#1688395)
* The cluster.quorum-count volume option no longer receives a combination
of new and stale data in some situations, and Gluster NFS clients now honor
cluster.quorum-count when cluster.quorum-type is set to fixed. (BZ#1642425)
* Shard deletion is now a batched background process to control .shard
directory contention. Batch size is 100 by default and can be set using
features.shard-deletion-rate. (BZ#1568758)
This advisory also provides the following enhancements:
* Gluster-based time attributes are now available to avoid consistency
issues with kernel-based time attributes. (BZ#1583225, BZ#1699709,
BZ#1298724, BZ#1314508)
* The storage.fips-mode-rchecksum volume option is now enabled by default
for new volumes on clusters with an op-version of 70000 or higher.
(BZ#1706683)
* The default maximum port number for bricks is now 60999 instead of 65535.
(BZ#1658448)
* Override umask by using the following new options: storage.create-mask,
storage.create-directory-mask, storage.force-create-mode, and
storage.force-create-directory. (BZ#1539679)
* A Certificate Revocation List (CRL) can now be set using the ssl.crl-path
volume option. (BZ#1583585)
* Bricks in different subvolumes can now be different sizes, and gluster
algorithms account for this when determining placement ranges for files.
(BZ#1290124)
* Users can set a different gluster statedump path for client gfapi
processes that cannot write to /var/run/gluster. (BZ#1720461)
* Improved performance when syncing renames. (BZ#1726000)
* The storage.reserve option now reserves based on size or percentage.
(BZ#1573077)
All users are advised to upgrade to these updated packages to receive these
fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated glusterfs packages that fix several bugs and add various enhancements are now available.", "title": "Topic" }, { "category": "general", "text": "Red Hat Gluster Storage is software only scale-out storage solution that\nprovides flexible and affordable unstructured data storage. It unifies data\nstorage and infrastructure, increases performance, and improves\navailability and manageability to meet enterprise-level storage challenges.\n\nThe glusterfs packages have been rebased to upstream version 6.\n(BZ#1699719)\n\nThis advisory fixes the following bugs:\n\n* O_TRUNC is ignored during open-fd heal to prevent invalid locks.(BZ#1706549)\n* Reading from bad blocks is now prevented. (BZ#1732774)\n* File descriptors are marked as bad when updates to file size or version\nfails. (BZ#1745107)\n* Stale linkto files are identified and deleted. (BZ#1672869)\n* Network family sets correctly during socket initialization so events are\nsent to consumers. (BZ#1732443)\n* Dynamically allocated memory is freed correctly. (BZ#1734423, BZ#1736830)\n* Non-root geo-replication sessions can now use gluster commands by setting\ngluster-command-dir and gluster-command-slave-dir options. (BZ#1712591)\n* New auto-invalidation and performance.global-cache-invalidation options\nretain page cache content to improve performance. (BZ#1676468)\n* Geo-replication now succeeds when a symbolic link is renamed multiple\ntimes between syncs. (BZ#1670429)\n* During geo-replication, workers now read stderr output while tarssh runs,\navoiding deadlocks. (BZ#1708116)\n* Geo-replication no longer creates extra files when many different\nfiles are renamed to the same destination path. (BZ#1708121)\n* Fixed memory leak when viewing status of all volumes. (BZ#1670415,\nBZ#1686255)\n* Rebalance socket files are now named using a hash based on volume name\nand UUID to avoid character limits and ensure rebalance occurs.\n(BZ#1720192)\n* Get-status now reports state more accurately. (BZ#1726991)\n* Optimized retrieving volume information to prevent handshake timeouts\nwhen 1500+ volumes are configured in a cluster. (BZ#1652461)\n* Access Control List settings are correctly removed from volumes.\n(BZ#1685246)\n* When eager-lock lock acquisition failed during a write transaction, the\nprevious lock was retained, which blocked all subsequent writes and caused\na hang. This is now handled correctly and more specific log messages have\nbeen added to assist in diagnosing related issues. (BZ#1688395)\n* The cluster.quorum-count volume option no longer receives a combination\nof new and stale data in some situations, and Gluster NFS clients now honor\ncluster.quorum-count when cluster.quorum-type is set to fixed. (BZ#1642425)\n* Shard deletion is now a batched background process to control .shard\ndirectory contention. Batch size is 100 by default and can be set using\nfeatures.shard-deletion-rate. (BZ#1568758)\n\nThis advisory also provides the following enhancements:\n\n* Gluster-based time attributes are now available to avoid consistency\nissues with kernel-based time attributes. (BZ#1583225, BZ#1699709,\nBZ#1298724, BZ#1314508)\n* The storage.fips-mode-rchecksum volume option is now enabled by default\nfor new volumes on clusters with an op-version of 70000 or higher.\n(BZ#1706683)\n* The default maximum port number for bricks is now 60999 instead of 65535.\n(BZ#1658448)\n* Override umask by using the following new options: storage.create-mask,\nstorage.create-directory-mask, storage.force-create-mode, and\nstorage.force-create-directory. (BZ#1539679)\n* A Certificate Revocation List (CRL) can now be set using the ssl.crl-path\nvolume option. (BZ#1583585)\n* Bricks in different subvolumes can now be different sizes, and gluster\nalgorithms account for this when determining placement ranges for files.\n(BZ#1290124)\n* Users can set a different gluster statedump path for client gfapi\nprocesses that cannot write to /var/run/gluster. (BZ#1720461)\n* Improved performance when syncing renames. (BZ#1726000)\n* The storage.reserve option now reserves based on size or percentage.\n(BZ#1573077)\n\nAll users are advised to upgrade to these updated packages to receive these\nfixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHEA-2019:3249", "url": "https://access.redhat.com/errata/RHEA-2019:3249" }, { "category": "external", "summary": "1214489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214489" }, { "category": "external", "summary": "1277328", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277328" }, { "category": "external", "summary": "1403459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403459" }, { "category": "external", "summary": "1403530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403530" }, { "category": "external", "summary": "1475133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475133" }, { "category": "external", "summary": "1477786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477786" }, { "category": "external", "summary": "1480091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480091" }, { "category": "external", "summary": "1480907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480907" }, { "category": "external", "summary": "1493284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493284" }, { "category": "external", "summary": "1497139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497139" }, { "category": "external", "summary": "1501888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501888" }, { "category": "external", "summary": "1529501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1529501" }, { "category": "external", "summary": "1568758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568758" }, { "category": "external", "summary": "1572163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572163" }, { "category": "external", "summary": "1573077", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1573077" }, { "category": "external", "summary": "1578703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578703" }, { "category": "external", "summary": "1582394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1582394" }, { "category": "external", "summary": "1583225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583225" }, { "category": "external", "summary": "1583585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583585" }, { "category": "external", "summary": "1589359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1589359" }, { "category": "external", "summary": "1599587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599587" }, { "category": "external", "summary": "1600918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600918" }, { "category": "external", "summary": "1622957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622957" }, { "category": "external", "summary": "1623420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1623420" }, { "category": "external", "summary": "1640003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1640003" }, { "category": "external", "summary": "1642425", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1642425" }, { "category": "external", "summary": "1652461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652461" }, { "category": "external", "summary": "1659487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1659487" }, { "category": "external", "summary": "1668001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668001" }, { "category": "external", "summary": "1670415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1670415" }, { "category": "external", "summary": "1671862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671862" }, { "category": "external", "summary": "1676468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1676468" }, { "category": "external", "summary": "1676495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1676495" }, { "category": "external", "summary": "1686255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686255" }, { "category": "external", "summary": "1687641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687641" }, { "category": "external", "summary": "1688231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1688231" }, { "category": "external", "summary": "1691224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691224" }, { "category": "external", "summary": "1693933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1693933" }, { "category": "external", "summary": "1694595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694595" }, { "category": "external", "summary": "1695057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695057" }, { "category": "external", "summary": "1695081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695081" }, { "category": "external", "summary": "1696334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1696334" }, { "category": "external", "summary": "1697790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1697790" }, { "category": "external", "summary": "1697820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1697820" }, { "category": "external", "summary": "1698435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698435" }, { "category": "external", "summary": "1698436", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698436" }, { "category": "external", "summary": "1698919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698919" }, { "category": "external", "summary": "1699271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1699271" }, { "category": "external", "summary": "1699719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1699719" }, { "category": "external", "summary": "1699835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1699835" }, { "category": "external", "summary": "1701811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1701811" }, { "category": "external", "summary": "1702298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702298" }, { "category": "external", "summary": "1703423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703423" }, { "category": "external", "summary": "1703455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703455" }, { "category": "external", "summary": "1703753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1703753" }, { "category": "external", "summary": "1704181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704181" }, { "category": "external", "summary": "1704769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704769" }, { "category": "external", "summary": "1704851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704851" }, { "category": "external", "summary": "1705018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705018" }, { "category": "external", "summary": "1706776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1706776" }, { "category": "external", "summary": "1707246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707246" }, { "category": "external", "summary": "1708043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1708043" }, { "category": "external", "summary": "1708180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1708180" }, { "category": "external", "summary": "1708183", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1708183" }, { "category": "external", "summary": "1709087", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709087" }, { "category": "external", "summary": "1709301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709301" }, { "category": "external", "summary": "1710233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710233" }, { "category": "external", "summary": "1710701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1710701" }, { "category": "external", "summary": "1711130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711130" }, { "category": "external", "summary": "1711249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711249" }, { "category": "external", "summary": "1711296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1711296" }, { "category": "external", "summary": "1712149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712149" }, { "category": "external", "summary": "1712151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712151" }, { "category": "external", "summary": "1712154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712154" }, { "category": "external", "summary": "1713664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713664" }, { "category": "external", "summary": "1713890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1713890" }, { "category": "external", "summary": "1714078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1714078" }, { "category": "external", "summary": "1715407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715407" }, { "category": "external", "summary": "1715438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715438" }, { "category": "external", "summary": "1715447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715447" }, { "category": "external", "summary": "1716385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716385" }, { "category": "external", "summary": "1716792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716792" }, { "category": "external", "summary": "1716821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716821" }, { "category": "external", "summary": "1717784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717784" }, { "category": "external", "summary": "1717927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1717927" }, { "category": "external", "summary": "1719640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719640" }, { "category": "external", "summary": "1720079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720079" }, { "category": "external", "summary": "1720163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720163" }, { "category": "external", "summary": "1720192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720192" }, { "category": "external", "summary": "1720461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720461" }, { "category": "external", "summary": "1720992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1720992" }, { "category": "external", "summary": "1721028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721028" }, { "category": "external", "summary": "1721357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721357" }, { "category": "external", "summary": "1721477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721477" }, { "category": "external", "summary": "1722131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722131" }, { "category": "external", "summary": "1722209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722209" }, { "category": "external", "summary": "1722512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722512" }, { "category": "external", "summary": "1722801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722801" }, { "category": "external", "summary": "1722829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1722829" }, { "category": "external", "summary": "1724885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724885" }, { "category": "external", "summary": "1725552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725552" }, { "category": "external", "summary": "1726000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1726000" }, { "category": "external", "summary": "1726991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1726991" }, { "category": "external", "summary": "1727785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727785" }, { "category": "external", "summary": "1728673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728673" }, { "category": "external", "summary": "1729108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729108" }, { "category": "external", "summary": "1729971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729971" }, { "category": "external", "summary": "1730914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1730914" }, { "category": "external", "summary": "1731448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731448" }, { "category": "external", "summary": "1731826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731826" }, { "category": "external", "summary": "1731896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1731896" }, { "category": "external", "summary": "1732443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732443" }, { "category": "external", "summary": "1732770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732770" }, { "category": "external", "summary": "1732774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732774" }, { "category": "external", "summary": "1732792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732792" }, { "category": "external", "summary": "1732793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1732793" }, { "category": "external", "summary": "1733520", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733520" }, { "category": "external", "summary": "1733531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733531" }, { "category": "external", "summary": "1733970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733970" }, { "category": "external", "summary": "1734305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734305" }, { "category": "external", "summary": "1734423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734423" }, { "category": "external", "summary": "1734534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734534" }, { "category": "external", "summary": "1734734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1734734" }, { "category": "external", "summary": "1735514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1735514" }, { "category": "external", "summary": "1736830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1736830" }, { "category": "external", "summary": "1737705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1737705" }, { "category": "external", "summary": "1743611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743611" }, { "category": "external", "summary": "1743627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743627" }, { "category": "external", "summary": "1743634", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1743634" }, { "category": "external", "summary": "1744518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744518" }, { "category": "external", "summary": "1746027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746027" }, { "category": "external", "summary": "1748688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1748688" }, { "category": "external", "summary": "1750241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750241" }, { "category": "external", "summary": "1752713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752713" }, { "category": "external", "summary": "1754407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754407" }, { "category": "external", "summary": "1754790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1754790" }, { "category": "external", "summary": "1755227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755227" }, { "category": "external", "summary": "1756325", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1756325" }, { "category": "external", "summary": "1757420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1757420" }, { "category": "external", "summary": "1758432", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758432" }, { "category": "external", "summary": "1758618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1758618" }, { "category": "external", "summary": "1760261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760261" }, { "category": "external", "summary": "1760939", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760939" }, { "category": "external", "summary": "1763412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763412" }, { "category": "external", "summary": "1764202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764202" }, { "category": "external", "summary": "1765555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765555" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhea-2019_3249.json" } ], "title": "Red Hat Enhancement Advisory: glusterfs bug fix and enhancement update", "tracking": { "current_release_date": "2024-11-14T21:42:03+00:00", "generator": { "date": "2024-11-14T21:42:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHEA-2019:3249", "initial_release_date": "2019-10-30T12:20:55+00:00", "revision_history": [ { "date": "2019-10-30T12:20:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-30T12:20:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T21:42:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.5 on RHEL-7", "product": { "name": "Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.5:server:el7" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el7" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "redhat-storage-server-0:3.5.0.0-1.el7rhgs.src", "product": { "name": "redhat-storage-server-0:3.5.0.0-1.el7rhgs.src", "product_id": "redhat-storage-server-0:3.5.0.0-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.5.0.0-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "redhat-storage-logos-0:70.7.0-3.el7rhgs.src", "product": { "name": "redhat-storage-logos-0:70.7.0-3.el7rhgs.src", "product_id": "redhat-storage-logos-0:70.7.0-3.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-logos@70.7.0-3.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "redhat-release-server-0:7.7-16.el7rhgs.src", "product": { "name": "redhat-release-server-0:7.7-16.el7rhgs.src", "product_id": "redhat-release-server-0:7.7-16.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-server@7.7-16.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:6.0-21.el7rhgs.src", "product": { "name": "glusterfs-0:6.0-21.el7rhgs.src", "product_id": "glusterfs-0:6.0-21.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@6.0-21.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:6.0-21.el7.src", "product": { "name": "glusterfs-0:6.0-21.el7.src", "product_id": "glusterfs-0:6.0-21.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@6.0-21.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-storage-server-0:3.5.0.0-1.el7rhgs.noarch", "product": { "name": "redhat-storage-server-0:3.5.0.0-1.el7rhgs.noarch", "product_id": "redhat-storage-server-0:3.5.0.0-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.5.0.0-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "redhat-storage-logos-0:70.7.0-3.el7rhgs.noarch", "product": { "name": "redhat-storage-logos-0:70.7.0-3.el7rhgs.noarch", "product_id": "redhat-storage-logos-0:70.7.0-3.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-logos@70.7.0-3.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "glusterfs-resource-agents-0:6.0-21.el7rhgs.noarch", "product": { "name": "glusterfs-resource-agents-0:6.0-21.el7rhgs.noarch", "product_id": "glusterfs-resource-agents-0:6.0-21.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-resource-agents@6.0-21.el7rhgs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "redhat-release-server-0:7.7-16.el7rhgs.x86_64", "product": { "name": "redhat-release-server-0:7.7-16.el7rhgs.x86_64", "product_id": "redhat-release-server-0:7.7-16.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-release-server@7.7-16.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-api-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-api-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-api-devel-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-api-devel-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-cli-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-cli-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-client-xlators-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-client-xlators-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-devel-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-devel-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-events-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-events-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-fuse-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-fuse-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-ganesha-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-ganesha-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-geo-replication-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-geo-replication-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-libs-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-libs-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-rdma-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-rdma-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-server-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-server-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-server-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "python2-gluster-0:6.0-21.el7rhgs.x86_64", "product": { "name": "python2-gluster-0:6.0-21.el7rhgs.x86_64", "product_id": "python2-gluster-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-gluster@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:6.0-21.el7rhgs.x86_64", "product": { "name": "glusterfs-debuginfo-0:6.0-21.el7rhgs.x86_64", "product_id": "glusterfs-debuginfo-0:6.0-21.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@6.0-21.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:6.0-21.el7.x86_64", "product": { "name": "glusterfs-0:6.0-21.el7.x86_64", "product_id": "glusterfs-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@6.0-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:6.0-21.el7.x86_64", "product": { "name": "glusterfs-api-0:6.0-21.el7.x86_64", "product_id": "glusterfs-api-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@6.0-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:6.0-21.el7.x86_64", "product": { "name": "glusterfs-api-devel-0:6.0-21.el7.x86_64", "product_id": "glusterfs-api-devel-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@6.0-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:6.0-21.el7.x86_64", "product": { "name": "glusterfs-cli-0:6.0-21.el7.x86_64", "product_id": "glusterfs-cli-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@6.0-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:6.0-21.el7.x86_64", "product": { "name": "glusterfs-client-xlators-0:6.0-21.el7.x86_64", "product_id": "glusterfs-client-xlators-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@6.0-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:6.0-21.el7.x86_64", "product": { "name": "glusterfs-devel-0:6.0-21.el7.x86_64", "product_id": "glusterfs-devel-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@6.0-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:6.0-21.el7.x86_64", "product": { "name": "glusterfs-fuse-0:6.0-21.el7.x86_64", "product_id": "glusterfs-fuse-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@6.0-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:6.0-21.el7.x86_64", "product": { "name": "glusterfs-libs-0:6.0-21.el7.x86_64", "product_id": "glusterfs-libs-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@6.0-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:6.0-21.el7.x86_64", "product": { "name": "glusterfs-rdma-0:6.0-21.el7.x86_64", "product_id": "glusterfs-rdma-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@6.0-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python2-gluster-0:6.0-21.el7.x86_64", "product": { "name": "python2-gluster-0:6.0-21.el7.x86_64", "product_id": "python2-gluster-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-gluster@6.0-21.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:6.0-21.el7.x86_64", "product": { "name": "glusterfs-debuginfo-0:6.0-21.el7.x86_64", "product_id": "glusterfs-debuginfo-0:6.0-21.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@6.0-21.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:6.0-21.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-0:6.0-21.el7rhgs.src" }, "product_reference": "glusterfs-0:6.0-21.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-api-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-api-devel-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-devel-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-cli-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-cli-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-client-xlators-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-debuginfo-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-devel-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-devel-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-events-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-events-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-fuse-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-fuse-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-ganesha-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-ganesha-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-geo-replication-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-libs-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-libs-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-rdma-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-rdma-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-resource-agents-0:6.0-21.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-resource-agents-0:6.0-21.el7rhgs.noarch" }, "product_reference": "glusterfs-resource-agents-0:6.0-21.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:glusterfs-server-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "glusterfs-server-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python2-gluster-0:6.0-21.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:python2-gluster-0:6.0-21.el7rhgs.x86_64" }, "product_reference": "python2-gluster-0:6.0-21.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-server-0:7.7-16.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:redhat-release-server-0:7.7-16.el7rhgs.src" }, "product_reference": "redhat-release-server-0:7.7-16.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-release-server-0:7.7-16.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:redhat-release-server-0:7.7-16.el7rhgs.x86_64" }, "product_reference": "redhat-release-server-0:7.7-16.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-logos-0:70.7.0-3.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:redhat-storage-logos-0:70.7.0-3.el7rhgs.noarch" }, "product_reference": "redhat-storage-logos-0:70.7.0-3.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-logos-0:70.7.0-3.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:redhat-storage-logos-0:70.7.0-3.el7rhgs.src" }, "product_reference": "redhat-storage-logos-0:70.7.0-3.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.5.0.0-1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:redhat-storage-server-0:3.5.0.0-1.el7rhgs.noarch" }, "product_reference": "redhat-storage-server-0:3.5.0.0-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.5.0.0-1.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.5 on RHEL-7", "product_id": "7Server-RH-Gluster-3.5-Server:redhat-storage-server-0:3.5.0.0-1.el7rhgs.src" }, "product_reference": "redhat-storage-server-0:3.5.0.0-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.5-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:6.0-21.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:6.0-21.el7.src" }, "product_reference": "glusterfs-0:6.0-21.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-api-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-cli-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-cli-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-devel-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-devel-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-libs-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-libs-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "python2-gluster-0:6.0-21.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:python2-gluster-0:6.0-21.el7.x86_64" }, "product_reference": "python2-gluster-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:6.0-21.el7.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:6.0-21.el7.src" }, "product_reference": "glusterfs-0:6.0-21.el7.src", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-api-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-devel-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-cli-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-cli-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-client-xlators-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-debuginfo-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-devel-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-devel-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-fuse-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-libs-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-libs-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-rdma-0:6.0-21.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python2-gluster-0:6.0-21.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:python2-gluster-0:6.0-21.el7.x86_64" }, "product_reference": "python2-gluster-0:6.0-21.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-15096", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2017-10-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1504255" } ], "notes": [ { "category": "description", "text": "A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: Null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.5-Server:glusterfs-0:6.0-21.el7rhgs.src", "7Server-RH-Gluster-3.5-Server:glusterfs-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-api-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-api-devel-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-cli-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-client-xlators-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-debuginfo-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-devel-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-events-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-fuse-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-ganesha-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-geo-replication-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-libs-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-rdma-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-resource-agents-0:6.0-21.el7rhgs.noarch", "7Server-RH-Gluster-3.5-Server:glusterfs-server-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:python2-gluster-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:redhat-release-server-0:7.7-16.el7rhgs.src", "7Server-RH-Gluster-3.5-Server:redhat-release-server-0:7.7-16.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:redhat-storage-logos-0:70.7.0-3.el7rhgs.noarch", "7Server-RH-Gluster-3.5-Server:redhat-storage-logos-0:70.7.0-3.el7rhgs.src", "7Server-RH-Gluster-3.5-Server:redhat-storage-server-0:3.5.0.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-Server:redhat-storage-server-0:3.5.0.0-1.el7rhgs.src", "7Server-RHEV-4-Agents-7:glusterfs-0:6.0-21.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:python2-gluster-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-0:6.0-21.el7.src", "7Server-RHSClient:glusterfs-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:6.0-21.el7.x86_64", "7Server-RHSClient:python2-gluster-0:6.0-21.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15096" }, { "category": "external", "summary": "RHBZ#1504255", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504255" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15096", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15096" } ], "release_date": "2017-10-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-30T12:20:55+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.5-Server:glusterfs-0:6.0-21.el7rhgs.src", "7Server-RH-Gluster-3.5-Server:glusterfs-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-api-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-api-devel-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-cli-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-client-xlators-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-debuginfo-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-devel-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-events-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-fuse-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-ganesha-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-geo-replication-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-libs-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-rdma-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-resource-agents-0:6.0-21.el7rhgs.noarch", "7Server-RH-Gluster-3.5-Server:glusterfs-server-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:python2-gluster-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:redhat-release-server-0:7.7-16.el7rhgs.src", "7Server-RH-Gluster-3.5-Server:redhat-release-server-0:7.7-16.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:redhat-storage-logos-0:70.7.0-3.el7rhgs.noarch", "7Server-RH-Gluster-3.5-Server:redhat-storage-logos-0:70.7.0-3.el7rhgs.src", "7Server-RH-Gluster-3.5-Server:redhat-storage-server-0:3.5.0.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-Server:redhat-storage-server-0:3.5.0.0-1.el7rhgs.src", "7Server-RHEV-4-Agents-7:glusterfs-0:6.0-21.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:python2-gluster-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-0:6.0-21.el7.src", "7Server-RHSClient:glusterfs-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:6.0-21.el7.x86_64", "7Server-RHSClient:python2-gluster-0:6.0-21.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2019:3249" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 1.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RH-Gluster-3.5-Server:glusterfs-0:6.0-21.el7rhgs.src", "7Server-RH-Gluster-3.5-Server:glusterfs-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-api-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-api-devel-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-cli-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-client-xlators-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-debuginfo-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-devel-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-events-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-fuse-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-ganesha-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-geo-replication-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-libs-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-rdma-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:glusterfs-resource-agents-0:6.0-21.el7rhgs.noarch", "7Server-RH-Gluster-3.5-Server:glusterfs-server-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:python2-gluster-0:6.0-21.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:redhat-release-server-0:7.7-16.el7rhgs.src", "7Server-RH-Gluster-3.5-Server:redhat-release-server-0:7.7-16.el7rhgs.x86_64", "7Server-RH-Gluster-3.5-Server:redhat-storage-logos-0:70.7.0-3.el7rhgs.noarch", "7Server-RH-Gluster-3.5-Server:redhat-storage-logos-0:70.7.0-3.el7rhgs.src", "7Server-RH-Gluster-3.5-Server:redhat-storage-server-0:3.5.0.0-1.el7rhgs.noarch", "7Server-RH-Gluster-3.5-Server:redhat-storage-server-0:3.5.0.0-1.el7rhgs.src", "7Server-RHEV-4-Agents-7:glusterfs-0:6.0-21.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:6.0-21.el7.x86_64", "7Server-RHEV-4-Agents-7:python2-gluster-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-0:6.0-21.el7.src", "7Server-RHSClient:glusterfs-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:6.0-21.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:6.0-21.el7.x86_64", "7Server-RHSClient:python2-gluster-0:6.0-21.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "glusterfs: Null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c" } ] }
gsd-2017-15096
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-15096", "description": "A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service.", "id": "GSD-2017-15096", "references": [ "https://www.suse.com/security/cve/CVE-2017-15096.html", "https://access.redhat.com/errata/RHEA-2019:3249" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-15096" ], "details": "A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service.", "id": "GSD-2017-15096", "modified": "2023-12-13T01:20:58.907870Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-15096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlusterFS", "version": { "version_data": [ { "version_affected": "=", "version_value": "Prior to 3.10" } ] } } ] }, "vendor_name": "Red Hat, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1504255", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504255" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.9.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-15096" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1504255", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504255" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 1.4 } }, "lastModifiedDate": "2023-02-12T23:28Z", "publishedDate": "2017-10-26T17:29Z" } } }
ghsa-vxhq-jp57-mcrm
Vulnerability from github
Published
2022-05-17 00:24
Modified
2022-05-17 00:24
Severity ?
Details
A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service.
{ "affected": [], "aliases": [ "CVE-2017-15096" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-10-26T17:29:00Z", "severity": "LOW" }, "details": "A flaw was found in GlusterFS in versions prior to 3.10. A null pointer dereference in send_brick_req function in glusterfsd/src/gf_attach.c may be used to cause denial of service.", "id": "GHSA-vxhq-jp57-mcrm", "modified": "2022-05-17T00:24:35Z", "published": "2022-05-17T00:24:35Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15096" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHEA-2019:3249" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2017-15096" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504255" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.