Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-1795 (GCVE-0-2015-1795)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:54:16.206Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "name": "1038128", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038128" }, { "name": "99311", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99311" }, { "name": "RHSA-2017:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html" }, { "name": "RHSA-2017:0486", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-29T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "name": "1038128", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038128" }, { "name": "99311", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99311" }, { "name": "RHSA-2017:0484", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html" }, { "name": "RHSA-2017:0486", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-1795", "datePublished": "2017-06-27T20:00:00", "dateReserved": "2015-02-17T00:00:00", "dateUpdated": "2024-08-06T04:54:16.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-1795\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2017-06-27T20:29:00.433\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.\"},{\"lang\":\"es\",\"value\":\"Red Hat Gluster Storage Paquete RPM 3.2 permite a los usuarios locales obtener privilegios y ejecutar c\u00f3digo arbitrario como root.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:gluster_storage:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"518056FB-E049-45AF-876A-C1682118E29D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0484.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0486.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99311\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038128\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1200927\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0484.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0486.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99311\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1200927\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
rhsa-2017_0484
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Gluster Storage 3.2 on Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.\n\nThe following packages have been upgraded to a later upstream version: glusterfs (3.8.4), redhat-storage-server (3.2.0.3). (BZ#1362373)\n\nSecurity Fix(es):\n\n* It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. (CVE-2015-1795)\n\nThis issue was discovered by Florian Weimer of Red Hat Product Security.\n\nBug Fix(es):\n\n* Bricks remain stopped if server quorum is no longer met, or if server quorum is disabled, to ensure that bricks in maintenance are not started incorrectly. (BZ#1340995)\n\n* The metadata cache translator has been updated to improve Red Hat Gluster Storage performance when reading small files. (BZ#1427783)\n\n* The \u0027gluster volume add-brick\u0027 command is no longer allowed when the replica count has increased and any replica bricks are unavailable. (BZ#1404989)\n\n* Split-brain resolution commands work regardless of whether client-side heal or the self-heal daemon are enabled. (BZ#1403840)\n\nEnhancement(s):\n\n* Red Hat Gluster Storage now provides Transport Layer Security support for Samba and NFS-Ganesha. (BZ#1340608, BZ#1371475)\n\n* A new reset-sync-time option enables resetting the sync time attribute to zero when required. (BZ#1205162)\n\n* Tiering demotions are now triggered at most 5 seconds after a hi-watermark breach event. Administrators can use the cluster.tier-query-limit volume parameter to specify the number of records extracted from the heat database during demotion. (BZ#1361759)\n\n* The /var/log/glusterfs/etc-glusterfs-glusterd.vol.log file is now named /var/log/glusterfs/glusterd.log. (BZ#1306120)\n\n* The \u0027gluster volume attach-tier/detach-tier\u0027 commands are considered deprecated in favor of the new commands, \u0027gluster volume tier VOLNAME attach/detach\u0027. (BZ#1388464)\n\n* The HA_VOL_SERVER parameter in the ganesha-ha.conf file is no longer used by Red Hat Gluster Storage. (BZ#1348954)\n\n* The volfile server role can now be passed to another server when a server is unavailable. (BZ#1351949)\n\n* Ports can now be reused when they stop being used by another service. (BZ#1263090)\n\n* The thread pool limit for the rebalance process is now dynamic, and is determined based on the number of available cores. (BZ#1352805)\n\n* Brick verification at reboot now uses UUID instead of brick path. (BZ#1336267)\n\n* LOGIN_NAME_MAX is now used as the maximum length for the slave user instead of __POSIX_LOGIN_NAME_MAX, allowing for up to 256 characters including the NULL byte. (BZ#1400365)\n\n* The client identifier is now included in the log message to make it easier to determine which client failed to connect. (BZ#1333885)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0484", "url": "https://access.redhat.com/errata/RHSA-2017:0484" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/" }, { "category": "external", "summary": "1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "1362373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362373" }, { "category": "external", "summary": "1375059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375059" }, { "category": "external", "summary": "1382319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382319" }, { "category": "external", "summary": "1403587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403587" }, { "category": "external", "summary": "1403919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403919" }, { "category": "external", "summary": "1404551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404551" }, { "category": "external", "summary": "1424944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424944" }, { "category": "external", "summary": "1425748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425748" }, { "category": "external", "summary": "1432972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432972" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0484.json" } ], "title": "Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-14T18:12:46+00:00", "generator": { "date": "2024-11-14T18:12:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2017:0484", "initial_release_date": "2017-03-23T05:06:37+00:00", "revision_history": [ { "date": "2017-03-23T05:06:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-23T05:06:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T18:12:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.2 on RHEL-6", "product": { "name": "Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.2:server:el6" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6rhs.src", "product": { "name": "glusterfs-0:3.8.4-18.el6rhs.src", "product_id": "glusterfs-0:3.8.4-18.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6rhs?arch=src" } } }, { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "product": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "product_id": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.3-1.el6rhs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6.src", "product": { "name": "glusterfs-0:3.8.4-18.el6.src", "product_id": "glusterfs-0:3.8.4-18.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el6rhs.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el6rhs.noarch", "product_id": "python-gluster-0:3.8.4-18.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "product": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "product_id": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.3-1.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el6.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el6.noarch", "product_id": "python-gluster-0:3.8.4-18.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6rhs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src" }, "product_reference": "glusterfs-0:3.8.4-18.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el6rhs.noarch", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch" }, "product_reference": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src" }, "product_reference": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src" }, "product_reference": "glusterfs-0:3.8.4-18.el6.src", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el6.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el6.noarch", "relates_to_product_reference": "6Server-RHSClient" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-1795", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2015-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1200927" } ], "notes": [ { "category": "description", "text": "It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of glusterfs as shipped\nwith Red Hat Enterprise Linux 6, and 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src", "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1795" }, { "category": "external", "summary": "RHBZ#1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1795", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795" } ], "release_date": "2015-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-23T05:06:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src", "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0484" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src", "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue" } ] }
rhsa-2017_0486
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Gluster Storage 3.2 on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.\n\nThe following packages have been upgraded to a later upstream version: glusterfs (3.8.4), redhat-storage-server (3.2.0.2), vdsm (4.17.33). (BZ#1362376)\n\nSecurity Fix(es):\n\n* It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. (CVE-2015-1795)\n\nThis issue was discovered by Florian Weimer of Red Hat Product Security.\n\nBug Fix(es):\n\n* Bricks remain stopped if server quorum is no longer met, or if server quorum is disabled, to ensure that bricks in maintenance are not started incorrectly. (BZ#1340995)\n\n* The metadata cache translator has been updated to improve Red Hat Gluster Storage performance when reading small files. (BZ#1427783)\n\n* The \u0027gluster volume add-brick\u0027 command is no longer allowed when the replica count has increased and any replica bricks are unavailable. (BZ#1404989)\n\n* Split-brain resolution commands work regardless of whether client-side heal or the self-heal daemon are enabled. (BZ#1403840)\n\nEnhancement(s):\n\n* Red Hat Gluster Storage now provides Transport Layer Security support for Samba and NFS-Ganesha. (BZ#1340608, BZ#1371475)\n\n* A new reset-sync-time option enables resetting the sync time attribute to zero when required. (BZ#1205162)\n\n* Tiering demotions are now triggered at most 5 seconds after a hi-watermark breach event. Administrators can use the cluster.tier-query-limit volume parameter to specify the number of records extracted from the heat database during demotion. (BZ#1361759)\n\n* The /var/log/glusterfs/etc-glusterfs-glusterd.vol.log file is now named /var/log/glusterfs/glusterd.log. (BZ#1306120)\n\n* The \u0027gluster volume attach-tier/detach-tier\u0027 commands are considered deprecated in favor of the new commands, \u0027gluster volume tier VOLNAME attach/detach\u0027. (BZ#1388464)\n\n* The HA_VOL_SERVER parameter in the ganesha-ha.conf file is no longer used by Red Hat Gluster Storage. (BZ#1348954)\n\n* The volfile server role can now be passed to another server when a server is unavailable. (BZ#1351949)\n\n* Ports can now be reused when they stop being used by another service. (BZ#1263090)\n\n* The thread pool limit for the rebalance process is now dynamic, and is determined based on the number of available cores. (BZ#1352805)\n\n* Brick verification at reboot now uses UUID instead of brick path. (BZ#1336267)\n\n* LOGIN_NAME_MAX is now used as the maximum length for the slave user instead of __POSIX_LOGIN_NAME_MAX, allowing for up to 256 characters including the NULL byte. (BZ#1400365)\n\n* The client identifier is now included in the log message to make it easier to determine which client failed to connect. (BZ#1333885)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0486", "url": "https://access.redhat.com/errata/RHSA-2017:0486" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/" }, { "category": "external", "summary": "1168606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168606" }, { "category": "external", "summary": "1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "1205162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205162" }, { "category": "external", "summary": "1211845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211845" }, { "category": "external", "summary": "1240333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240333" }, { "category": "external", "summary": "1241314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241314" }, { "category": "external", "summary": "1245084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1245084" }, { "category": "external", "summary": "1248998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248998" }, { "category": "external", "summary": "1256483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256483" }, { "category": "external", "summary": "1256524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256524" }, { "category": "external", "summary": "1257182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257182" }, { "category": "external", "summary": "1258267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258267" }, { "category": "external", "summary": "1263090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263090" }, { "category": "external", "summary": "1264310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1264310" }, { "category": "external", "summary": "1278336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278336" }, { "category": "external", "summary": "1278385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278385" }, { "category": "external", "summary": "1278394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278394" }, { "category": "external", "summary": "1278900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278900" }, { "category": "external", "summary": "1284873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284873" }, { "category": "external", "summary": "1286038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286038" }, { "category": "external", "summary": "1286572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286572" }, { "category": "external", "summary": "1294035", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294035" }, { "category": "external", "summary": "1296796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296796" }, { "category": "external", "summary": "1298118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298118" }, { "category": "external", "summary": "1299841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299841" }, { "category": "external", "summary": "1306120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306120" }, { "category": "external", "summary": "1306656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306656" }, { "category": "external", "summary": "1312199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312199" }, { "category": "external", "summary": "1315544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315544" }, { "category": "external", "summary": "1317653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317653" }, { "category": "external", "summary": "1318000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1318000" }, { "category": "external", "summary": "1319078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319078" }, { "category": "external", "summary": "1319886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319886" }, { "category": "external", "summary": "1324053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324053" }, { "category": "external", "summary": "1325821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325821" }, { "category": "external", "summary": "1326066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326066" }, { "category": "external", "summary": "1327952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327952" }, { "category": "external", "summary": "1328451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328451" }, { "category": "external", "summary": "1332080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332080" }, { "category": "external", "summary": "1332133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332133" }, { "category": "external", "summary": "1332542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332542" }, { "category": "external", "summary": "1333406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333406" }, { "category": "external", "summary": "1333484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333484" }, { "category": "external", "summary": "1333749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333749" }, { "category": "external", "summary": "1333885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333885" }, { "category": "external", "summary": "1334664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334664" }, { "category": "external", "summary": "1334858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334858" }, { "category": "external", "summary": "1335029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335029" }, { "category": "external", "summary": "1336267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336267" }, { "category": "external", "summary": "1336339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336339" }, { "category": "external", "summary": "1336377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336377" }, { "category": "external", "summary": "1336764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336764" }, { "category": "external", "summary": "1337391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337391" }, { "category": "external", "summary": "1337444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337444" }, { "category": "external", "summary": "1337450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337450" }, { "category": "external", "summary": "1337477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337477" }, { "category": "external", "summary": "1337495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337495" }, { "category": "external", "summary": "1337565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337565" }, { "category": "external", "summary": "1337811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337811" }, { "category": "external", "summary": "1337836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337836" }, { "category": "external", "summary": "1337863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337863" }, { "category": "external", "summary": "1338615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338615" }, { "category": "external", "summary": "1338748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338748" }, { "category": "external", "summary": "1339159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1339159" }, { "category": "external", "summary": "1340338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340338" }, { "category": "external", "summary": "1340608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340608" }, { "category": "external", "summary": "1340756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340756" }, { "category": "external", "summary": "1340995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340995" }, { "category": "external", "summary": "1341934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341934" }, { "category": "external", "summary": "1342459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342459" }, { "category": "external", "summary": "1343178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343178" }, { "category": "external", "summary": "1343320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343320" }, { "category": "external", "summary": "1343695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343695" }, { "category": "external", "summary": "1344322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344322" }, { "category": "external", "summary": "1344651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344651" }, { "category": "external", "summary": "1344675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344675" }, { "category": "external", "summary": "1344826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344826" }, { "category": "external", "summary": "1344908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344908" }, { "category": "external", "summary": "1345732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1345732" }, { "category": "external", "summary": "1347251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347251" }, { "category": "external", "summary": "1347257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347257" }, { "category": "external", "summary": "1347625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347625" }, { "category": "external", "summary": "1347922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347922" }, { "category": "external", "summary": "1347923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347923" }, { "category": "external", "summary": "1348949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348949" }, { "category": "external", "summary": "1348954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348954" }, { "category": "external", "summary": "1348962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348962" }, { "category": "external", "summary": "1351589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351589" }, { "category": "external", "summary": "1351732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351732" }, { "category": "external", "summary": "1351825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351825" }, { "category": "external", "summary": "1351949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351949" }, { "category": "external", "summary": "1352125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352125" }, { "category": "external", "summary": "1352805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352805" }, { "category": "external", "summary": "1353427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353427" }, { "category": "external", "summary": "1354260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354260" }, { "category": "external", "summary": "1356058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356058" }, { "category": "external", "summary": "1356804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356804" }, { "category": "external", "summary": "1359180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359180" }, { "category": "external", "summary": "1359588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359588" }, { "category": "external", "summary": "1359605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359605" }, { "category": "external", "summary": "1359607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359607" }, { "category": "external", "summary": "1359619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359619" }, { "category": "external", "summary": "1360807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360807" }, { "category": "external", "summary": "1360978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360978" }, { "category": "external", "summary": "1361066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361066" }, { "category": "external", "summary": "1361068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361068" }, { "category": "external", "summary": "1361078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361078" }, { "category": "external", "summary": "1361082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361082" }, { "category": "external", "summary": "1361084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361084" }, { "category": "external", "summary": "1361086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361086" }, { "category": "external", "summary": "1361098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361098" }, { "category": "external", "summary": "1361101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361101" }, { "category": "external", "summary": "1361118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361118" }, { "category": "external", "summary": "1361155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361155" }, { "category": "external", "summary": "1361170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361170" }, { "category": "external", "summary": "1361184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361184" }, { "category": "external", "summary": "1361513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361513" }, { "category": "external", "summary": "1361519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361519" }, { "category": "external", "summary": "1362376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362376" }, { "category": "external", "summary": "1364422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364422" }, { "category": "external", "summary": "1364551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364551" }, { "category": "external", "summary": "1366128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366128" }, { "category": "external", "summary": "1367382", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367382" }, { "category": "external", "summary": "1367472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367472" }, { "category": "external", "summary": "1369384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369384" }, { "category": "external", "summary": "1369391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369391" }, { "category": "external", "summary": "1370350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370350" }, { "category": "external", "summary": "1371475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371475" }, { "category": "external", "summary": "1373976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373976" }, { "category": "external", "summary": "1374166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374166" }, { "category": "external", "summary": "1375057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375057" }, { "category": "external", "summary": "1375465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375465" }, { "category": "external", "summary": "1376464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376464" }, { "category": "external", "summary": "1377062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377062" }, { "category": "external", "summary": "1377387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377387" }, { "category": "external", "summary": "1378030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378030" }, { "category": "external", "summary": "1378131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378131" }, { "category": "external", "summary": "1378300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378300" }, { "category": "external", "summary": "1378342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378342" }, { "category": "external", "summary": "1378484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378484" }, { "category": "external", "summary": "1378528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378528" }, { "category": "external", "summary": "1378676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378676" }, { "category": "external", "summary": "1378677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378677" }, { "category": "external", "summary": "1378867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378867" }, { "category": "external", "summary": "1379241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379241" }, { "category": "external", "summary": "1379919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379919" }, { "category": "external", "summary": "1379924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379924" }, { "category": "external", "summary": "1379963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379963" }, { "category": "external", "summary": "1379966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379966" }, { "category": "external", "summary": "1380122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380122" }, { "category": "external", "summary": "1380257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380257" }, { "category": "external", "summary": "1380276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380276" }, { "category": "external", "summary": "1380419", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380419" }, { "category": "external", "summary": "1380605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380605" }, { "category": "external", "summary": "1380619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380619" }, { "category": "external", "summary": "1380638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380638" }, { "category": "external", "summary": "1380655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380655" }, { "category": "external", "summary": "1380710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380710" }, { "category": "external", "summary": "1380742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380742" }, { "category": "external", "summary": "1381140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381140" }, { "category": "external", "summary": "1381353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381353" }, { "category": "external", "summary": "1381452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381452" }, { "category": "external", "summary": "1381822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381822" }, { "category": "external", "summary": "1381831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381831" }, { "category": "external", "summary": "1381968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381968" }, { "category": "external", "summary": "1382065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382065" }, { "category": "external", "summary": "1382277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382277" }, { "category": "external", "summary": "1382345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382345" }, { "category": "external", "summary": "1384070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384070" }, { "category": "external", "summary": "1384311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384311" }, { "category": "external", "summary": "1384316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384316" }, { "category": "external", "summary": "1384459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384459" }, { "category": "external", "summary": "1384460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384460" }, { "category": "external", "summary": "1384481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384481" }, { "category": "external", "summary": "1384865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384865" }, { "category": "external", "summary": "1384993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384993" }, { "category": "external", "summary": "1385468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385468" }, { "category": "external", "summary": "1385474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385474" }, { "category": "external", "summary": "1385525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385525" }, { "category": "external", "summary": "1385561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385561" }, { "category": "external", "summary": "1385605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385605" }, { "category": "external", "summary": "1385606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385606" }, { "category": "external", "summary": "1386127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386127" }, { "category": "external", "summary": "1386172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386172" }, { "category": "external", "summary": "1386177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386177" }, { "category": "external", "summary": "1386185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386185" }, { "category": "external", "summary": "1386280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386280" }, { "category": "external", "summary": "1386366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386366" }, { "category": "external", "summary": "1386472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386472" }, { "category": "external", "summary": "1386477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386477" }, { "category": "external", "summary": "1386538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386538" }, { "category": "external", "summary": "1387152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387152" }, { "category": "external", "summary": "1387204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387204" }, { "category": "external", "summary": "1387205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387205" }, { "category": "external", "summary": "1387501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387501" }, { "category": "external", "summary": "1387544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387544" }, { "category": "external", "summary": "1387558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387558" }, { "category": "external", "summary": "1387563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387563" }, { "category": "external", "summary": "1388464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388464" }, { "category": "external", "summary": "1388560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388560" }, { "category": "external", "summary": "1388711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388711" }, { "category": "external", "summary": "1388734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388734" }, { "category": "external", "summary": "1388755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388755" }, { "category": "external", "summary": "1389168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389168" }, { "category": "external", "summary": "1389422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389422" }, { "category": "external", "summary": "1389661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389661" }, { "category": "external", "summary": "1390843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390843" }, { "category": "external", "summary": "1391072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391072" }, { "category": "external", "summary": "1391093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391093" }, { "category": "external", "summary": "1391808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391808" }, { "category": "external", "summary": "1392299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392299" }, { "category": "external", "summary": "1392761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392761" }, { "category": "external", "summary": "1392837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392837" }, { "category": "external", "summary": "1392895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392895" }, { "category": "external", "summary": "1392899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392899" }, { "category": "external", "summary": "1392906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392906" }, { "category": "external", "summary": "1393316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393316" }, { "category": "external", "summary": "1393526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393526" }, { "category": "external", "summary": "1393694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393694" }, { "category": "external", "summary": "1393709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393709" }, { "category": "external", "summary": "1393758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393758" }, { "category": "external", "summary": "1394219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1394219" }, { "category": "external", "summary": "1394752", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1394752" }, { "category": "external", "summary": "1395539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395539" }, { "category": "external", "summary": "1395541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395541" }, { "category": "external", "summary": "1395574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395574" }, { "category": "external", "summary": "1395603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395603" }, { "category": "external", "summary": "1395613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395613" }, { "category": "external", "summary": "1396166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396166" }, { "category": "external", "summary": "1396361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396361" }, { "category": "external", "summary": "1396449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396449" }, { "category": "external", "summary": "1397257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397257" }, { "category": "external", "summary": "1397267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397267" }, { "category": "external", "summary": "1397286", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397286" }, { "category": "external", "summary": "1397364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397364" }, { "category": "external", "summary": "1397430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397430" }, { "category": "external", "summary": "1397450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397450" }, { "category": "external", "summary": "1397681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397681" }, { "category": "external", "summary": "1397846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397846" }, { "category": "external", "summary": "1398188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398188" }, { "category": "external", "summary": "1398257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398257" }, { "category": "external", "summary": "1398261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398261" }, { "category": "external", "summary": "1398311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398311" }, { "category": "external", "summary": "1398315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398315" }, { "category": "external", "summary": "1398331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398331" }, { "category": "external", "summary": "1398798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398798" }, { "category": "external", "summary": "1399100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399100" }, { "category": "external", "summary": "1399105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399105" }, { "category": "external", "summary": "1399476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399476" }, { "category": "external", "summary": "1399598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399598" }, { "category": "external", "summary": "1399698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399698" }, { "category": "external", "summary": "1399753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399753" }, { "category": "external", "summary": "1399757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399757" }, { "category": "external", "summary": "1400037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400037" }, { "category": "external", "summary": "1400057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400057" }, { "category": "external", "summary": "1400068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400068" }, { "category": "external", "summary": "1400093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400093" }, { "category": "external", "summary": "1400395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400395" }, { "category": "external", "summary": "1400599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400599" }, { "category": "external", "summary": "1401380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401380" }, { "category": "external", "summary": "1401806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401806" }, { "category": "external", "summary": "1401814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401814" }, { "category": "external", "summary": "1401817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401817" }, { "category": "external", "summary": "1401869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401869" }, { "category": "external", "summary": "1402360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402360" }, { "category": "external", "summary": "1402683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402683" }, { "category": "external", "summary": "1402774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402774" }, { "category": "external", "summary": "1403120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403120" }, { "category": "external", "summary": "1403672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403672" }, { "category": "external", "summary": "1403770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403770" }, { "category": "external", "summary": "1403840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403840" }, { "category": "external", "summary": "1404110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404110" }, { "category": "external", "summary": "1404541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404541" }, { "category": "external", "summary": "1404569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404569" }, { "category": "external", "summary": "1404633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404633" }, { "category": "external", "summary": "1404982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404982" }, { "category": "external", "summary": "1404989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404989" }, { "category": "external", "summary": "1404996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404996" }, { "category": "external", "summary": "1405000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405000" }, { "category": "external", "summary": "1405299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405299" }, { "category": "external", "summary": "1405302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405302" }, { "category": "external", "summary": "1406025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406025" }, { "category": "external", "summary": "1406322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406322" }, { "category": "external", "summary": "1406401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406401" }, { "category": "external", "summary": "1406723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406723" }, { "category": "external", "summary": "1408112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408112" }, { "category": "external", "summary": "1408413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408413" }, { "category": "external", "summary": "1408426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408426" }, { "category": "external", "summary": "1408576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408576" }, { "category": "external", "summary": "1408639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408639" }, { "category": "external", "summary": "1408641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408641" }, { "category": "external", "summary": "1408655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408655" }, { "category": "external", "summary": "1408705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408705" }, { "category": "external", "summary": "1408836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408836" }, { "category": "external", "summary": "1409135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409135" }, { "category": "external", "summary": "1409472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409472" }, { "category": "external", "summary": "1409563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409563" }, { "category": "external", "summary": "1409782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409782" }, { "category": "external", "summary": "1409808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409808" }, { "category": "external", "summary": "1410025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410025" }, { "category": "external", "summary": "1410406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410406" }, { "category": "external", "summary": "1411270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411270" }, { "category": "external", "summary": "1411329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411329" }, { "category": "external", "summary": "1411617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411617" }, { "category": "external", "summary": "1412554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412554" }, { "category": "external", "summary": "1412955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412955" }, { "category": "external", "summary": "1413351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413351" }, { "category": "external", "summary": "1413513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413513" }, { "category": "external", "summary": "1414247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414247" }, { "category": "external", "summary": "1414663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414663" }, { "category": "external", "summary": "1415101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415101" }, { "category": "external", "summary": "1415583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415583" }, { "category": "external", "summary": "1417177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417177" }, { "category": "external", "summary": "1417955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417955" }, { "category": "external", "summary": "1418011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418011" }, { "category": "external", "summary": "1418603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418603" }, { "category": "external", "summary": "1418901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418901" }, { "category": "external", "summary": "1419859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419859" }, { "category": "external", "summary": "1420324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420324" }, { "category": "external", "summary": "1420635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420635" }, { "category": "external", "summary": "1422431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422431" }, { "category": "external", "summary": "1422576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422576" }, { "category": "external", "summary": "1425740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425740" }, { "category": "external", "summary": "1426324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426324" }, { "category": "external", "summary": "1426559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426559" }, { "category": "external", "summary": "1427783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0486.json" } ], "title": "Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-14T18:12:51+00:00", "generator": { "date": "2024-11-14T18:12:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2017:0486", "initial_release_date": "2017-03-23T05:18:45+00:00", "revision_history": [ { "date": "2017-03-23T05:18:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-23T05:18:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T18:12:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.2 on RHEL-7", "product": { "name": "Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.2:server:el7" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el7" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "product": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "product_id": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.2-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "vdsm-0:4.17.33-1.1.el7rhgs.src", "product": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.src", "product_id": "vdsm-0:4.17.33-1.1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.17.33-1.1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7rhgs.src", "product": { "name": "glusterfs-0:3.8.4-18.el7rhgs.src", "product_id": "glusterfs-0:3.8.4-18.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7.src", "product": { "name": "glusterfs-0:3.8.4-18.el7.src", "product_id": "glusterfs-0:3.8.4-18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "product": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "product_id": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.2-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-tests@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-faqemu@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-gluster@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-infra@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-qemucmdline@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-python@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-xmlrpc@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-debug-plugin@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-cli@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "product_id": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el7.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el7.noarch", "product_id": "python-gluster-0:3.8.4-18.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src" }, "product_reference": "glusterfs-0:3.8.4-18.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch" }, "product_reference": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src" }, "product_reference": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src" }, "product_reference": "vdsm-0:4.17.33-1.1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src" }, "product_reference": "glusterfs-0:3.8.4-18.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el7.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src" }, "product_reference": "glusterfs-0:3.8.4-18.el7.src", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el7.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el7.noarch", "relates_to_product_reference": "7Server-RHSClient" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-1795", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2015-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1200927" } ], "notes": [ { "category": "description", "text": "It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of glusterfs as shipped\nwith Red Hat Enterprise Linux 6, and 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1795" }, { "category": "external", "summary": "RHBZ#1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1795", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795" } ], "release_date": "2015-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-23T05:18:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue" } ] }
RHSA-2017:0486
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Gluster Storage 3.2 on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.\n\nThe following packages have been upgraded to a later upstream version: glusterfs (3.8.4), redhat-storage-server (3.2.0.2), vdsm (4.17.33). (BZ#1362376)\n\nSecurity Fix(es):\n\n* It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. (CVE-2015-1795)\n\nThis issue was discovered by Florian Weimer of Red Hat Product Security.\n\nBug Fix(es):\n\n* Bricks remain stopped if server quorum is no longer met, or if server quorum is disabled, to ensure that bricks in maintenance are not started incorrectly. (BZ#1340995)\n\n* The metadata cache translator has been updated to improve Red Hat Gluster Storage performance when reading small files. (BZ#1427783)\n\n* The \u0027gluster volume add-brick\u0027 command is no longer allowed when the replica count has increased and any replica bricks are unavailable. (BZ#1404989)\n\n* Split-brain resolution commands work regardless of whether client-side heal or the self-heal daemon are enabled. (BZ#1403840)\n\nEnhancement(s):\n\n* Red Hat Gluster Storage now provides Transport Layer Security support for Samba and NFS-Ganesha. (BZ#1340608, BZ#1371475)\n\n* A new reset-sync-time option enables resetting the sync time attribute to zero when required. (BZ#1205162)\n\n* Tiering demotions are now triggered at most 5 seconds after a hi-watermark breach event. Administrators can use the cluster.tier-query-limit volume parameter to specify the number of records extracted from the heat database during demotion. (BZ#1361759)\n\n* The /var/log/glusterfs/etc-glusterfs-glusterd.vol.log file is now named /var/log/glusterfs/glusterd.log. (BZ#1306120)\n\n* The \u0027gluster volume attach-tier/detach-tier\u0027 commands are considered deprecated in favor of the new commands, \u0027gluster volume tier VOLNAME attach/detach\u0027. (BZ#1388464)\n\n* The HA_VOL_SERVER parameter in the ganesha-ha.conf file is no longer used by Red Hat Gluster Storage. (BZ#1348954)\n\n* The volfile server role can now be passed to another server when a server is unavailable. (BZ#1351949)\n\n* Ports can now be reused when they stop being used by another service. (BZ#1263090)\n\n* The thread pool limit for the rebalance process is now dynamic, and is determined based on the number of available cores. (BZ#1352805)\n\n* Brick verification at reboot now uses UUID instead of brick path. (BZ#1336267)\n\n* LOGIN_NAME_MAX is now used as the maximum length for the slave user instead of __POSIX_LOGIN_NAME_MAX, allowing for up to 256 characters including the NULL byte. (BZ#1400365)\n\n* The client identifier is now included in the log message to make it easier to determine which client failed to connect. (BZ#1333885)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0486", "url": "https://access.redhat.com/errata/RHSA-2017:0486" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/" }, { "category": "external", "summary": "1168606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168606" }, { "category": "external", "summary": "1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "1205162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205162" }, { "category": "external", "summary": "1211845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211845" }, { "category": "external", "summary": "1240333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240333" }, { "category": "external", "summary": "1241314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241314" }, { "category": "external", "summary": "1245084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1245084" }, { "category": "external", "summary": "1248998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248998" }, { "category": "external", "summary": "1256483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256483" }, { "category": "external", "summary": "1256524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256524" }, { "category": "external", "summary": "1257182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257182" }, { "category": "external", "summary": "1258267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258267" }, { "category": "external", "summary": "1263090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263090" }, { "category": "external", "summary": "1264310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1264310" }, { "category": "external", "summary": "1278336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278336" }, { "category": "external", "summary": "1278385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278385" }, { "category": "external", "summary": "1278394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278394" }, { "category": "external", "summary": "1278900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278900" }, { "category": "external", "summary": "1284873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284873" }, { "category": "external", "summary": "1286038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286038" }, { "category": "external", "summary": "1286572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286572" }, { "category": "external", "summary": "1294035", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294035" }, { "category": "external", "summary": "1296796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296796" }, { "category": "external", "summary": "1298118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298118" }, { "category": "external", "summary": "1299841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299841" }, { "category": "external", "summary": "1306120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306120" }, { "category": "external", "summary": "1306656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306656" }, { "category": "external", "summary": "1312199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312199" }, { "category": "external", "summary": "1315544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315544" }, { "category": "external", "summary": "1317653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317653" }, { "category": "external", "summary": "1318000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1318000" }, { "category": "external", "summary": "1319078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319078" }, { "category": "external", "summary": "1319886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319886" }, { "category": "external", "summary": "1324053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324053" }, { "category": "external", "summary": "1325821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325821" }, { "category": "external", "summary": "1326066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326066" }, { "category": "external", "summary": "1327952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327952" }, { "category": "external", "summary": "1328451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328451" }, { "category": "external", "summary": "1332080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332080" }, { "category": "external", "summary": "1332133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332133" }, { "category": "external", "summary": "1332542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332542" }, { "category": "external", "summary": "1333406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333406" }, { "category": "external", "summary": "1333484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333484" }, { "category": "external", "summary": "1333749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333749" }, { "category": "external", "summary": "1333885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333885" }, { "category": "external", "summary": "1334664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334664" }, { "category": "external", "summary": "1334858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334858" }, { "category": "external", "summary": "1335029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335029" }, { "category": "external", "summary": "1336267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336267" }, { "category": "external", "summary": "1336339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336339" }, { "category": "external", "summary": "1336377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336377" }, { "category": "external", "summary": "1336764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336764" }, { "category": "external", "summary": "1337391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337391" }, { "category": "external", "summary": "1337444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337444" }, { "category": "external", "summary": "1337450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337450" }, { "category": "external", "summary": "1337477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337477" }, { "category": "external", "summary": "1337495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337495" }, { "category": "external", "summary": "1337565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337565" }, { "category": "external", "summary": "1337811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337811" }, { "category": "external", "summary": "1337836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337836" }, { "category": "external", "summary": "1337863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337863" }, { "category": "external", "summary": "1338615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338615" }, { "category": "external", "summary": "1338748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338748" }, { "category": "external", "summary": "1339159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1339159" }, { "category": "external", "summary": "1340338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340338" }, { "category": "external", "summary": "1340608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340608" }, { "category": "external", "summary": "1340756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340756" }, { "category": "external", "summary": "1340995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340995" }, { "category": "external", "summary": "1341934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341934" }, { "category": "external", "summary": "1342459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342459" }, { "category": "external", "summary": "1343178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343178" }, { "category": "external", "summary": "1343320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343320" }, { "category": "external", "summary": "1343695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343695" }, { "category": "external", "summary": "1344322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344322" }, { "category": "external", "summary": "1344651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344651" }, { "category": "external", "summary": "1344675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344675" }, { "category": "external", "summary": "1344826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344826" }, { "category": "external", "summary": "1344908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344908" }, { "category": "external", "summary": "1345732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1345732" }, { "category": "external", "summary": "1347251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347251" }, { "category": "external", "summary": "1347257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347257" }, { "category": "external", "summary": "1347625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347625" }, { "category": "external", "summary": "1347922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347922" }, { "category": "external", "summary": "1347923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347923" }, { "category": "external", "summary": "1348949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348949" }, { "category": "external", "summary": "1348954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348954" }, { "category": "external", "summary": "1348962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348962" }, { "category": "external", "summary": "1351589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351589" }, { "category": "external", "summary": "1351732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351732" }, { "category": "external", "summary": "1351825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351825" }, { "category": "external", "summary": "1351949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351949" }, { "category": "external", "summary": "1352125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352125" }, { "category": "external", "summary": "1352805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352805" }, { "category": "external", "summary": "1353427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353427" }, { "category": "external", "summary": "1354260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354260" }, { "category": "external", "summary": "1356058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356058" }, { "category": "external", "summary": "1356804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356804" }, { "category": "external", "summary": "1359180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359180" }, { "category": "external", "summary": "1359588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359588" }, { "category": "external", "summary": "1359605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359605" }, { "category": "external", "summary": "1359607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359607" }, { "category": "external", "summary": "1359619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359619" }, { "category": "external", "summary": "1360807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360807" }, { "category": "external", "summary": "1360978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360978" }, { "category": "external", "summary": "1361066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361066" }, { "category": "external", "summary": "1361068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361068" }, { "category": "external", "summary": "1361078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361078" }, { "category": "external", "summary": "1361082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361082" }, { "category": "external", "summary": "1361084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361084" }, { "category": "external", "summary": "1361086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361086" }, { "category": "external", "summary": "1361098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361098" }, { "category": "external", "summary": "1361101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361101" }, { "category": "external", "summary": "1361118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361118" }, { "category": "external", "summary": "1361155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361155" }, { "category": "external", "summary": "1361170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361170" }, { "category": "external", "summary": "1361184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361184" }, { "category": "external", "summary": "1361513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361513" }, { "category": "external", "summary": "1361519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361519" }, { "category": "external", "summary": "1362376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362376" }, { "category": "external", "summary": "1364422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364422" }, { "category": "external", "summary": "1364551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364551" }, { "category": "external", "summary": "1366128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366128" }, { "category": "external", "summary": "1367382", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367382" }, { "category": "external", "summary": "1367472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367472" }, { "category": "external", "summary": "1369384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369384" }, { "category": "external", "summary": "1369391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369391" }, { "category": "external", "summary": "1370350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370350" }, { "category": "external", "summary": "1371475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371475" }, { "category": "external", "summary": "1373976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373976" }, { "category": "external", "summary": "1374166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374166" }, { "category": "external", "summary": "1375057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375057" }, { "category": "external", "summary": "1375465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375465" }, { "category": "external", "summary": "1376464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376464" }, { "category": "external", "summary": "1377062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377062" }, { "category": "external", "summary": "1377387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377387" }, { "category": "external", "summary": "1378030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378030" }, { "category": "external", "summary": "1378131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378131" }, { "category": "external", "summary": "1378300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378300" }, { "category": "external", "summary": "1378342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378342" }, { "category": "external", "summary": "1378484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378484" }, { "category": "external", "summary": "1378528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378528" }, { "category": "external", "summary": "1378676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378676" }, { "category": "external", "summary": "1378677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378677" }, { "category": "external", "summary": "1378867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378867" }, { "category": "external", "summary": "1379241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379241" }, { "category": "external", "summary": "1379919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379919" }, { "category": "external", "summary": "1379924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379924" }, { "category": "external", "summary": "1379963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379963" }, { "category": "external", "summary": "1379966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379966" }, { "category": "external", "summary": "1380122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380122" }, { "category": "external", "summary": "1380257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380257" }, { "category": "external", "summary": "1380276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380276" }, { "category": "external", "summary": "1380419", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380419" }, { "category": "external", "summary": "1380605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380605" }, { "category": "external", "summary": "1380619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380619" }, { "category": "external", "summary": "1380638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380638" }, { "category": "external", "summary": "1380655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380655" }, { "category": "external", "summary": "1380710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380710" }, { "category": "external", "summary": "1380742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380742" }, { "category": "external", "summary": "1381140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381140" }, { "category": "external", "summary": "1381353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381353" }, { "category": "external", "summary": "1381452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381452" }, { "category": "external", "summary": "1381822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381822" }, { "category": "external", "summary": "1381831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381831" }, { "category": "external", "summary": "1381968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381968" }, { "category": "external", "summary": "1382065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382065" }, { "category": "external", "summary": "1382277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382277" }, { "category": "external", "summary": "1382345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382345" }, { "category": "external", "summary": "1384070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384070" }, { "category": "external", "summary": "1384311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384311" }, { "category": "external", "summary": "1384316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384316" }, { "category": "external", "summary": "1384459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384459" }, { "category": "external", "summary": "1384460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384460" }, { "category": "external", "summary": "1384481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384481" }, { "category": "external", "summary": "1384865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384865" }, { "category": "external", "summary": "1384993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384993" }, { "category": "external", "summary": "1385468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385468" }, { "category": "external", "summary": "1385474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385474" }, { "category": "external", "summary": "1385525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385525" }, { "category": "external", "summary": "1385561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385561" }, { "category": "external", "summary": "1385605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385605" }, { "category": "external", "summary": "1385606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385606" }, { "category": "external", "summary": "1386127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386127" }, { "category": "external", "summary": "1386172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386172" }, { "category": "external", "summary": "1386177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386177" }, { "category": "external", "summary": "1386185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386185" }, { "category": "external", "summary": "1386280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386280" }, { "category": "external", "summary": "1386366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386366" }, { "category": "external", "summary": "1386472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386472" }, { "category": "external", "summary": "1386477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386477" }, { "category": "external", "summary": "1386538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386538" }, { "category": "external", "summary": "1387152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387152" }, { "category": "external", "summary": "1387204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387204" }, { "category": "external", "summary": "1387205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387205" }, { "category": "external", "summary": "1387501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387501" }, { "category": "external", "summary": "1387544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387544" }, { "category": "external", "summary": "1387558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387558" }, { "category": "external", "summary": "1387563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387563" }, { "category": "external", "summary": "1388464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388464" }, { "category": "external", "summary": "1388560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388560" }, { "category": "external", "summary": "1388711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388711" }, { "category": "external", "summary": "1388734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388734" }, { "category": "external", "summary": "1388755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388755" }, { "category": "external", "summary": "1389168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389168" }, { "category": "external", "summary": "1389422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389422" }, { "category": "external", "summary": "1389661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389661" }, { "category": "external", "summary": "1390843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390843" }, { "category": "external", "summary": "1391072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391072" }, { "category": "external", "summary": "1391093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391093" }, { "category": "external", "summary": "1391808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391808" }, { "category": "external", "summary": "1392299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392299" }, { "category": "external", "summary": "1392761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392761" }, { "category": "external", "summary": "1392837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392837" }, { "category": "external", "summary": "1392895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392895" }, { "category": "external", "summary": "1392899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392899" }, { "category": "external", "summary": "1392906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392906" }, { "category": "external", "summary": "1393316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393316" }, { "category": "external", "summary": "1393526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393526" }, { "category": "external", "summary": "1393694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393694" }, { "category": "external", "summary": "1393709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393709" }, { "category": "external", "summary": "1393758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393758" }, { "category": "external", "summary": "1394219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1394219" }, { "category": "external", "summary": "1394752", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1394752" }, { "category": "external", "summary": "1395539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395539" }, { "category": "external", "summary": "1395541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395541" }, { "category": "external", "summary": "1395574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395574" }, { "category": "external", "summary": "1395603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395603" }, { "category": "external", "summary": "1395613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395613" }, { "category": "external", "summary": "1396166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396166" }, { "category": "external", "summary": "1396361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396361" }, { "category": "external", "summary": "1396449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396449" }, { "category": "external", "summary": "1397257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397257" }, { "category": "external", "summary": "1397267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397267" }, { "category": "external", "summary": "1397286", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397286" }, { "category": "external", "summary": "1397364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397364" }, { "category": "external", "summary": "1397430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397430" }, { "category": "external", "summary": "1397450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397450" }, { "category": "external", "summary": "1397681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397681" }, { "category": "external", "summary": "1397846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397846" }, { "category": "external", "summary": "1398188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398188" }, { "category": "external", "summary": "1398257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398257" }, { "category": "external", "summary": "1398261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398261" }, { "category": "external", "summary": "1398311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398311" }, { "category": "external", "summary": "1398315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398315" }, { "category": "external", "summary": "1398331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398331" }, { "category": "external", "summary": "1398798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398798" }, { "category": "external", "summary": "1399100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399100" }, { "category": "external", "summary": "1399105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399105" }, { "category": "external", "summary": "1399476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399476" }, { "category": "external", "summary": "1399598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399598" }, { "category": "external", "summary": "1399698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399698" }, { "category": "external", "summary": "1399753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399753" }, { "category": "external", "summary": "1399757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399757" }, { "category": "external", "summary": "1400037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400037" }, { "category": "external", "summary": "1400057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400057" }, { "category": "external", "summary": "1400068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400068" }, { "category": "external", "summary": "1400093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400093" }, { "category": "external", "summary": "1400395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400395" }, { "category": "external", "summary": "1400599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400599" }, { "category": "external", "summary": "1401380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401380" }, { "category": "external", "summary": "1401806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401806" }, { "category": "external", "summary": "1401814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401814" }, { "category": "external", "summary": "1401817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401817" }, { "category": "external", "summary": "1401869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401869" }, { "category": "external", "summary": "1402360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402360" }, { "category": "external", "summary": "1402683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402683" }, { "category": "external", "summary": "1402774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402774" }, { "category": "external", "summary": "1403120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403120" }, { "category": "external", "summary": "1403672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403672" }, { "category": "external", "summary": "1403770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403770" }, { "category": "external", "summary": "1403840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403840" }, { "category": "external", "summary": "1404110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404110" }, { "category": "external", "summary": "1404541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404541" }, { "category": "external", "summary": "1404569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404569" }, { "category": "external", "summary": "1404633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404633" }, { "category": "external", "summary": "1404982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404982" }, { "category": "external", "summary": "1404989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404989" }, { "category": "external", "summary": "1404996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404996" }, { "category": "external", "summary": "1405000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405000" }, { "category": "external", "summary": "1405299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405299" }, { "category": "external", "summary": "1405302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405302" }, { "category": "external", "summary": "1406025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406025" }, { "category": "external", "summary": "1406322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406322" }, { "category": "external", "summary": "1406401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406401" }, { "category": "external", "summary": "1406723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406723" }, { "category": "external", "summary": "1408112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408112" }, { "category": "external", "summary": "1408413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408413" }, { "category": "external", "summary": "1408426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408426" }, { "category": "external", "summary": "1408576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408576" }, { "category": "external", "summary": "1408639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408639" }, { "category": "external", "summary": "1408641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408641" }, { "category": "external", "summary": "1408655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408655" }, { "category": "external", "summary": "1408705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408705" }, { "category": "external", "summary": "1408836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408836" }, { "category": "external", "summary": "1409135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409135" }, { "category": "external", "summary": "1409472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409472" }, { "category": "external", "summary": "1409563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409563" }, { "category": "external", "summary": "1409782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409782" }, { "category": "external", "summary": "1409808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409808" }, { "category": "external", "summary": "1410025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410025" }, { "category": "external", "summary": "1410406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410406" }, { "category": "external", "summary": "1411270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411270" }, { "category": "external", "summary": "1411329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411329" }, { "category": "external", "summary": "1411617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411617" }, { "category": "external", "summary": "1412554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412554" }, { "category": "external", "summary": "1412955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412955" }, { "category": "external", "summary": "1413351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413351" }, { "category": "external", "summary": "1413513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413513" }, { "category": "external", "summary": "1414247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414247" }, { "category": "external", "summary": "1414663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414663" }, { "category": "external", "summary": "1415101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415101" }, { "category": "external", "summary": "1415583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415583" }, { "category": "external", "summary": "1417177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417177" }, { "category": "external", "summary": "1417955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417955" }, { "category": "external", "summary": "1418011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418011" }, { "category": "external", "summary": "1418603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418603" }, { "category": "external", "summary": "1418901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418901" }, { "category": "external", "summary": "1419859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419859" }, { "category": "external", "summary": "1420324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420324" }, { "category": "external", "summary": "1420635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420635" }, { "category": "external", "summary": "1422431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422431" }, { "category": "external", "summary": "1422576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422576" }, { "category": "external", "summary": "1425740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425740" }, { "category": "external", "summary": "1426324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426324" }, { "category": "external", "summary": "1426559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426559" }, { "category": "external", "summary": "1427783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0486.json" } ], "title": "Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-09-26T03:42:52+00:00", "generator": { "date": "2025-09-26T03:42:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2017:0486", "initial_release_date": "2017-03-23T05:18:45+00:00", "revision_history": [ { "date": "2017-03-23T05:18:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-23T05:18:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:42:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.2 on RHEL-7", "product": { "name": "Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.2:server:el7" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el7" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "product": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "product_id": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.2-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "vdsm-0:4.17.33-1.1.el7rhgs.src", "product": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.src", "product_id": "vdsm-0:4.17.33-1.1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.17.33-1.1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7rhgs.src", "product": { "name": "glusterfs-0:3.8.4-18.el7rhgs.src", "product_id": "glusterfs-0:3.8.4-18.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7.src", "product": { "name": "glusterfs-0:3.8.4-18.el7.src", "product_id": "glusterfs-0:3.8.4-18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "product": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "product_id": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.2-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-tests@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-faqemu@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-gluster@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-infra@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-qemucmdline@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-python@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-xmlrpc@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-debug-plugin@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-cli@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "product_id": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el7.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el7.noarch", "product_id": "python-gluster-0:3.8.4-18.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src" }, "product_reference": "glusterfs-0:3.8.4-18.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch" }, "product_reference": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src" }, "product_reference": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src" }, "product_reference": "vdsm-0:4.17.33-1.1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src" }, "product_reference": "glusterfs-0:3.8.4-18.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el7.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src" }, "product_reference": "glusterfs-0:3.8.4-18.el7.src", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el7.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el7.noarch", "relates_to_product_reference": "7Server-RHSClient" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-1795", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2015-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1200927" } ], "notes": [ { "category": "description", "text": "It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of glusterfs as shipped\nwith Red Hat Enterprise Linux 6, and 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1795" }, { "category": "external", "summary": "RHBZ#1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1795", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795" } ], "release_date": "2015-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-23T05:18:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue" } ] }
RHSA-2017:0484
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Gluster Storage 3.2 on Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.\n\nThe following packages have been upgraded to a later upstream version: glusterfs (3.8.4), redhat-storage-server (3.2.0.3). (BZ#1362373)\n\nSecurity Fix(es):\n\n* It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. (CVE-2015-1795)\n\nThis issue was discovered by Florian Weimer of Red Hat Product Security.\n\nBug Fix(es):\n\n* Bricks remain stopped if server quorum is no longer met, or if server quorum is disabled, to ensure that bricks in maintenance are not started incorrectly. (BZ#1340995)\n\n* The metadata cache translator has been updated to improve Red Hat Gluster Storage performance when reading small files. (BZ#1427783)\n\n* The \u0027gluster volume add-brick\u0027 command is no longer allowed when the replica count has increased and any replica bricks are unavailable. (BZ#1404989)\n\n* Split-brain resolution commands work regardless of whether client-side heal or the self-heal daemon are enabled. (BZ#1403840)\n\nEnhancement(s):\n\n* Red Hat Gluster Storage now provides Transport Layer Security support for Samba and NFS-Ganesha. (BZ#1340608, BZ#1371475)\n\n* A new reset-sync-time option enables resetting the sync time attribute to zero when required. (BZ#1205162)\n\n* Tiering demotions are now triggered at most 5 seconds after a hi-watermark breach event. Administrators can use the cluster.tier-query-limit volume parameter to specify the number of records extracted from the heat database during demotion. (BZ#1361759)\n\n* The /var/log/glusterfs/etc-glusterfs-glusterd.vol.log file is now named /var/log/glusterfs/glusterd.log. (BZ#1306120)\n\n* The \u0027gluster volume attach-tier/detach-tier\u0027 commands are considered deprecated in favor of the new commands, \u0027gluster volume tier VOLNAME attach/detach\u0027. (BZ#1388464)\n\n* The HA_VOL_SERVER parameter in the ganesha-ha.conf file is no longer used by Red Hat Gluster Storage. (BZ#1348954)\n\n* The volfile server role can now be passed to another server when a server is unavailable. (BZ#1351949)\n\n* Ports can now be reused when they stop being used by another service. (BZ#1263090)\n\n* The thread pool limit for the rebalance process is now dynamic, and is determined based on the number of available cores. (BZ#1352805)\n\n* Brick verification at reboot now uses UUID instead of brick path. (BZ#1336267)\n\n* LOGIN_NAME_MAX is now used as the maximum length for the slave user instead of __POSIX_LOGIN_NAME_MAX, allowing for up to 256 characters including the NULL byte. (BZ#1400365)\n\n* The client identifier is now included in the log message to make it easier to determine which client failed to connect. (BZ#1333885)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0484", "url": "https://access.redhat.com/errata/RHSA-2017:0484" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/" }, { "category": "external", "summary": "1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "1362373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362373" }, { "category": "external", "summary": "1375059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375059" }, { "category": "external", "summary": "1382319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382319" }, { "category": "external", "summary": "1403587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403587" }, { "category": "external", "summary": "1403919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403919" }, { "category": "external", "summary": "1404551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404551" }, { "category": "external", "summary": "1424944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424944" }, { "category": "external", "summary": "1425748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425748" }, { "category": "external", "summary": "1432972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432972" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0484.json" } ], "title": "Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-09-26T03:42:52+00:00", "generator": { "date": "2025-09-26T03:42:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2017:0484", "initial_release_date": "2017-03-23T05:06:37+00:00", "revision_history": [ { "date": "2017-03-23T05:06:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-23T05:06:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:42:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.2 on RHEL-6", "product": { "name": "Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.2:server:el6" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6rhs.src", "product": { "name": "glusterfs-0:3.8.4-18.el6rhs.src", "product_id": "glusterfs-0:3.8.4-18.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6rhs?arch=src" } } }, { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "product": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "product_id": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.3-1.el6rhs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6.src", "product": { "name": "glusterfs-0:3.8.4-18.el6.src", "product_id": "glusterfs-0:3.8.4-18.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el6rhs.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el6rhs.noarch", "product_id": "python-gluster-0:3.8.4-18.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "product": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "product_id": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.3-1.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el6.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el6.noarch", "product_id": "python-gluster-0:3.8.4-18.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6rhs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src" }, "product_reference": "glusterfs-0:3.8.4-18.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el6rhs.noarch", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch" }, "product_reference": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src" }, "product_reference": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src" }, "product_reference": "glusterfs-0:3.8.4-18.el6.src", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el6.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el6.noarch", "relates_to_product_reference": "6Server-RHSClient" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-1795", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2015-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1200927" } ], "notes": [ { "category": "description", "text": "It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of glusterfs as shipped\nwith Red Hat Enterprise Linux 6, and 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src", "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1795" }, { "category": "external", "summary": "RHBZ#1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1795", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795" } ], "release_date": "2015-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-23T05:06:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src", "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0484" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src", "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue" } ] }
rhsa-2017:0486
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Gluster Storage 3.2 on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.\n\nThe following packages have been upgraded to a later upstream version: glusterfs (3.8.4), redhat-storage-server (3.2.0.2), vdsm (4.17.33). (BZ#1362376)\n\nSecurity Fix(es):\n\n* It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. (CVE-2015-1795)\n\nThis issue was discovered by Florian Weimer of Red Hat Product Security.\n\nBug Fix(es):\n\n* Bricks remain stopped if server quorum is no longer met, or if server quorum is disabled, to ensure that bricks in maintenance are not started incorrectly. (BZ#1340995)\n\n* The metadata cache translator has been updated to improve Red Hat Gluster Storage performance when reading small files. (BZ#1427783)\n\n* The \u0027gluster volume add-brick\u0027 command is no longer allowed when the replica count has increased and any replica bricks are unavailable. (BZ#1404989)\n\n* Split-brain resolution commands work regardless of whether client-side heal or the self-heal daemon are enabled. (BZ#1403840)\n\nEnhancement(s):\n\n* Red Hat Gluster Storage now provides Transport Layer Security support for Samba and NFS-Ganesha. (BZ#1340608, BZ#1371475)\n\n* A new reset-sync-time option enables resetting the sync time attribute to zero when required. (BZ#1205162)\n\n* Tiering demotions are now triggered at most 5 seconds after a hi-watermark breach event. Administrators can use the cluster.tier-query-limit volume parameter to specify the number of records extracted from the heat database during demotion. (BZ#1361759)\n\n* The /var/log/glusterfs/etc-glusterfs-glusterd.vol.log file is now named /var/log/glusterfs/glusterd.log. (BZ#1306120)\n\n* The \u0027gluster volume attach-tier/detach-tier\u0027 commands are considered deprecated in favor of the new commands, \u0027gluster volume tier VOLNAME attach/detach\u0027. (BZ#1388464)\n\n* The HA_VOL_SERVER parameter in the ganesha-ha.conf file is no longer used by Red Hat Gluster Storage. (BZ#1348954)\n\n* The volfile server role can now be passed to another server when a server is unavailable. (BZ#1351949)\n\n* Ports can now be reused when they stop being used by another service. (BZ#1263090)\n\n* The thread pool limit for the rebalance process is now dynamic, and is determined based on the number of available cores. (BZ#1352805)\n\n* Brick verification at reboot now uses UUID instead of brick path. (BZ#1336267)\n\n* LOGIN_NAME_MAX is now used as the maximum length for the slave user instead of __POSIX_LOGIN_NAME_MAX, allowing for up to 256 characters including the NULL byte. (BZ#1400365)\n\n* The client identifier is now included in the log message to make it easier to determine which client failed to connect. (BZ#1333885)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0486", "url": "https://access.redhat.com/errata/RHSA-2017:0486" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/" }, { "category": "external", "summary": "1168606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168606" }, { "category": "external", "summary": "1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "1205162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205162" }, { "category": "external", "summary": "1211845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211845" }, { "category": "external", "summary": "1240333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240333" }, { "category": "external", "summary": "1241314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241314" }, { "category": "external", "summary": "1245084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1245084" }, { "category": "external", "summary": "1248998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248998" }, { "category": "external", "summary": "1256483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256483" }, { "category": "external", "summary": "1256524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256524" }, { "category": "external", "summary": "1257182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257182" }, { "category": "external", "summary": "1258267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258267" }, { "category": "external", "summary": "1263090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263090" }, { "category": "external", "summary": "1264310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1264310" }, { "category": "external", "summary": "1278336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278336" }, { "category": "external", "summary": "1278385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278385" }, { "category": "external", "summary": "1278394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278394" }, { "category": "external", "summary": "1278900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278900" }, { "category": "external", "summary": "1284873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284873" }, { "category": "external", "summary": "1286038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286038" }, { "category": "external", "summary": "1286572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286572" }, { "category": "external", "summary": "1294035", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294035" }, { "category": "external", "summary": "1296796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296796" }, { "category": "external", "summary": "1298118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298118" }, { "category": "external", "summary": "1299841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299841" }, { "category": "external", "summary": "1306120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306120" }, { "category": "external", "summary": "1306656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306656" }, { "category": "external", "summary": "1312199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312199" }, { "category": "external", "summary": "1315544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315544" }, { "category": "external", "summary": "1317653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317653" }, { "category": "external", "summary": "1318000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1318000" }, { "category": "external", "summary": "1319078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319078" }, { "category": "external", "summary": "1319886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319886" }, { "category": "external", "summary": "1324053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324053" }, { "category": "external", "summary": "1325821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325821" }, { "category": "external", "summary": "1326066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326066" }, { "category": "external", "summary": "1327952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327952" }, { "category": "external", "summary": "1328451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328451" }, { "category": "external", "summary": "1332080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332080" }, { "category": "external", "summary": "1332133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332133" }, { "category": "external", "summary": "1332542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332542" }, { "category": "external", "summary": "1333406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333406" }, { "category": "external", "summary": "1333484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333484" }, { "category": "external", "summary": "1333749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333749" }, { "category": "external", "summary": "1333885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333885" }, { "category": "external", "summary": "1334664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334664" }, { "category": "external", "summary": "1334858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334858" }, { "category": "external", "summary": "1335029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335029" }, { "category": "external", "summary": "1336267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336267" }, { "category": "external", "summary": "1336339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336339" }, { "category": "external", "summary": "1336377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336377" }, { "category": "external", "summary": "1336764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336764" }, { "category": "external", "summary": "1337391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337391" }, { "category": "external", "summary": "1337444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337444" }, { "category": "external", "summary": "1337450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337450" }, { "category": "external", "summary": "1337477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337477" }, { "category": "external", "summary": "1337495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337495" }, { "category": "external", "summary": "1337565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337565" }, { "category": "external", "summary": "1337811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337811" }, { "category": "external", "summary": "1337836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337836" }, { "category": "external", "summary": "1337863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337863" }, { "category": "external", "summary": "1338615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338615" }, { "category": "external", "summary": "1338748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338748" }, { "category": "external", "summary": "1339159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1339159" }, { "category": "external", "summary": "1340338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340338" }, { "category": "external", "summary": "1340608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340608" }, { "category": "external", "summary": "1340756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340756" }, { "category": "external", "summary": "1340995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340995" }, { "category": "external", "summary": "1341934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341934" }, { "category": "external", "summary": "1342459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342459" }, { "category": "external", "summary": "1343178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343178" }, { "category": "external", "summary": "1343320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343320" }, { "category": "external", "summary": "1343695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343695" }, { "category": "external", "summary": "1344322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344322" }, { "category": "external", "summary": "1344651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344651" }, { "category": "external", "summary": "1344675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344675" }, { "category": "external", "summary": "1344826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344826" }, { "category": "external", "summary": "1344908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344908" }, { "category": "external", "summary": "1345732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1345732" }, { "category": "external", "summary": "1347251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347251" }, { "category": "external", "summary": "1347257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347257" }, { "category": "external", "summary": "1347625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347625" }, { "category": "external", "summary": "1347922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347922" }, { "category": "external", "summary": "1347923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347923" }, { "category": "external", "summary": "1348949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348949" }, { "category": "external", "summary": "1348954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348954" }, { "category": "external", "summary": "1348962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348962" }, { "category": "external", "summary": "1351589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351589" }, { "category": "external", "summary": "1351732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351732" }, { "category": "external", "summary": "1351825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351825" }, { "category": "external", "summary": "1351949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351949" }, { "category": "external", "summary": "1352125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352125" }, { "category": "external", "summary": "1352805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352805" }, { "category": "external", "summary": "1353427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353427" }, { "category": "external", "summary": "1354260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354260" }, { "category": "external", "summary": "1356058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356058" }, { "category": "external", "summary": "1356804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356804" }, { "category": "external", "summary": "1359180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359180" }, { "category": "external", "summary": "1359588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359588" }, { "category": "external", "summary": "1359605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359605" }, { "category": "external", "summary": "1359607", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359607" }, { "category": "external", "summary": "1359619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359619" }, { "category": "external", "summary": "1360807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360807" }, { "category": "external", "summary": "1360978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360978" }, { "category": "external", "summary": "1361066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361066" }, { "category": "external", "summary": "1361068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361068" }, { "category": "external", "summary": "1361078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361078" }, { "category": "external", "summary": "1361082", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361082" }, { "category": "external", "summary": "1361084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361084" }, { "category": "external", "summary": "1361086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361086" }, { "category": "external", "summary": "1361098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361098" }, { "category": "external", "summary": "1361101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361101" }, { "category": "external", "summary": "1361118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361118" }, { "category": "external", "summary": "1361155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361155" }, { "category": "external", "summary": "1361170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361170" }, { "category": "external", "summary": "1361184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361184" }, { "category": "external", "summary": "1361513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361513" }, { "category": "external", "summary": "1361519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361519" }, { "category": "external", "summary": "1362376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362376" }, { "category": "external", "summary": "1364422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364422" }, { "category": "external", "summary": "1364551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364551" }, { "category": "external", "summary": "1366128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366128" }, { "category": "external", "summary": "1367382", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367382" }, { "category": "external", "summary": "1367472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367472" }, { "category": "external", "summary": "1369384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369384" }, { "category": "external", "summary": "1369391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369391" }, { "category": "external", "summary": "1370350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370350" }, { "category": "external", "summary": "1371475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371475" }, { "category": "external", "summary": "1373976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373976" }, { "category": "external", "summary": "1374166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374166" }, { "category": "external", "summary": "1375057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375057" }, { "category": "external", "summary": "1375465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375465" }, { "category": "external", "summary": "1376464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376464" }, { "category": "external", "summary": "1377062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377062" }, { "category": "external", "summary": "1377387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377387" }, { "category": "external", "summary": "1378030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378030" }, { "category": "external", "summary": "1378131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378131" }, { "category": "external", "summary": "1378300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378300" }, { "category": "external", "summary": "1378342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378342" }, { "category": "external", "summary": "1378484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378484" }, { "category": "external", "summary": "1378528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378528" }, { "category": "external", "summary": "1378676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378676" }, { "category": "external", "summary": "1378677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378677" }, { "category": "external", "summary": "1378867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378867" }, { "category": "external", "summary": "1379241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379241" }, { "category": "external", "summary": "1379919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379919" }, { "category": "external", "summary": "1379924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379924" }, { "category": "external", "summary": "1379963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379963" }, { "category": "external", "summary": "1379966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379966" }, { "category": "external", "summary": "1380122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380122" }, { "category": "external", "summary": "1380257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380257" }, { "category": "external", "summary": "1380276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380276" }, { "category": "external", "summary": "1380419", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380419" }, { "category": "external", "summary": "1380605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380605" }, { "category": "external", "summary": "1380619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380619" }, { "category": "external", "summary": "1380638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380638" }, { "category": "external", "summary": "1380655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380655" }, { "category": "external", "summary": "1380710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380710" }, { "category": "external", "summary": "1380742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380742" }, { "category": "external", "summary": "1381140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381140" }, { "category": "external", "summary": "1381353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381353" }, { "category": "external", "summary": "1381452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381452" }, { "category": "external", "summary": "1381822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381822" }, { "category": "external", "summary": "1381831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381831" }, { "category": "external", "summary": "1381968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381968" }, { "category": "external", "summary": "1382065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382065" }, { "category": "external", "summary": "1382277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382277" }, { "category": "external", "summary": "1382345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382345" }, { "category": "external", "summary": "1384070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384070" }, { "category": "external", "summary": "1384311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384311" }, { "category": "external", "summary": "1384316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384316" }, { "category": "external", "summary": "1384459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384459" }, { "category": "external", "summary": "1384460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384460" }, { "category": "external", "summary": "1384481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384481" }, { "category": "external", "summary": "1384865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384865" }, { "category": "external", "summary": "1384993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384993" }, { "category": "external", "summary": "1385468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385468" }, { "category": "external", "summary": "1385474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385474" }, { "category": "external", "summary": "1385525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385525" }, { "category": "external", "summary": "1385561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385561" }, { "category": "external", "summary": "1385605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385605" }, { "category": "external", "summary": "1385606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385606" }, { "category": "external", "summary": "1386127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386127" }, { "category": "external", "summary": "1386172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386172" }, { "category": "external", "summary": "1386177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386177" }, { "category": "external", "summary": "1386185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386185" }, { "category": "external", "summary": "1386280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386280" }, { "category": "external", "summary": "1386366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386366" }, { "category": "external", "summary": "1386472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386472" }, { "category": "external", "summary": "1386477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386477" }, { "category": "external", "summary": "1386538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386538" }, { "category": "external", "summary": "1387152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387152" }, { "category": "external", "summary": "1387204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387204" }, { "category": "external", "summary": "1387205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387205" }, { "category": "external", "summary": "1387501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387501" }, { "category": "external", "summary": "1387544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387544" }, { "category": "external", "summary": "1387558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387558" }, { "category": "external", "summary": "1387563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387563" }, { "category": "external", "summary": "1388464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388464" }, { "category": "external", "summary": "1388560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388560" }, { "category": "external", "summary": "1388711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388711" }, { "category": "external", "summary": "1388734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388734" }, { "category": "external", "summary": "1388755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388755" }, { "category": "external", "summary": "1389168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389168" }, { "category": "external", "summary": "1389422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389422" }, { "category": "external", "summary": "1389661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389661" }, { "category": "external", "summary": "1390843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390843" }, { "category": "external", "summary": "1391072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391072" }, { "category": "external", "summary": "1391093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391093" }, { "category": "external", "summary": "1391808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391808" }, { "category": "external", "summary": "1392299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392299" }, { "category": "external", "summary": "1392761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392761" }, { "category": "external", "summary": "1392837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392837" }, { "category": "external", "summary": "1392895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392895" }, { "category": "external", "summary": "1392899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392899" }, { "category": "external", "summary": "1392906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392906" }, { "category": "external", "summary": "1393316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393316" }, { "category": "external", "summary": "1393526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393526" }, { "category": "external", "summary": "1393694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393694" }, { "category": "external", "summary": "1393709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393709" }, { "category": "external", "summary": "1393758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393758" }, { "category": "external", "summary": "1394219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1394219" }, { "category": "external", "summary": "1394752", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1394752" }, { "category": "external", "summary": "1395539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395539" }, { "category": "external", "summary": "1395541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395541" }, { "category": "external", "summary": "1395574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395574" }, { "category": "external", "summary": "1395603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395603" }, { "category": "external", "summary": "1395613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395613" }, { "category": "external", "summary": "1396166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396166" }, { "category": "external", "summary": "1396361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396361" }, { "category": "external", "summary": "1396449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396449" }, { "category": "external", "summary": "1397257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397257" }, { "category": "external", "summary": "1397267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397267" }, { "category": "external", "summary": "1397286", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397286" }, { "category": "external", "summary": "1397364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397364" }, { "category": "external", "summary": "1397430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397430" }, { "category": "external", "summary": "1397450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397450" }, { "category": "external", "summary": "1397681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397681" }, { "category": "external", "summary": "1397846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397846" }, { "category": "external", "summary": "1398188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398188" }, { "category": "external", "summary": "1398257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398257" }, { "category": "external", "summary": "1398261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398261" }, { "category": "external", "summary": "1398311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398311" }, { "category": "external", "summary": "1398315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398315" }, { "category": "external", "summary": "1398331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398331" }, { "category": "external", "summary": "1398798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398798" }, { "category": "external", "summary": "1399100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399100" }, { "category": "external", "summary": "1399105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399105" }, { "category": "external", "summary": "1399476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399476" }, { "category": "external", "summary": "1399598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399598" }, { "category": "external", "summary": "1399698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399698" }, { "category": "external", "summary": "1399753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399753" }, { "category": "external", "summary": "1399757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399757" }, { "category": "external", "summary": "1400037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400037" }, { "category": "external", "summary": "1400057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400057" }, { "category": "external", "summary": "1400068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400068" }, { "category": "external", "summary": "1400093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400093" }, { "category": "external", "summary": "1400395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400395" }, { "category": "external", "summary": "1400599", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400599" }, { "category": "external", "summary": "1401380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401380" }, { "category": "external", "summary": "1401806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401806" }, { "category": "external", "summary": "1401814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401814" }, { "category": "external", "summary": "1401817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401817" }, { "category": "external", "summary": "1401869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401869" }, { "category": "external", "summary": "1402360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402360" }, { "category": "external", "summary": "1402683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402683" }, { "category": "external", "summary": "1402774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402774" }, { "category": "external", "summary": "1403120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403120" }, { "category": "external", "summary": "1403672", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403672" }, { "category": "external", "summary": "1403770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403770" }, { "category": "external", "summary": "1403840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403840" }, { "category": "external", "summary": "1404110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404110" }, { "category": "external", "summary": "1404541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404541" }, { "category": "external", "summary": "1404569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404569" }, { "category": "external", "summary": "1404633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404633" }, { "category": "external", "summary": "1404982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404982" }, { "category": "external", "summary": "1404989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404989" }, { "category": "external", "summary": "1404996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404996" }, { "category": "external", "summary": "1405000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405000" }, { "category": "external", "summary": "1405299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405299" }, { "category": "external", "summary": "1405302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405302" }, { "category": "external", "summary": "1406025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406025" }, { "category": "external", "summary": "1406322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406322" }, { "category": "external", "summary": "1406401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406401" }, { "category": "external", "summary": "1406723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406723" }, { "category": "external", "summary": "1408112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408112" }, { "category": "external", "summary": "1408413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408413" }, { "category": "external", "summary": "1408426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408426" }, { "category": "external", "summary": "1408576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408576" }, { "category": "external", "summary": "1408639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408639" }, { "category": "external", "summary": "1408641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408641" }, { "category": "external", "summary": "1408655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408655" }, { "category": "external", "summary": "1408705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408705" }, { "category": "external", "summary": "1408836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408836" }, { "category": "external", "summary": "1409135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409135" }, { "category": "external", "summary": "1409472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409472" }, { "category": "external", "summary": "1409563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409563" }, { "category": "external", "summary": "1409782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409782" }, { "category": "external", "summary": "1409808", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409808" }, { "category": "external", "summary": "1410025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410025" }, { "category": "external", "summary": "1410406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410406" }, { "category": "external", "summary": "1411270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411270" }, { "category": "external", "summary": "1411329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411329" }, { "category": "external", "summary": "1411617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411617" }, { "category": "external", "summary": "1412554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412554" }, { "category": "external", "summary": "1412955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412955" }, { "category": "external", "summary": "1413351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413351" }, { "category": "external", "summary": "1413513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413513" }, { "category": "external", "summary": "1414247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414247" }, { "category": "external", "summary": "1414663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414663" }, { "category": "external", "summary": "1415101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415101" }, { "category": "external", "summary": "1415583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415583" }, { "category": "external", "summary": "1417177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417177" }, { "category": "external", "summary": "1417955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417955" }, { "category": "external", "summary": "1418011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418011" }, { "category": "external", "summary": "1418603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418603" }, { "category": "external", "summary": "1418901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418901" }, { "category": "external", "summary": "1419859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419859" }, { "category": "external", "summary": "1420324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420324" }, { "category": "external", "summary": "1420635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420635" }, { "category": "external", "summary": "1422431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422431" }, { "category": "external", "summary": "1422576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422576" }, { "category": "external", "summary": "1425740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425740" }, { "category": "external", "summary": "1426324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426324" }, { "category": "external", "summary": "1426559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426559" }, { "category": "external", "summary": "1427783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0486.json" } ], "title": "Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-09-26T03:42:52+00:00", "generator": { "date": "2025-09-26T03:42:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2017:0486", "initial_release_date": "2017-03-23T05:18:45+00:00", "revision_history": [ { "date": "2017-03-23T05:18:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-23T05:18:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:42:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.2 on RHEL-7", "product": { "name": "Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.2:server:el7" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el7" } } }, { "category": "product_name", "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product": { "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "product": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "product_id": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.2-1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "vdsm-0:4.17.33-1.1.el7rhgs.src", "product": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.src", "product_id": "vdsm-0:4.17.33-1.1.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.17.33-1.1.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7rhgs.src", "product": { "name": "glusterfs-0:3.8.4-18.el7rhgs.src", "product_id": "glusterfs-0:3.8.4-18.el7rhgs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7rhgs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7.src", "product": { "name": "glusterfs-0:3.8.4-18.el7.src", "product_id": "glusterfs-0:3.8.4-18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "product": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "product_id": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.2-1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-tests@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-faqemu@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-gluster@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-infra@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-hook-qemucmdline@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-python@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-xmlrpc@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-debug-plugin@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "product": { "name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "product_id": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/vdsm-cli@4.17.33-1.1.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "product_id": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el7rhgs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el7.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el7.noarch", "product_id": "python-gluster-0:3.8.4-18.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el7rhgs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src" }, "product_reference": "glusterfs-0:3.8.4-18.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch" }, "product_reference": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src" }, "product_reference": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-0:4.17.33-1.1.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src" }, "product_reference": "vdsm-0:4.17.33-1.1.el7rhgs.src", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7", "product_id": "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch" }, "product_reference": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "relates_to_product_reference": "7Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src" }, "product_reference": "glusterfs-0:3.8.4-18.el7.src", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el7.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts", "product_id": "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el7.noarch", "relates_to_product_reference": "7Server-RHEV-4-Agents-7" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src" }, "product_reference": "glusterfs-0:3.8.4-18.el7.src", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el7.x86_64", "relates_to_product_reference": "7Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el7.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7", "product_id": "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el7.noarch", "relates_to_product_reference": "7Server-RHSClient" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-1795", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2015-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1200927" } ], "notes": [ { "category": "description", "text": "It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of glusterfs as shipped\nwith Red Hat Enterprise Linux 6, and 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1795" }, { "category": "external", "summary": "RHBZ#1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1795", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795" } ], "release_date": "2015-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-23T05:18:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0486" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64", "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src", "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src", "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src", "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64", "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue" } ] }
rhsa-2017:0484
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Gluster Storage 3.2 on Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.\n\nThe following packages have been upgraded to a later upstream version: glusterfs (3.8.4), redhat-storage-server (3.2.0.3). (BZ#1362373)\n\nSecurity Fix(es):\n\n* It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. (CVE-2015-1795)\n\nThis issue was discovered by Florian Weimer of Red Hat Product Security.\n\nBug Fix(es):\n\n* Bricks remain stopped if server quorum is no longer met, or if server quorum is disabled, to ensure that bricks in maintenance are not started incorrectly. (BZ#1340995)\n\n* The metadata cache translator has been updated to improve Red Hat Gluster Storage performance when reading small files. (BZ#1427783)\n\n* The \u0027gluster volume add-brick\u0027 command is no longer allowed when the replica count has increased and any replica bricks are unavailable. (BZ#1404989)\n\n* Split-brain resolution commands work regardless of whether client-side heal or the self-heal daemon are enabled. (BZ#1403840)\n\nEnhancement(s):\n\n* Red Hat Gluster Storage now provides Transport Layer Security support for Samba and NFS-Ganesha. (BZ#1340608, BZ#1371475)\n\n* A new reset-sync-time option enables resetting the sync time attribute to zero when required. (BZ#1205162)\n\n* Tiering demotions are now triggered at most 5 seconds after a hi-watermark breach event. Administrators can use the cluster.tier-query-limit volume parameter to specify the number of records extracted from the heat database during demotion. (BZ#1361759)\n\n* The /var/log/glusterfs/etc-glusterfs-glusterd.vol.log file is now named /var/log/glusterfs/glusterd.log. (BZ#1306120)\n\n* The \u0027gluster volume attach-tier/detach-tier\u0027 commands are considered deprecated in favor of the new commands, \u0027gluster volume tier VOLNAME attach/detach\u0027. (BZ#1388464)\n\n* The HA_VOL_SERVER parameter in the ganesha-ha.conf file is no longer used by Red Hat Gluster Storage. (BZ#1348954)\n\n* The volfile server role can now be passed to another server when a server is unavailable. (BZ#1351949)\n\n* Ports can now be reused when they stop being used by another service. (BZ#1263090)\n\n* The thread pool limit for the rebalance process is now dynamic, and is determined based on the number of available cores. (BZ#1352805)\n\n* Brick verification at reboot now uses UUID instead of brick path. (BZ#1336267)\n\n* LOGIN_NAME_MAX is now used as the maximum length for the slave user instead of __POSIX_LOGIN_NAME_MAX, allowing for up to 256 characters including the NULL byte. (BZ#1400365)\n\n* The client identifier is now included in the log message to make it easier to determine which client failed to connect. (BZ#1333885)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0484", "url": "https://access.redhat.com/errata/RHSA-2017:0484" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/" }, { "category": "external", "summary": "1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "1362373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362373" }, { "category": "external", "summary": "1375059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375059" }, { "category": "external", "summary": "1382319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382319" }, { "category": "external", "summary": "1403587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403587" }, { "category": "external", "summary": "1403919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403919" }, { "category": "external", "summary": "1404551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404551" }, { "category": "external", "summary": "1424944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424944" }, { "category": "external", "summary": "1425748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425748" }, { "category": "external", "summary": "1432972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432972" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0484.json" } ], "title": "Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-09-26T03:42:52+00:00", "generator": { "date": "2025-09-26T03:42:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2017:0484", "initial_release_date": "2017-03-23T05:06:37+00:00", "revision_history": [ { "date": "2017-03-23T05:06:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-23T05:06:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:42:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Gluster Storage Server 3.2 on RHEL-6", "product": { "name": "Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3.2:server:el6" } } }, { "category": "product_name", "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product": { "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:3:client:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-api-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-api-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-api-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el6?arch=x86_64" } } }, { "category": "product_version", "name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "product": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "product_id": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6rhs.src", "product": { "name": "glusterfs-0:3.8.4-18.el6rhs.src", "product_id": "glusterfs-0:3.8.4-18.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6rhs?arch=src" } } }, { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "product": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "product_id": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.3-1.el6rhs?arch=src" } } }, { "category": "product_version", "name": "glusterfs-0:3.8.4-18.el6.src", "product": { "name": "glusterfs-0:3.8.4-18.el6.src", "product_id": "glusterfs-0:3.8.4-18.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el6rhs.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el6rhs.noarch", "product_id": "python-gluster-0:3.8.4-18.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "product": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "product_id": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.3-1.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "python-gluster-0:3.8.4-18.el6.noarch", "product": { "name": "python-gluster-0:3.8.4-18.el6.noarch", "product_id": "python-gluster-0:3.8.4-18.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6rhs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src" }, "product_reference": "glusterfs-0:3.8.4-18.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64" }, "product_reference": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el6rhs.noarch", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch" }, "product_reference": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6", "product_id": "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src" }, "product_reference": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "relates_to_product_reference": "6Server-RH-Gluster-3.2-Server" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src" }, "product_reference": "glusterfs-0:3.8.4-18.el6.src", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-api-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-cli-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-cli-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-devel-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-devel-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-fuse-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-libs-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-libs-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64" }, "product_reference": "glusterfs-rdma-0:3.8.4-18.el6.x86_64", "relates_to_product_reference": "6Server-RHSClient" }, { "category": "default_component_of", "full_product_name": { "name": "python-gluster-0:3.8.4-18.el6.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6", "product_id": "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" }, "product_reference": "python-gluster-0:3.8.4-18.el6.noarch", "relates_to_product_reference": "6Server-RHSClient" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Florian Weimer" ], "organization": "Red Hat Product Security", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-1795", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2015-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1200927" } ], "notes": [ { "category": "description", "text": "It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package.", "title": "Vulnerability description" }, { "category": "summary", "text": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of glusterfs as shipped\nwith Red Hat Enterprise Linux 6, and 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src", "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1795" }, { "category": "external", "summary": "RHBZ#1200927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1795", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795" } ], "release_date": "2015-03-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-23T05:06:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src", "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0484" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src", "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64", "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch", "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src", "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64", "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue" } ] }
gsd-2015-1795
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-1795", "description": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.", "id": "GSD-2015-1795", "references": [ "https://access.redhat.com/errata/RHSA-2017:0486", "https://access.redhat.com/errata/RHSA-2017:0484" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-1795" ], "details": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.", "id": "GSD-2015-1795", "modified": "2023-12-13T01:20:05.092699Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1795", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2017-0484.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2017-0486.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html" }, { "name": "http://www.securityfocus.com/bid/99311", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/99311" }, { "name": "http://www.securitytracker.com/id/1038128", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1038128" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:gluster_storage:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1795" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "name": "1038128", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038128" }, { "name": "RHSA-2017:0486", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html" }, { "name": "RHSA-2017:0484", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html" }, { "name": "99311", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99311" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-13T00:47Z", "publishedDate": "2017-06-27T20:29Z" } } }
fkie_cve-2015-1795
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
redhat | gluster_storage | 3.2 | |
redhat | enterprise_linux | 6.0 | |
redhat | enterprise_linux | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:gluster_storage:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "518056FB-E049-45AF-876A-C1682118E29D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root." }, { "lang": "es", "value": "Red Hat Gluster Storage Paquete RPM 3.2 permite a los usuarios locales obtener privilegios y ejecutar c\u00f3digo arbitrario como root." } ], "id": "CVE-2015-1795", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-27T20:29:00.433", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99311" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038128" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2017-14103
Vulnerability from cnvd
Title: Red Hat Gluster Storage RPM Package本地权限提升漏洞
Description:
Red Hat Gluster Storage RPM Package是美国红帽(Red Hat)公司开发的一个用于软件的横向扩展存储软件包,它能够提供非结构化的数据存储方式。
Red Hat Gluster Storage RPM Package 3.2版本中存在安全漏洞。本地攻击者可利用该漏洞获取权限,并以root权限执行代码。
Severity: 高
Patch Name: Red Hat Gluster Storage RPM Package本地权限提升漏洞的补丁
Patch Description:
Red Hat Gluster Storage RPM Package是美国红帽(Red Hat)公司开发的一个用于软件的横向扩展存储软件包,它能够提供非结构化的数据存储方式。
Red Hat Gluster Storage RPM Package 3.2版本中存在安全漏洞。本地攻击者可利用该漏洞获取权限,并以root权限执行代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: http://rhn.redhat.com/errata/RHSA-2017-0484.html
Reference: http://rhn.redhat.com/errata/RHSA-2017-0484.html
Name | Red Hat Gluster Storage 3.1 |
---|
{ "bids": { "bid": { "bidNumber": "99311" } }, "cves": { "cve": { "cveNumber": "CVE-2015-1795", "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1795" } }, "description": "Red Hat Gluster Storage RPM Package\u662f\u7f8e\u56fd\u7ea2\u5e3d\uff08Red Hat\uff09\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u4e2a\u7528\u4e8e\u8f6f\u4ef6\u7684\u6a2a\u5411\u6269\u5c55\u5b58\u50a8\u8f6f\u4ef6\u5305\uff0c\u5b83\u80fd\u591f\u63d0\u4f9b\u975e\u7ed3\u6784\u5316\u7684\u6570\u636e\u5b58\u50a8\u65b9\u5f0f\u3002\r\n\r\nRed Hat Gluster Storage RPM Package 3.2\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u6743\u9650\uff0c\u5e76\u4ee5root\u6743\u9650\u6267\u884c\u4ee3\u7801\u3002", "discovererName": "Florian Weimer", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://rhn.redhat.com/errata/RHSA-2017-0484.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2017-14103", "openTime": "2017-07-13", "patchDescription": "Red Hat Gluster Storage RPM Package\u662f\u7f8e\u56fd\u7ea2\u5e3d\uff08Red Hat\uff09\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u4e2a\u7528\u4e8e\u8f6f\u4ef6\u7684\u6a2a\u5411\u6269\u5c55\u5b58\u50a8\u8f6f\u4ef6\u5305\uff0c\u5b83\u80fd\u591f\u63d0\u4f9b\u975e\u7ed3\u6784\u5316\u7684\u6570\u636e\u5b58\u50a8\u65b9\u5f0f\u3002\r\n\r\nRed Hat Gluster Storage RPM Package 3.2\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u6743\u9650\uff0c\u5e76\u4ee5root\u6743\u9650\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Red Hat Gluster Storage RPM Package\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Red Hat Gluster Storage 3.1" }, "referenceLink": "http://rhn.redhat.com/errata/RHSA-2017-0484.html", "serverity": "\u9ad8", "submitTime": "2017-07-03", "title": "Red Hat Gluster Storage RPM Package\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e" }
ghsa-vq9q-mjvr-qpfx
Vulnerability from github
Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.
{ "affected": [], "aliases": [ "CVE-2015-1795" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-06-27T20:29:00Z", "severity": "HIGH" }, "details": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.", "id": "GHSA-vq9q-mjvr-qpfx", "modified": "2022-05-14T01:08:48Z", "published": "2022-05-14T01:08:48Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0484" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0486" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2015-1795" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/99311" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1038128" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.