Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-1795 (GCVE-0-2015-1795)
Vulnerability from cvelistv5 – Published: 2017-06-27 20:00 – Updated: 2024-08-06 04:54
VLAI?
EPSS
Summary
Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:54:16.206Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
},
{
"name": "1038128",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1038128"
},
{
"name": "99311",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/99311"
},
{
"name": "RHSA-2017:0484",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html"
},
{
"name": "RHSA-2017:0486",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-03-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-06-29T09:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
},
{
"name": "1038128",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1038128"
},
{
"name": "99311",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/99311"
},
{
"name": "RHSA-2017:0484",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html"
},
{
"name": "RHSA-2017:0486",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2015-1795",
"datePublished": "2017-06-27T20:00:00",
"dateReserved": "2015-02-17T00:00:00",
"dateUpdated": "2024-08-06T04:54:16.206Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2015-1795\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2017-06-27T20:29:00.433\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.\"},{\"lang\":\"es\",\"value\":\"Red Hat Gluster Storage Paquete RPM 3.2 permite a los usuarios locales obtener privilegios y ejecutar c\u00f3digo arbitrario como root.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:gluster_storage:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"518056FB-E049-45AF-876A-C1682118E29D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0484.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0486.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99311\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038128\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1200927\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0484.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0486.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99311\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1200927\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]}]}}"
}
}
RHSA-2017:0486
Vulnerability from csaf_redhat - Published: 2017-03-23 05:18 - Updated: 2025-11-21 17:59Summary
Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update
Notes
Topic
An update is now available for Red Hat Gluster Storage 3.2 on Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.
The following packages have been upgraded to a later upstream version: glusterfs (3.8.4), redhat-storage-server (3.2.0.2), vdsm (4.17.33). (BZ#1362376)
Security Fix(es):
* It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. (CVE-2015-1795)
This issue was discovered by Florian Weimer of Red Hat Product Security.
Bug Fix(es):
* Bricks remain stopped if server quorum is no longer met, or if server quorum is disabled, to ensure that bricks in maintenance are not started incorrectly. (BZ#1340995)
* The metadata cache translator has been updated to improve Red Hat Gluster Storage performance when reading small files. (BZ#1427783)
* The 'gluster volume add-brick' command is no longer allowed when the replica count has increased and any replica bricks are unavailable. (BZ#1404989)
* Split-brain resolution commands work regardless of whether client-side heal or the self-heal daemon are enabled. (BZ#1403840)
Enhancement(s):
* Red Hat Gluster Storage now provides Transport Layer Security support for Samba and NFS-Ganesha. (BZ#1340608, BZ#1371475)
* A new reset-sync-time option enables resetting the sync time attribute to zero when required. (BZ#1205162)
* Tiering demotions are now triggered at most 5 seconds after a hi-watermark breach event. Administrators can use the cluster.tier-query-limit volume parameter to specify the number of records extracted from the heat database during demotion. (BZ#1361759)
* The /var/log/glusterfs/etc-glusterfs-glusterd.vol.log file is now named /var/log/glusterfs/glusterd.log. (BZ#1306120)
* The 'gluster volume attach-tier/detach-tier' commands are considered deprecated in favor of the new commands, 'gluster volume tier VOLNAME attach/detach'. (BZ#1388464)
* The HA_VOL_SERVER parameter in the ganesha-ha.conf file is no longer used by Red Hat Gluster Storage. (BZ#1348954)
* The volfile server role can now be passed to another server when a server is unavailable. (BZ#1351949)
* Ports can now be reused when they stop being used by another service. (BZ#1263090)
* The thread pool limit for the rebalance process is now dynamic, and is determined based on the number of available cores. (BZ#1352805)
* Brick verification at reboot now uses UUID instead of brick path. (BZ#1336267)
* LOGIN_NAME_MAX is now used as the maximum length for the slave user instead of __POSIX_LOGIN_NAME_MAX, allowing for up to 256 characters including the NULL byte. (BZ#1400365)
* The client identifier is now included in the log message to make it easier to determine which client failed to connect. (BZ#1333885)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Gluster Storage 3.2 on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.\n\nThe following packages have been upgraded to a later upstream version: glusterfs (3.8.4), redhat-storage-server (3.2.0.2), vdsm (4.17.33). (BZ#1362376)\n\nSecurity Fix(es):\n\n* It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. (CVE-2015-1795)\n\nThis issue was discovered by Florian Weimer of Red Hat Product Security.\n\nBug Fix(es):\n\n* Bricks remain stopped if server quorum is no longer met, or if server quorum is disabled, to ensure that bricks in maintenance are not started incorrectly. (BZ#1340995)\n\n* The metadata cache translator has been updated to improve Red Hat Gluster Storage performance when reading small files. (BZ#1427783)\n\n* The \u0027gluster volume add-brick\u0027 command is no longer allowed when the replica count has increased and any replica bricks are unavailable. (BZ#1404989)\n\n* Split-brain resolution commands work regardless of whether client-side heal or the self-heal daemon are enabled. (BZ#1403840)\n\nEnhancement(s):\n\n* Red Hat Gluster Storage now provides Transport Layer Security support for Samba and NFS-Ganesha. (BZ#1340608, BZ#1371475)\n\n* A new reset-sync-time option enables resetting the sync time attribute to zero when required. (BZ#1205162)\n\n* Tiering demotions are now triggered at most 5 seconds after a hi-watermark breach event. Administrators can use the cluster.tier-query-limit volume parameter to specify the number of records extracted from the heat database during demotion. (BZ#1361759)\n\n* The /var/log/glusterfs/etc-glusterfs-glusterd.vol.log file is now named /var/log/glusterfs/glusterd.log. (BZ#1306120)\n\n* The \u0027gluster volume attach-tier/detach-tier\u0027 commands are considered deprecated in favor of the new commands, \u0027gluster volume tier VOLNAME attach/detach\u0027. (BZ#1388464)\n\n* The HA_VOL_SERVER parameter in the ganesha-ha.conf file is no longer used by Red Hat Gluster Storage. (BZ#1348954)\n\n* The volfile server role can now be passed to another server when a server is unavailable. (BZ#1351949)\n\n* Ports can now be reused when they stop being used by another service. (BZ#1263090)\n\n* The thread pool limit for the rebalance process is now dynamic, and is determined based on the number of available cores. (BZ#1352805)\n\n* Brick verification at reboot now uses UUID instead of brick path. (BZ#1336267)\n\n* LOGIN_NAME_MAX is now used as the maximum length for the slave user instead of __POSIX_LOGIN_NAME_MAX, allowing for up to 256 characters including the NULL byte. (BZ#1400365)\n\n* The client identifier is now included in the log message to make it easier to determine which client failed to connect. (BZ#1333885)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:0486",
"url": "https://access.redhat.com/errata/RHSA-2017:0486"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/"
},
{
"category": "external",
"summary": "1168606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168606"
},
{
"category": "external",
"summary": "1200927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
},
{
"category": "external",
"summary": "1205162",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205162"
},
{
"category": "external",
"summary": "1211845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211845"
},
{
"category": "external",
"summary": "1240333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240333"
},
{
"category": "external",
"summary": "1241314",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1241314"
},
{
"category": "external",
"summary": "1245084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1245084"
},
{
"category": "external",
"summary": "1248998",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248998"
},
{
"category": "external",
"summary": "1256483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256483"
},
{
"category": "external",
"summary": "1256524",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256524"
},
{
"category": "external",
"summary": "1257182",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257182"
},
{
"category": "external",
"summary": "1258267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258267"
},
{
"category": "external",
"summary": "1263090",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1263090"
},
{
"category": "external",
"summary": "1264310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1264310"
},
{
"category": "external",
"summary": "1278336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278336"
},
{
"category": "external",
"summary": "1278385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278385"
},
{
"category": "external",
"summary": "1278394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278394"
},
{
"category": "external",
"summary": "1278900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278900"
},
{
"category": "external",
"summary": "1284873",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284873"
},
{
"category": "external",
"summary": "1286038",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286038"
},
{
"category": "external",
"summary": "1286572",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286572"
},
{
"category": "external",
"summary": "1294035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294035"
},
{
"category": "external",
"summary": "1296796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296796"
},
{
"category": "external",
"summary": "1298118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298118"
},
{
"category": "external",
"summary": "1299841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299841"
},
{
"category": "external",
"summary": "1306120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306120"
},
{
"category": "external",
"summary": "1306656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1306656"
},
{
"category": "external",
"summary": "1312199",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1312199"
},
{
"category": "external",
"summary": "1315544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1315544"
},
{
"category": "external",
"summary": "1317653",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317653"
},
{
"category": "external",
"summary": "1318000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1318000"
},
{
"category": "external",
"summary": "1319078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319078"
},
{
"category": "external",
"summary": "1319886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319886"
},
{
"category": "external",
"summary": "1324053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324053"
},
{
"category": "external",
"summary": "1325821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1325821"
},
{
"category": "external",
"summary": "1326066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326066"
},
{
"category": "external",
"summary": "1327952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327952"
},
{
"category": "external",
"summary": "1328451",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328451"
},
{
"category": "external",
"summary": "1332080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332080"
},
{
"category": "external",
"summary": "1332133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332133"
},
{
"category": "external",
"summary": "1332542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1332542"
},
{
"category": "external",
"summary": "1333406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333406"
},
{
"category": "external",
"summary": "1333484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333484"
},
{
"category": "external",
"summary": "1333749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333749"
},
{
"category": "external",
"summary": "1333885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333885"
},
{
"category": "external",
"summary": "1334664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334664"
},
{
"category": "external",
"summary": "1334858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1334858"
},
{
"category": "external",
"summary": "1335029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335029"
},
{
"category": "external",
"summary": "1336267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336267"
},
{
"category": "external",
"summary": "1336339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336339"
},
{
"category": "external",
"summary": "1336377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336377"
},
{
"category": "external",
"summary": "1336764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1336764"
},
{
"category": "external",
"summary": "1337391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337391"
},
{
"category": "external",
"summary": "1337444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337444"
},
{
"category": "external",
"summary": "1337450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337450"
},
{
"category": "external",
"summary": "1337477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337477"
},
{
"category": "external",
"summary": "1337495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337495"
},
{
"category": "external",
"summary": "1337565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337565"
},
{
"category": "external",
"summary": "1337811",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337811"
},
{
"category": "external",
"summary": "1337836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337836"
},
{
"category": "external",
"summary": "1337863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337863"
},
{
"category": "external",
"summary": "1338615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338615"
},
{
"category": "external",
"summary": "1338748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338748"
},
{
"category": "external",
"summary": "1339159",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1339159"
},
{
"category": "external",
"summary": "1340338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340338"
},
{
"category": "external",
"summary": "1340608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340608"
},
{
"category": "external",
"summary": "1340756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340756"
},
{
"category": "external",
"summary": "1340995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340995"
},
{
"category": "external",
"summary": "1341934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341934"
},
{
"category": "external",
"summary": "1342459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342459"
},
{
"category": "external",
"summary": "1343178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343178"
},
{
"category": "external",
"summary": "1343320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343320"
},
{
"category": "external",
"summary": "1343695",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343695"
},
{
"category": "external",
"summary": "1344322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344322"
},
{
"category": "external",
"summary": "1344651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344651"
},
{
"category": "external",
"summary": "1344675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344675"
},
{
"category": "external",
"summary": "1344826",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344826"
},
{
"category": "external",
"summary": "1344908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344908"
},
{
"category": "external",
"summary": "1345732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1345732"
},
{
"category": "external",
"summary": "1347251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347251"
},
{
"category": "external",
"summary": "1347257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347257"
},
{
"category": "external",
"summary": "1347625",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347625"
},
{
"category": "external",
"summary": "1347922",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347922"
},
{
"category": "external",
"summary": "1347923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1347923"
},
{
"category": "external",
"summary": "1348949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348949"
},
{
"category": "external",
"summary": "1348954",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348954"
},
{
"category": "external",
"summary": "1348962",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1348962"
},
{
"category": "external",
"summary": "1351589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351589"
},
{
"category": "external",
"summary": "1351732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351732"
},
{
"category": "external",
"summary": "1351825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351825"
},
{
"category": "external",
"summary": "1351949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1351949"
},
{
"category": "external",
"summary": "1352125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352125"
},
{
"category": "external",
"summary": "1352805",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1352805"
},
{
"category": "external",
"summary": "1353427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1353427"
},
{
"category": "external",
"summary": "1354260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354260"
},
{
"category": "external",
"summary": "1356058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356058"
},
{
"category": "external",
"summary": "1356804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356804"
},
{
"category": "external",
"summary": "1359180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359180"
},
{
"category": "external",
"summary": "1359588",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359588"
},
{
"category": "external",
"summary": "1359605",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359605"
},
{
"category": "external",
"summary": "1359607",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359607"
},
{
"category": "external",
"summary": "1359619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1359619"
},
{
"category": "external",
"summary": "1360807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360807"
},
{
"category": "external",
"summary": "1360978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360978"
},
{
"category": "external",
"summary": "1361066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361066"
},
{
"category": "external",
"summary": "1361068",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361068"
},
{
"category": "external",
"summary": "1361078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361078"
},
{
"category": "external",
"summary": "1361082",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361082"
},
{
"category": "external",
"summary": "1361084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361084"
},
{
"category": "external",
"summary": "1361086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361086"
},
{
"category": "external",
"summary": "1361098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361098"
},
{
"category": "external",
"summary": "1361101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361101"
},
{
"category": "external",
"summary": "1361118",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361118"
},
{
"category": "external",
"summary": "1361155",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361155"
},
{
"category": "external",
"summary": "1361170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361170"
},
{
"category": "external",
"summary": "1361184",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361184"
},
{
"category": "external",
"summary": "1361513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361513"
},
{
"category": "external",
"summary": "1361519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361519"
},
{
"category": "external",
"summary": "1362376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362376"
},
{
"category": "external",
"summary": "1364422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364422"
},
{
"category": "external",
"summary": "1364551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1364551"
},
{
"category": "external",
"summary": "1366128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366128"
},
{
"category": "external",
"summary": "1367382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367382"
},
{
"category": "external",
"summary": "1367472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367472"
},
{
"category": "external",
"summary": "1369384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369384"
},
{
"category": "external",
"summary": "1369391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369391"
},
{
"category": "external",
"summary": "1370350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1370350"
},
{
"category": "external",
"summary": "1371475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1371475"
},
{
"category": "external",
"summary": "1373976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373976"
},
{
"category": "external",
"summary": "1374166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1374166"
},
{
"category": "external",
"summary": "1375057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375057"
},
{
"category": "external",
"summary": "1375465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375465"
},
{
"category": "external",
"summary": "1376464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376464"
},
{
"category": "external",
"summary": "1377062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377062"
},
{
"category": "external",
"summary": "1377387",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377387"
},
{
"category": "external",
"summary": "1378030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378030"
},
{
"category": "external",
"summary": "1378131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378131"
},
{
"category": "external",
"summary": "1378300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378300"
},
{
"category": "external",
"summary": "1378342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378342"
},
{
"category": "external",
"summary": "1378484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378484"
},
{
"category": "external",
"summary": "1378528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378528"
},
{
"category": "external",
"summary": "1378676",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378676"
},
{
"category": "external",
"summary": "1378677",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378677"
},
{
"category": "external",
"summary": "1378867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378867"
},
{
"category": "external",
"summary": "1379241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379241"
},
{
"category": "external",
"summary": "1379919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379919"
},
{
"category": "external",
"summary": "1379924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379924"
},
{
"category": "external",
"summary": "1379963",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379963"
},
{
"category": "external",
"summary": "1379966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379966"
},
{
"category": "external",
"summary": "1380122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380122"
},
{
"category": "external",
"summary": "1380257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380257"
},
{
"category": "external",
"summary": "1380276",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380276"
},
{
"category": "external",
"summary": "1380419",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380419"
},
{
"category": "external",
"summary": "1380605",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380605"
},
{
"category": "external",
"summary": "1380619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380619"
},
{
"category": "external",
"summary": "1380638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380638"
},
{
"category": "external",
"summary": "1380655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380655"
},
{
"category": "external",
"summary": "1380710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380710"
},
{
"category": "external",
"summary": "1380742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1380742"
},
{
"category": "external",
"summary": "1381140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381140"
},
{
"category": "external",
"summary": "1381353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381353"
},
{
"category": "external",
"summary": "1381452",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381452"
},
{
"category": "external",
"summary": "1381822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381822"
},
{
"category": "external",
"summary": "1381831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381831"
},
{
"category": "external",
"summary": "1381968",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1381968"
},
{
"category": "external",
"summary": "1382065",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382065"
},
{
"category": "external",
"summary": "1382277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382277"
},
{
"category": "external",
"summary": "1382345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382345"
},
{
"category": "external",
"summary": "1384070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384070"
},
{
"category": "external",
"summary": "1384311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384311"
},
{
"category": "external",
"summary": "1384316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384316"
},
{
"category": "external",
"summary": "1384459",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384459"
},
{
"category": "external",
"summary": "1384460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384460"
},
{
"category": "external",
"summary": "1384481",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384481"
},
{
"category": "external",
"summary": "1384865",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384865"
},
{
"category": "external",
"summary": "1384993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384993"
},
{
"category": "external",
"summary": "1385468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385468"
},
{
"category": "external",
"summary": "1385474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385474"
},
{
"category": "external",
"summary": "1385525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385525"
},
{
"category": "external",
"summary": "1385561",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385561"
},
{
"category": "external",
"summary": "1385605",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385605"
},
{
"category": "external",
"summary": "1385606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385606"
},
{
"category": "external",
"summary": "1386127",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386127"
},
{
"category": "external",
"summary": "1386172",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386172"
},
{
"category": "external",
"summary": "1386177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386177"
},
{
"category": "external",
"summary": "1386185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386185"
},
{
"category": "external",
"summary": "1386280",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386280"
},
{
"category": "external",
"summary": "1386366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386366"
},
{
"category": "external",
"summary": "1386472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386472"
},
{
"category": "external",
"summary": "1386477",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386477"
},
{
"category": "external",
"summary": "1386538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386538"
},
{
"category": "external",
"summary": "1387152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387152"
},
{
"category": "external",
"summary": "1387204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387204"
},
{
"category": "external",
"summary": "1387205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387205"
},
{
"category": "external",
"summary": "1387501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387501"
},
{
"category": "external",
"summary": "1387544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387544"
},
{
"category": "external",
"summary": "1387558",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387558"
},
{
"category": "external",
"summary": "1387563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1387563"
},
{
"category": "external",
"summary": "1388464",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388464"
},
{
"category": "external",
"summary": "1388560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388560"
},
{
"category": "external",
"summary": "1388711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388711"
},
{
"category": "external",
"summary": "1388734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388734"
},
{
"category": "external",
"summary": "1388755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388755"
},
{
"category": "external",
"summary": "1389168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389168"
},
{
"category": "external",
"summary": "1389422",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389422"
},
{
"category": "external",
"summary": "1389661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389661"
},
{
"category": "external",
"summary": "1390843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1390843"
},
{
"category": "external",
"summary": "1391072",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391072"
},
{
"category": "external",
"summary": "1391093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391093"
},
{
"category": "external",
"summary": "1391808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1391808"
},
{
"category": "external",
"summary": "1392299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392299"
},
{
"category": "external",
"summary": "1392761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392761"
},
{
"category": "external",
"summary": "1392837",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392837"
},
{
"category": "external",
"summary": "1392895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392895"
},
{
"category": "external",
"summary": "1392899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392899"
},
{
"category": "external",
"summary": "1392906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392906"
},
{
"category": "external",
"summary": "1393316",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393316"
},
{
"category": "external",
"summary": "1393526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393526"
},
{
"category": "external",
"summary": "1393694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393694"
},
{
"category": "external",
"summary": "1393709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393709"
},
{
"category": "external",
"summary": "1393758",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393758"
},
{
"category": "external",
"summary": "1394219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1394219"
},
{
"category": "external",
"summary": "1394752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1394752"
},
{
"category": "external",
"summary": "1395539",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395539"
},
{
"category": "external",
"summary": "1395541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395541"
},
{
"category": "external",
"summary": "1395574",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395574"
},
{
"category": "external",
"summary": "1395603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395603"
},
{
"category": "external",
"summary": "1395613",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395613"
},
{
"category": "external",
"summary": "1396166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396166"
},
{
"category": "external",
"summary": "1396361",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396361"
},
{
"category": "external",
"summary": "1396449",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396449"
},
{
"category": "external",
"summary": "1397257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397257"
},
{
"category": "external",
"summary": "1397267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397267"
},
{
"category": "external",
"summary": "1397286",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397286"
},
{
"category": "external",
"summary": "1397364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397364"
},
{
"category": "external",
"summary": "1397430",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397430"
},
{
"category": "external",
"summary": "1397450",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397450"
},
{
"category": "external",
"summary": "1397681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397681"
},
{
"category": "external",
"summary": "1397846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397846"
},
{
"category": "external",
"summary": "1398188",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398188"
},
{
"category": "external",
"summary": "1398257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398257"
},
{
"category": "external",
"summary": "1398261",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398261"
},
{
"category": "external",
"summary": "1398311",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398311"
},
{
"category": "external",
"summary": "1398315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398315"
},
{
"category": "external",
"summary": "1398331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398331"
},
{
"category": "external",
"summary": "1398798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1398798"
},
{
"category": "external",
"summary": "1399100",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399100"
},
{
"category": "external",
"summary": "1399105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399105"
},
{
"category": "external",
"summary": "1399476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399476"
},
{
"category": "external",
"summary": "1399598",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399598"
},
{
"category": "external",
"summary": "1399698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399698"
},
{
"category": "external",
"summary": "1399753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399753"
},
{
"category": "external",
"summary": "1399757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399757"
},
{
"category": "external",
"summary": "1400037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400037"
},
{
"category": "external",
"summary": "1400057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400057"
},
{
"category": "external",
"summary": "1400068",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400068"
},
{
"category": "external",
"summary": "1400093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400093"
},
{
"category": "external",
"summary": "1400395",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400395"
},
{
"category": "external",
"summary": "1400599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400599"
},
{
"category": "external",
"summary": "1401380",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401380"
},
{
"category": "external",
"summary": "1401806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401806"
},
{
"category": "external",
"summary": "1401814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401814"
},
{
"category": "external",
"summary": "1401817",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401817"
},
{
"category": "external",
"summary": "1401869",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401869"
},
{
"category": "external",
"summary": "1402360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402360"
},
{
"category": "external",
"summary": "1402683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402683"
},
{
"category": "external",
"summary": "1402774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402774"
},
{
"category": "external",
"summary": "1403120",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403120"
},
{
"category": "external",
"summary": "1403672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403672"
},
{
"category": "external",
"summary": "1403770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403770"
},
{
"category": "external",
"summary": "1403840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403840"
},
{
"category": "external",
"summary": "1404110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404110"
},
{
"category": "external",
"summary": "1404541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404541"
},
{
"category": "external",
"summary": "1404569",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404569"
},
{
"category": "external",
"summary": "1404633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404633"
},
{
"category": "external",
"summary": "1404982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404982"
},
{
"category": "external",
"summary": "1404989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404989"
},
{
"category": "external",
"summary": "1404996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404996"
},
{
"category": "external",
"summary": "1405000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405000"
},
{
"category": "external",
"summary": "1405299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405299"
},
{
"category": "external",
"summary": "1405302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1405302"
},
{
"category": "external",
"summary": "1406025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406025"
},
{
"category": "external",
"summary": "1406322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406322"
},
{
"category": "external",
"summary": "1406401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406401"
},
{
"category": "external",
"summary": "1406723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406723"
},
{
"category": "external",
"summary": "1408112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408112"
},
{
"category": "external",
"summary": "1408413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408413"
},
{
"category": "external",
"summary": "1408426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408426"
},
{
"category": "external",
"summary": "1408576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408576"
},
{
"category": "external",
"summary": "1408639",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408639"
},
{
"category": "external",
"summary": "1408641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408641"
},
{
"category": "external",
"summary": "1408655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408655"
},
{
"category": "external",
"summary": "1408705",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408705"
},
{
"category": "external",
"summary": "1408836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408836"
},
{
"category": "external",
"summary": "1409135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409135"
},
{
"category": "external",
"summary": "1409472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409472"
},
{
"category": "external",
"summary": "1409563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409563"
},
{
"category": "external",
"summary": "1409782",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409782"
},
{
"category": "external",
"summary": "1409808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409808"
},
{
"category": "external",
"summary": "1410025",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410025"
},
{
"category": "external",
"summary": "1410406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410406"
},
{
"category": "external",
"summary": "1411270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411270"
},
{
"category": "external",
"summary": "1411329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411329"
},
{
"category": "external",
"summary": "1411617",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411617"
},
{
"category": "external",
"summary": "1412554",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412554"
},
{
"category": "external",
"summary": "1412955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412955"
},
{
"category": "external",
"summary": "1413351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413351"
},
{
"category": "external",
"summary": "1413513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413513"
},
{
"category": "external",
"summary": "1414247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414247"
},
{
"category": "external",
"summary": "1414663",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414663"
},
{
"category": "external",
"summary": "1415101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415101"
},
{
"category": "external",
"summary": "1415583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415583"
},
{
"category": "external",
"summary": "1417177",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417177"
},
{
"category": "external",
"summary": "1417955",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1417955"
},
{
"category": "external",
"summary": "1418011",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418011"
},
{
"category": "external",
"summary": "1418603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418603"
},
{
"category": "external",
"summary": "1418901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1418901"
},
{
"category": "external",
"summary": "1419859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419859"
},
{
"category": "external",
"summary": "1420324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420324"
},
{
"category": "external",
"summary": "1420635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420635"
},
{
"category": "external",
"summary": "1422431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422431"
},
{
"category": "external",
"summary": "1422576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422576"
},
{
"category": "external",
"summary": "1425740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425740"
},
{
"category": "external",
"summary": "1426324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426324"
},
{
"category": "external",
"summary": "1426559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426559"
},
{
"category": "external",
"summary": "1427783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427783"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0486.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:59:46+00:00",
"generator": {
"date": "2025-11-21T17:59:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:0486",
"initial_release_date": "2017-03-23T05:18:45+00:00",
"revision_history": [
{
"date": "2017-03-23T05:18:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-03-23T05:18:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:59:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product": {
"name": "Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:storage:3.2:server:el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product": {
"name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:storage:3:client:el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product": {
"name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Gluster Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src",
"product": {
"name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src",
"product_id": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.2-1.el7rhgs?arch=src"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.17.33-1.1.el7rhgs.src",
"product": {
"name": "vdsm-0:4.17.33-1.1.el7rhgs.src",
"product_id": "vdsm-0:4.17.33-1.1.el7rhgs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.17.33-1.1.el7rhgs?arch=src"
}
}
},
{
"category": "product_version",
"name": "glusterfs-0:3.8.4-18.el7rhgs.src",
"product": {
"name": "glusterfs-0:3.8.4-18.el7rhgs.src",
"product_id": "glusterfs-0:3.8.4-18.el7rhgs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7rhgs?arch=src"
}
}
},
{
"category": "product_version",
"name": "glusterfs-0:3.8.4-18.el7.src",
"product": {
"name": "glusterfs-0:3.8.4-18.el7.src",
"product_id": "glusterfs-0:3.8.4-18.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch",
"product": {
"name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch",
"product_id": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.2-1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-tests@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-yajsonrpc@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-faqemu@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-gluster@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-jsonrpc@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-ethtool-options@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-openstacknet@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-infra@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-hook-qemucmdline@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-python@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-xmlrpc@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-debug-plugin@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch",
"product": {
"name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch",
"product_id": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vdsm-cli@4.17.33-1.1.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-gluster-0:3.8.4-18.el7rhgs.noarch",
"product": {
"name": "python-gluster-0:3.8.4-18.el7rhgs.noarch",
"product_id": "python-gluster-0:3.8.4-18.el7rhgs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el7rhgs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-gluster-0:3.8.4-18.el7.noarch",
"product": {
"name": "python-gluster-0:3.8.4-18.el7.noarch",
"product_id": "python-gluster-0:3.8.4-18.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64",
"product": {
"name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64",
"product_id": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el7rhgs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-devel-0:3.8.4-18.el7.x86_64",
"product": {
"name": "glusterfs-devel-0:3.8.4-18.el7.x86_64",
"product_id": "glusterfs-devel-0:3.8.4-18.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-cli-0:3.8.4-18.el7.x86_64",
"product": {
"name": "glusterfs-cli-0:3.8.4-18.el7.x86_64",
"product_id": "glusterfs-cli-0:3.8.4-18.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"product": {
"name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"product_id": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"product": {
"name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"product_id": "glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"product": {
"name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"product_id": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-libs-0:3.8.4-18.el7.x86_64",
"product": {
"name": "glusterfs-libs-0:3.8.4-18.el7.x86_64",
"product_id": "glusterfs-libs-0:3.8.4-18.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-api-0:3.8.4-18.el7.x86_64",
"product": {
"name": "glusterfs-api-0:3.8.4-18.el7.x86_64",
"product_id": "glusterfs-api-0:3.8.4-18.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-0:3.8.4-18.el7.x86_64",
"product": {
"name": "glusterfs-0:3.8.4-18.el7.x86_64",
"product_id": "glusterfs-0:3.8.4-18.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"product": {
"name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"product_id": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"product": {
"name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"product_id": "glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-0:3.8.4-18.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src"
},
"product_reference": "glusterfs-0:3.8.4-18.el7rhgs.src",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-api-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-events-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64"
},
"product_reference": "glusterfs-server-0:3.8.4-18.el7rhgs.x86_64",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gluster-0:3.8.4-18.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch"
},
"product_reference": "python-gluster-0:3.8.4-18.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch"
},
"product_reference": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src"
},
"product_reference": "redhat-storage-server-0:3.2.0.2-1.el7rhgs.src",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-0:4.17.33-1.1.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src"
},
"product_reference": "vdsm-0:4.17.33-1.1.el7rhgs.src",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-python-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-7",
"product_id": "7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch"
},
"product_reference": "vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"relates_to_product_reference": "7Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-0:3.8.4-18.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src"
},
"product_reference": "glusterfs-0:3.8.4-18.el7.src",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-api-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-api-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-cli-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-cli-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-devel-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-libs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-libs-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gluster-0:3.8.4-18.el7.noarch as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
"product_id": "7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch"
},
"product_reference": "python-gluster-0:3.8.4-18.el7.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Agents-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-0:3.8.4-18.el7.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src"
},
"product_reference": "glusterfs-0:3.8.4-18.el7.src",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-api-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-api-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-cli-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-cli-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-devel-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-devel-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-fuse-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-libs-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-libs-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-rdma-0:3.8.4-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64"
},
"product_reference": "glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"relates_to_product_reference": "7Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gluster-0:3.8.4-18.el7.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
"product_id": "7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch"
},
"product_reference": "python-gluster-0:3.8.4-18.el7.noarch",
"relates_to_product_reference": "7Server-RHSClient"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Florian Weimer"
],
"organization": "Red Hat Product Security",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2015-1795",
"cwe": {
"id": "CWE-377",
"name": "Insecure Temporary File"
},
"discovery_date": "2015-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1200927"
}
],
"notes": [
{
"category": "description",
"text": "It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of glusterfs as shipped\nwith Red Hat Enterprise Linux 6, and 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src",
"7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src",
"7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src",
"7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src",
"7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch",
"7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src",
"7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-1795"
},
{
"category": "external",
"summary": "RHBZ#1200927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795"
}
],
"release_date": "2015-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-03-23T05:18:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src",
"7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src",
"7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src",
"7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src",
"7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch",
"7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src",
"7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0486"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.src",
"7Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el7rhgs.x86_64",
"7Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.2-1.el7rhgs.src",
"7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-0:4.17.33-1.1.el7rhgs.src",
"7Server-RH-Gluster-3.2-Server:vdsm-cli-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-debug-plugin-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-gluster-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-ethtool-options-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-faqemu-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-openstacknet-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-hook-qemucmdline-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-infra-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-jsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-python-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-tests-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-xmlrpc-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RH-Gluster-3.2-Server:vdsm-yajsonrpc-0:4.17.33-1.1.el7rhgs.noarch",
"7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.src",
"7Server-RHEV-4-Agents-7:glusterfs-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-api-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"7Server-RHEV-4-Agents-7:python-gluster-0:3.8.4-18.el7.noarch",
"7Server-RHSClient:glusterfs-0:3.8.4-18.el7.src",
"7Server-RHSClient:glusterfs-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-api-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-cli-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-devel-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-libs-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el7.x86_64",
"7Server-RHSClient:python-gluster-0:3.8.4-18.el7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue"
}
]
}
RHSA-2017:0484
Vulnerability from csaf_redhat - Published: 2017-03-23 05:06 - Updated: 2025-11-21 17:59Summary
Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update
Notes
Topic
An update is now available for Red Hat Gluster Storage 3.2 on Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.
The following packages have been upgraded to a later upstream version: glusterfs (3.8.4), redhat-storage-server (3.2.0.3). (BZ#1362373)
Security Fix(es):
* It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. (CVE-2015-1795)
This issue was discovered by Florian Weimer of Red Hat Product Security.
Bug Fix(es):
* Bricks remain stopped if server quorum is no longer met, or if server quorum is disabled, to ensure that bricks in maintenance are not started incorrectly. (BZ#1340995)
* The metadata cache translator has been updated to improve Red Hat Gluster Storage performance when reading small files. (BZ#1427783)
* The 'gluster volume add-brick' command is no longer allowed when the replica count has increased and any replica bricks are unavailable. (BZ#1404989)
* Split-brain resolution commands work regardless of whether client-side heal or the self-heal daemon are enabled. (BZ#1403840)
Enhancement(s):
* Red Hat Gluster Storage now provides Transport Layer Security support for Samba and NFS-Ganesha. (BZ#1340608, BZ#1371475)
* A new reset-sync-time option enables resetting the sync time attribute to zero when required. (BZ#1205162)
* Tiering demotions are now triggered at most 5 seconds after a hi-watermark breach event. Administrators can use the cluster.tier-query-limit volume parameter to specify the number of records extracted from the heat database during demotion. (BZ#1361759)
* The /var/log/glusterfs/etc-glusterfs-glusterd.vol.log file is now named /var/log/glusterfs/glusterd.log. (BZ#1306120)
* The 'gluster volume attach-tier/detach-tier' commands are considered deprecated in favor of the new commands, 'gluster volume tier VOLNAME attach/detach'. (BZ#1388464)
* The HA_VOL_SERVER parameter in the ganesha-ha.conf file is no longer used by Red Hat Gluster Storage. (BZ#1348954)
* The volfile server role can now be passed to another server when a server is unavailable. (BZ#1351949)
* Ports can now be reused when they stop being used by another service. (BZ#1263090)
* The thread pool limit for the rebalance process is now dynamic, and is determined based on the number of available cores. (BZ#1352805)
* Brick verification at reboot now uses UUID instead of brick path. (BZ#1336267)
* LOGIN_NAME_MAX is now used as the maximum length for the slave user instead of __POSIX_LOGIN_NAME_MAX, allowing for up to 256 characters including the NULL byte. (BZ#1400365)
* The client identifier is now included in the log message to make it easier to determine which client failed to connect. (BZ#1333885)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Gluster Storage 3.2 on Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Gluster Storage is a software only scale-out storage solution that provides flexible and affordable unstructured data storage. It unifies data storage and infrastructure, increases performance, and improves availability and manageability to meet enterprise-level storage challenges.\n\nThe following packages have been upgraded to a later upstream version: glusterfs (3.8.4), redhat-storage-server (3.2.0.3). (BZ#1362373)\n\nSecurity Fix(es):\n\n* It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package. (CVE-2015-1795)\n\nThis issue was discovered by Florian Weimer of Red Hat Product Security.\n\nBug Fix(es):\n\n* Bricks remain stopped if server quorum is no longer met, or if server quorum is disabled, to ensure that bricks in maintenance are not started incorrectly. (BZ#1340995)\n\n* The metadata cache translator has been updated to improve Red Hat Gluster Storage performance when reading small files. (BZ#1427783)\n\n* The \u0027gluster volume add-brick\u0027 command is no longer allowed when the replica count has increased and any replica bricks are unavailable. (BZ#1404989)\n\n* Split-brain resolution commands work regardless of whether client-side heal or the self-heal daemon are enabled. (BZ#1403840)\n\nEnhancement(s):\n\n* Red Hat Gluster Storage now provides Transport Layer Security support for Samba and NFS-Ganesha. (BZ#1340608, BZ#1371475)\n\n* A new reset-sync-time option enables resetting the sync time attribute to zero when required. (BZ#1205162)\n\n* Tiering demotions are now triggered at most 5 seconds after a hi-watermark breach event. Administrators can use the cluster.tier-query-limit volume parameter to specify the number of records extracted from the heat database during demotion. (BZ#1361759)\n\n* The /var/log/glusterfs/etc-glusterfs-glusterd.vol.log file is now named /var/log/glusterfs/glusterd.log. (BZ#1306120)\n\n* The \u0027gluster volume attach-tier/detach-tier\u0027 commands are considered deprecated in favor of the new commands, \u0027gluster volume tier VOLNAME attach/detach\u0027. (BZ#1388464)\n\n* The HA_VOL_SERVER parameter in the ganesha-ha.conf file is no longer used by Red Hat Gluster Storage. (BZ#1348954)\n\n* The volfile server role can now be passed to another server when a server is unavailable. (BZ#1351949)\n\n* Ports can now be reused when they stop being used by another service. (BZ#1263090)\n\n* The thread pool limit for the rebalance process is now dynamic, and is determined based on the number of available cores. (BZ#1352805)\n\n* Brick verification at reboot now uses UUID instead of brick path. (BZ#1336267)\n\n* LOGIN_NAME_MAX is now used as the maximum length for the slave user instead of __POSIX_LOGIN_NAME_MAX, allowing for up to 256 characters including the NULL byte. (BZ#1400365)\n\n* The client identifier is now included in the log message to make it easier to determine which client failed to connect. (BZ#1333885)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:0484",
"url": "https://access.redhat.com/errata/RHSA-2017:0484"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_gluster_storage/3.2/html/3.2_release_notes/"
},
{
"category": "external",
"summary": "1200927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
},
{
"category": "external",
"summary": "1362373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362373"
},
{
"category": "external",
"summary": "1375059",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375059"
},
{
"category": "external",
"summary": "1382319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382319"
},
{
"category": "external",
"summary": "1403587",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403587"
},
{
"category": "external",
"summary": "1403919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1403919"
},
{
"category": "external",
"summary": "1404551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1404551"
},
{
"category": "external",
"summary": "1424944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424944"
},
{
"category": "external",
"summary": "1425748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425748"
},
{
"category": "external",
"summary": "1432972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1432972"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0484.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:59:44+00:00",
"generator": {
"date": "2025-11-21T17:59:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:0484",
"initial_release_date": "2017-03-23T05:06:37+00:00",
"revision_history": [
{
"date": "2017-03-23T05:06:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-03-23T05:06:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:59:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product": {
"name": "Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:storage:3.2:server:el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product": {
"name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:storage:3:client:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Gluster Storage"
},
{
"branches": [
{
"category": "product_version",
"name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-ganesha@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-events@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-server@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64",
"product": {
"name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64",
"product_id": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el6rhs?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64",
"product": {
"name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64",
"product_id": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.8.4-18.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-cli-0:3.8.4-18.el6.x86_64",
"product": {
"name": "glusterfs-cli-0:3.8.4-18.el6.x86_64",
"product_id": "glusterfs-cli-0:3.8.4-18.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-cli@3.8.4-18.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-devel-0:3.8.4-18.el6.x86_64",
"product": {
"name": "glusterfs-devel-0:3.8.4-18.el6.x86_64",
"product_id": "glusterfs-devel-0:3.8.4-18.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-devel@3.8.4-18.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-libs-0:3.8.4-18.el6.x86_64",
"product": {
"name": "glusterfs-libs-0:3.8.4-18.el6.x86_64",
"product_id": "glusterfs-libs-0:3.8.4-18.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-libs@3.8.4-18.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64",
"product": {
"name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64",
"product_id": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-api-devel@3.8.4-18.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64",
"product": {
"name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64",
"product_id": "glusterfs-fuse-0:3.8.4-18.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-fuse@3.8.4-18.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-0:3.8.4-18.el6.x86_64",
"product": {
"name": "glusterfs-0:3.8.4-18.el6.x86_64",
"product_id": "glusterfs-0:3.8.4-18.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-api-0:3.8.4-18.el6.x86_64",
"product": {
"name": "glusterfs-api-0:3.8.4-18.el6.x86_64",
"product_id": "glusterfs-api-0:3.8.4-18.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-api@3.8.4-18.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64",
"product": {
"name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64",
"product_id": "glusterfs-rdma-0:3.8.4-18.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-rdma@3.8.4-18.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64",
"product": {
"name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64",
"product_id": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.8.4-18.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glusterfs-0:3.8.4-18.el6rhs.src",
"product": {
"name": "glusterfs-0:3.8.4-18.el6rhs.src",
"product_id": "glusterfs-0:3.8.4-18.el6rhs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6rhs?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src",
"product": {
"name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src",
"product_id": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.3-1.el6rhs?arch=src"
}
}
},
{
"category": "product_version",
"name": "glusterfs-0:3.8.4-18.el6.src",
"product": {
"name": "glusterfs-0:3.8.4-18.el6.src",
"product_id": "glusterfs-0:3.8.4-18.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glusterfs@3.8.4-18.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-gluster-0:3.8.4-18.el6rhs.noarch",
"product": {
"name": "python-gluster-0:3.8.4-18.el6rhs.noarch",
"product_id": "python-gluster-0:3.8.4-18.el6rhs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el6rhs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch",
"product": {
"name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch",
"product_id": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-storage-server@3.2.0.3-1.el6rhs?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-gluster-0:3.8.4-18.el6.noarch",
"product": {
"name": "python-gluster-0:3.8.4-18.el6.noarch",
"product_id": "python-gluster-0:3.8.4-18.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-gluster@3.8.4-18.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-0:3.8.4-18.el6rhs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src"
},
"product_reference": "glusterfs-0:3.8.4-18.el6rhs.src",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-api-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-cli-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-devel-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-events-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-libs-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64 as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64"
},
"product_reference": "glusterfs-server-0:3.8.4-18.el6rhs.x86_64",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gluster-0:3.8.4-18.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch"
},
"product_reference": "python-gluster-0:3.8.4-18.el6rhs.noarch",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch"
},
"product_reference": "redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src as a component of Red Hat Gluster Storage Server 3.2 on RHEL-6",
"product_id": "6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src"
},
"product_reference": "redhat-storage-server-0:3.2.0.3-1.el6rhs.src",
"relates_to_product_reference": "6Server-RH-Gluster-3.2-Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-0:3.8.4-18.el6.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src"
},
"product_reference": "glusterfs-0:3.8.4-18.el6.src",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64"
},
"product_reference": "glusterfs-0:3.8.4-18.el6.x86_64",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-api-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64"
},
"product_reference": "glusterfs-api-0:3.8.4-18.el6.x86_64",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64"
},
"product_reference": "glusterfs-api-devel-0:3.8.4-18.el6.x86_64",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-cli-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64"
},
"product_reference": "glusterfs-cli-0:3.8.4-18.el6.x86_64",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64"
},
"product_reference": "glusterfs-client-xlators-0:3.8.4-18.el6.x86_64",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64"
},
"product_reference": "glusterfs-debuginfo-0:3.8.4-18.el6.x86_64",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-devel-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64"
},
"product_reference": "glusterfs-devel-0:3.8.4-18.el6.x86_64",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-fuse-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64"
},
"product_reference": "glusterfs-fuse-0:3.8.4-18.el6.x86_64",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-libs-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64"
},
"product_reference": "glusterfs-libs-0:3.8.4-18.el6.x86_64",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glusterfs-rdma-0:3.8.4-18.el6.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64"
},
"product_reference": "glusterfs-rdma-0:3.8.4-18.el6.x86_64",
"relates_to_product_reference": "6Server-RHSClient"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gluster-0:3.8.4-18.el6.noarch as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 6",
"product_id": "6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch"
},
"product_reference": "python-gluster-0:3.8.4-18.el6.noarch",
"relates_to_product_reference": "6Server-RHSClient"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Florian Weimer"
],
"organization": "Red Hat Product Security",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2015-1795",
"cwe": {
"id": "CWE-377",
"name": "Insecure Temporary File"
},
"discovery_date": "2015-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1200927"
}
],
"notes": [
{
"category": "description",
"text": "It was found that glusterfs-server RPM package would write file with predictable name into world readable /tmp directory. A local attacker could potentially use this flaw to escalate their privileges to root by modifying the shell script during the installation of the glusterfs-server package.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of glusterfs as shipped\nwith Red Hat Enterprise Linux 6, and 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src",
"6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch",
"6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch",
"6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src",
"6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src",
"6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-1795"
},
{
"category": "external",
"summary": "RHBZ#1200927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795"
}
],
"release_date": "2015-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-03-23T05:06:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src",
"6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch",
"6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch",
"6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src",
"6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src",
"6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0484"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.src",
"6Server-RH-Gluster-3.2-Server:glusterfs-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-api-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-api-devel-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-cli-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-client-xlators-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-debuginfo-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-devel-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-events-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-fuse-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-ganesha-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-geo-replication-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-libs-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-rdma-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:glusterfs-server-0:3.8.4-18.el6rhs.x86_64",
"6Server-RH-Gluster-3.2-Server:python-gluster-0:3.8.4-18.el6rhs.noarch",
"6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.noarch",
"6Server-RH-Gluster-3.2-Server:redhat-storage-server-0:3.2.0.3-1.el6rhs.src",
"6Server-RHSClient:glusterfs-0:3.8.4-18.el6.src",
"6Server-RHSClient:glusterfs-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-api-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-api-devel-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-cli-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-client-xlators-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-debuginfo-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-devel-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-fuse-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-libs-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:glusterfs-rdma-0:3.8.4-18.el6.x86_64",
"6Server-RHSClient:python-gluster-0:3.8.4-18.el6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glusterfs: glusterfs-server %pretrans rpm script temporary file issue"
}
]
}
CNVD-2017-14103
Vulnerability from cnvd - Published: 2017-07-13
VLAI Severity ?
Title
Red Hat Gluster Storage RPM Package本地权限提升漏洞
Description
Red Hat Gluster Storage RPM Package是美国红帽(Red Hat)公司开发的一个用于软件的横向扩展存储软件包,它能够提供非结构化的数据存储方式。
Red Hat Gluster Storage RPM Package 3.2版本中存在安全漏洞。本地攻击者可利用该漏洞获取权限,并以root权限执行代码。
Severity
高
Patch Name
Red Hat Gluster Storage RPM Package本地权限提升漏洞的补丁
Patch Description
Red Hat Gluster Storage RPM Package是美国红帽(Red Hat)公司开发的一个用于软件的横向扩展存储软件包,它能够提供非结构化的数据存储方式。
Red Hat Gluster Storage RPM Package 3.2版本中存在安全漏洞。本地攻击者可利用该漏洞获取权限,并以root权限执行代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: http://rhn.redhat.com/errata/RHSA-2017-0484.html
Reference
http://rhn.redhat.com/errata/RHSA-2017-0484.html
Impacted products
| Name | Red Hat Gluster Storage 3.1 |
|---|
{
"bids": {
"bid": {
"bidNumber": "99311"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2015-1795",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1795"
}
},
"description": "Red Hat Gluster Storage RPM Package\u662f\u7f8e\u56fd\u7ea2\u5e3d\uff08Red Hat\uff09\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u4e2a\u7528\u4e8e\u8f6f\u4ef6\u7684\u6a2a\u5411\u6269\u5c55\u5b58\u50a8\u8f6f\u4ef6\u5305\uff0c\u5b83\u80fd\u591f\u63d0\u4f9b\u975e\u7ed3\u6784\u5316\u7684\u6570\u636e\u5b58\u50a8\u65b9\u5f0f\u3002\r\n\r\nRed Hat Gluster Storage RPM Package 3.2\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u6743\u9650\uff0c\u5e76\u4ee5root\u6743\u9650\u6267\u884c\u4ee3\u7801\u3002",
"discovererName": "Florian Weimer",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://rhn.redhat.com/errata/RHSA-2017-0484.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-14103",
"openTime": "2017-07-13",
"patchDescription": "Red Hat Gluster Storage RPM Package\u662f\u7f8e\u56fd\u7ea2\u5e3d\uff08Red Hat\uff09\u516c\u53f8\u5f00\u53d1\u7684\u4e00\u4e2a\u7528\u4e8e\u8f6f\u4ef6\u7684\u6a2a\u5411\u6269\u5c55\u5b58\u50a8\u8f6f\u4ef6\u5305\uff0c\u5b83\u80fd\u591f\u63d0\u4f9b\u975e\u7ed3\u6784\u5316\u7684\u6570\u636e\u5b58\u50a8\u65b9\u5f0f\u3002\r\n\r\nRed Hat Gluster Storage RPM Package 3.2\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u6743\u9650\uff0c\u5e76\u4ee5root\u6743\u9650\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Red Hat Gluster Storage RPM Package\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Red Hat Gluster Storage 3.1"
},
"referenceLink": "http://rhn.redhat.com/errata/RHSA-2017-0484.html",
"serverity": "\u9ad8",
"submitTime": "2017-07-03",
"title": "Red Hat Gluster Storage RPM Package\u672c\u5730\u6743\u9650\u63d0\u5347\u6f0f\u6d1e"
}
GSD-2015-1795
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2015-1795",
"description": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.",
"id": "GSD-2015-1795",
"references": [
"https://access.redhat.com/errata/RHSA-2017:0486",
"https://access.redhat.com/errata/RHSA-2017:0484"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2015-1795"
],
"details": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.",
"id": "GSD-2015-1795",
"modified": "2023-12-13T01:20:05.092699Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-1795",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://rhn.redhat.com/errata/RHSA-2017-0484.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2017-0486.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html"
},
{
"name": "http://www.securityfocus.com/bid/99311",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/99311"
},
{
"name": "http://www.securitytracker.com/id/1038128",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id/1038128"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:gluster_storage:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2015-1795"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
},
{
"name": "1038128",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038128"
},
{
"name": "RHSA-2017:0486",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html"
},
{
"name": "RHSA-2017:0484",
"refsource": "REDHAT",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html"
},
{
"name": "99311",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99311"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-02-13T00:47Z",
"publishedDate": "2017-06-27T20:29Z"
}
}
}
FKIE_CVE-2015-1795
Vulnerability from fkie_nvd - Published: 2017-06-27 20:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | gluster_storage | 3.2 | |
| redhat | enterprise_linux | 6.0 | |
| redhat | enterprise_linux | 7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:gluster_storage:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "518056FB-E049-45AF-876A-C1682118E29D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root."
},
{
"lang": "es",
"value": "Red Hat Gluster Storage Paquete RPM 3.2 permite a los usuarios locales obtener privilegios y ejecutar c\u00f3digo arbitrario como root."
}
],
"id": "CVE-2015-1795",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-06-27T20:29:00.433",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99311"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038128"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99311"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038128"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-VQ9Q-MJVR-QPFX
Vulnerability from github – Published: 2022-05-14 01:08 – Updated: 2022-05-14 01:08
VLAI?
Details
Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.
Severity ?
7.8 (High)
{
"affected": [],
"aliases": [
"CVE-2015-1795"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-06-27T20:29:00Z",
"severity": "HIGH"
},
"details": "Red Hat Gluster Storage RPM Package 3.2 allows local users to gain privileges and execute arbitrary code as root.",
"id": "GHSA-vq9q-mjvr-qpfx",
"modified": "2022-05-14T01:08:48Z",
"published": "2022-05-14T01:08:48Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1795"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:0484"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:0486"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2015-1795"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200927"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0484.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2017-0486.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/99311"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1038128"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…