Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:1205 - Security Advisory
Issued:
2013-09-04
Updated:
2013-09-04

RHSA-2013:1205 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: Red Hat Storage 2.0 security, bug fix, and enhancement update #6

Type/Severity

Security Advisory: Low

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated Red Hat Storage 2.0 packages that fix multiple security issues,
various bugs, and add one enhancement are now available.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

Red Hat Storage is a software only, scale-out storage solution that
provides flexible and agile unstructured data storage for the enterprise.

Multiple insecure temporary file creation flaws were found in Red Hat
Storage server. A local user on the Red Hat Storage server could use these
flaws to cause arbitrary files to be overwritten as the root user via a
symbolic link attack. (CVE-2013-4157)

These issues were discovered by Gowrishankar Rajaiyan of Red Hat and Kurt
Seifried of the Red Hat Security Response Team.

This update also fixes the following bugs:

  • Previously, rolling upgrades on a volume caused some processes to abort

which led to a possible corruption of the volume. Yum update aborts with a
message to stop the volume during an update. Now, with this update rolling
upgrades is not supported and it is mandatory to stop the volume before any
'yum update'. (BZ#998649)

  • Installing or upgrading the gluster-swift-plugin RPM overwrites

/etc/swift configuration files. Hence, the customer configuration is
overwritten, causing data unavailability. Now, the RPM installs or upgrades
new configuration files with a non-conflicting extension and customer
configuration files are not overwritten, maintaining data availability.
(BZ#997940, BZ#1000423)

This update also adds the following enhancement:

  • A new upgrade script has been added. When Red Hat Storage Server 2.1 is

released, this script will help users upgrade and resubscribe their
Red Hat Storage Server 2.0 Update 6 systems to Red Hat Storage Server 2.1.
(BZ#1002872)

All users of Red Hat Storage are advised to upgrade to these updated
packages.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Gluster Storage Server for On-premise 2.0 x86_64
  • Red Hat Storage for Public Cloud (via RHUI) 2.0 x86_64

Fixes

  • BZ - 986516 - CVE-2013-4157 Red Hat Storage Server 2.0: appliance-base / redhat-storage-server /tmp file creation vuln
  • BZ - 997940 - Inclusion of gluster-swift gluster-swift-plugin-1.0-6 package needed
  • BZ - 1000423 - Upgrade from RHS2.0-U5 to U6 results in broken gluster-swift services, it gives 503 for every request

CVEs

  • CVE-2013-4157

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Gluster Storage Server for On-premise 2.0

SRPM
appliance-2.0.6.0-2.el6rhs.src.rpm SHA-256: de11d3813c2ef8dedafe9a492b590fc09b574771dc8c73ce2e747b16d64cb115
gluster-swift-plugin-1.0-7.src.rpm SHA-256: 3df58a6fdeace2a1d30d38bd3a6a3ad384bb5ff1bd5b8e3adbe1ae6d33ce074c
glusterfs-3.3.0.14rhs-1.el6rhs.src.rpm SHA-256: 7afdddb0e5433a2ffe5eba1ce5357468f996323e2669bcaf9d735666602b41fc
x86_64
appliance-base-2.0.6.0-2.el6rhs.noarch.rpm SHA-256: a32ac258b6f47ca27dbb0f4d91a804e2cd5c35004944bff3200748acb9565d77
gluster-swift-plugin-1.0-7.noarch.rpm SHA-256: 625e2f5ea373fd5ec000c2599f92fbc742eae602ff94f02cadfb778fced6ef07
glusterfs-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: 76bb30e0ac212bb47453786dfa496231757f68dbf45b12794d8fe2f337321ae5
glusterfs-debuginfo-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: 70389444ae9cfb7c0bd95df0b6a62d4f84222ed6dd59aed350c4df35fb058d56
glusterfs-devel-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: 86d31bf4cc4e8bb50cbc62b0f4568efbd6a342b56bfd19246755ea1770d6860d
glusterfs-fuse-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: 0b9b0999405fe86fcbda431061f6288b65311207a4c805ccd7f48b3c5daf4f80
glusterfs-geo-replication-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: 69aecd357348f7a7aff4087d305942f229b01eb23964198b0742180020df3e2d
glusterfs-rdma-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: bdb413c63c0721bc2db8a05a09e470869e4100e516bde2dabf01f6136b045a80
glusterfs-server-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: aa6f204a410410aef6e2380f04e9228d1c1af8a4be1923518af31a60ac8610db

Red Hat Storage for Public Cloud (via RHUI) 2.0

SRPM
appliance-2.0.6.0-2.el6rhs.src.rpm SHA-256: de11d3813c2ef8dedafe9a492b590fc09b574771dc8c73ce2e747b16d64cb115
gluster-swift-plugin-1.0-7.src.rpm SHA-256: 3df58a6fdeace2a1d30d38bd3a6a3ad384bb5ff1bd5b8e3adbe1ae6d33ce074c
glusterfs-3.3.0.14rhs-1.el6rhs.src.rpm SHA-256: 7afdddb0e5433a2ffe5eba1ce5357468f996323e2669bcaf9d735666602b41fc
x86_64
appliance-base-2.0.6.0-2.el6rhs.noarch.rpm SHA-256: a32ac258b6f47ca27dbb0f4d91a804e2cd5c35004944bff3200748acb9565d77
gluster-swift-plugin-1.0-7.noarch.rpm SHA-256: 625e2f5ea373fd5ec000c2599f92fbc742eae602ff94f02cadfb778fced6ef07
glusterfs-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: 76bb30e0ac212bb47453786dfa496231757f68dbf45b12794d8fe2f337321ae5
glusterfs-debuginfo-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: 70389444ae9cfb7c0bd95df0b6a62d4f84222ed6dd59aed350c4df35fb058d56
glusterfs-devel-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: 86d31bf4cc4e8bb50cbc62b0f4568efbd6a342b56bfd19246755ea1770d6860d
glusterfs-fuse-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: 0b9b0999405fe86fcbda431061f6288b65311207a4c805ccd7f48b3c5daf4f80
glusterfs-geo-replication-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: 69aecd357348f7a7aff4087d305942f229b01eb23964198b0742180020df3e2d
glusterfs-rdma-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: bdb413c63c0721bc2db8a05a09e470869e4100e516bde2dabf01f6136b045a80
glusterfs-server-3.3.0.14rhs-1.el6rhs.x86_64.rpm SHA-256: aa6f204a410410aef6e2380f04e9228d1c1af8a4be1923518af31a60ac8610db

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility