Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2014:1263 - Security Advisory
Issued:
2014-09-18
Updated:
2014-09-18

RHSA-2014:1263 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: Red Hat Storage 2.1 security, bug fix, and enhancement update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated glusterfs, geo-replication, and native client packages that fix one
security issue, several bugs, and adds an enhancement are now available Red
Hat Storage 2.1.

Red Hat Product Security has rated this update as having Low security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

Red Hat Storage is software-only, scale-out storage that provides flexible
and affordable unstructured data storage for an enterprise. GlusterFS, a
key building block of Red Hat Storage, is based on a stackable user-space
design and can deliver exceptional performance for diverse workloads.
GlusterFS aggregates various storage servers over network interconnections
into one large, parallel network file system.

A denial of service flaw was found in the way Python's SSL module
implementation performed matching of certain certificate names. A remote
attacker able to obtain a valid certificate that contained multiple
wildcard characters could use this flaw to issue a request to validate such
a certificate, resulting in excessive consumption of CPU. (CVE-2013-2099)

This issue was discovered by Florian Weimer of Red Hat Product Security.

This update also fixes several bugs and adds an enhancement. Space
precludes documenting all of these changes in this advisory. Users are
directed to the Red Hat Storage 2.1 Technical Notes, linked to in the
References section, for information on the most significant of these
changes.

With this update, a migration script 'migrate-rhs-classic-to-rhsm', that
applies to both Red Hat Storage Server and Red Hat Storage Console is
provided, that enables you to have the system prepared for upgrade from the
latest release of RHS 2.x to RHS 3.0. From the Red Hat Storage 3.0 release
onwards, there will be a significant change made in the subscription and
delivery mechanism from the previous Red Hat Network Classic to the new Red
Hat Subscription Manager, and this script assists in the smooth migration.

Users of Red Hat Storage are advised to upgrade to these updated packages,
which correct these issues and add these enhancements.

Note: After upgrading, it is recommend that you refer to the Knowledge Base
articles linked to in the References section which outlines an issue with
rebalance and file creation error that has been identified by Red Hat.
This issue will be fixed by a subsequent update.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Gluster Storage Server for On-premise 2.1 x86_64
  • Red Hat Storage for Public Cloud (via RHUI) 2.1 x86_64
  • Red Hat Gluster Storage Management Console (for RHEL Server) 2.1 x86_64

Fixes

  • BZ - 963260 - CVE-2013-2099 python: ssl.match_hostname() DoS via certificates with specially crafted hostname wildcard patterns
  • BZ - 1062197 - dist-geo-rep : glusterfs rolling upgrade (2.1 to 2.1.2) while geo-rep is running results in failure to update stime on bricks.
  • BZ - 1126354 - dist-geo-rep: Python backtrace seen in geo-rep logs "ValueError: signal only works in main thread"
  • BZ - 1135082 - "redhat-access-plugin-rhsc" package is NOT getting updated as part of "rhsc-setup" while upgrading to RHSC 3.0 from 2.1 U4

CVEs

  • CVE-2013-2099

References

  • https://access.redhat.com/security/updates/classification/#low
  • https://access.redhat.com/site/documentation/en-US/Red_Hat_Storage/2.1/html/Technical_Notes/index.html
  • https://access.redhat.com/solutions/1199193
  • https://access.redhat.com/solutions/1189413
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
glusterfs-3.4.0.68rhs-1.el6.src.rpm SHA-256: 77a0ec5b1c484df997ccb1e72a7b5b93cdcf774184818bc21c4d6f62efa316fd
x86_64
glusterfs-3.4.0.68rhs-1.el6.x86_64.rpm SHA-256: 66d10e4d1d06bf6f6182a431e6cbaf76d41ffb6a0c3b465f6a5d6232911ecacb
glusterfs-api-3.4.0.68rhs-1.el6.x86_64.rpm SHA-256: c61a47895ea20d050c93bd094c32c8814c7e85e98598b9caacfd2752f918b60b
glusterfs-api-devel-3.4.0.68rhs-1.el6.x86_64.rpm SHA-256: 48685195b0d1082cd495f90e79bdd9a564c6045e40e21e82119becbed1afb9c8
glusterfs-debuginfo-3.4.0.68rhs-1.el6.x86_64.rpm SHA-256: fb78b1c54e63a65a533ef3ac3004b5cf19794b4dcbf69c74064bead354cbb41a
glusterfs-devel-3.4.0.68rhs-1.el6.x86_64.rpm SHA-256: 9bd957e1a581ac0b45175ca7d230c7a1f050589f3ef2e56d4a5cac6dfd02c19a
glusterfs-fuse-3.4.0.68rhs-1.el6.x86_64.rpm SHA-256: 4d02356e14f2c26c4b457dcb8e9e9e569ddd3e5fe525424774c75eec7be4cfe6
glusterfs-libs-3.4.0.68rhs-1.el6.x86_64.rpm SHA-256: d9cc7fbb8e0a002b30b318bb523f97b56fd925203461cee3a5d4f9ec8190ca29
glusterfs-rdma-3.4.0.68rhs-1.el6.x86_64.rpm SHA-256: ab4452db9536be418fef5be9a0bf0a8c5c8c051106331d8ab6834be25cf7e8ed

Red Hat Enterprise Linux Server 5

SRPM
glusterfs-3.4.0.68rhs-1.el5.src.rpm SHA-256: 1dc37ada62d92c7b77f29c83b34ea3f3d878d45db70b291d69839ff4961878eb
x86_64
glusterfs-3.4.0.68rhs-1.el5.x86_64.rpm SHA-256: ea7a9e446394ba0a0f0dfada37b4d457f09c8c70c12a78bdae8c00cc35b544ae
glusterfs-api-3.4.0.68rhs-1.el5.x86_64.rpm SHA-256: 7f732e06ce625c6db8f22207a7b463478ad8e7a97e86dfa7b11e08e4b7b8fa8c
glusterfs-api-devel-3.4.0.68rhs-1.el5.x86_64.rpm SHA-256: 91a44a1253fd61f7a43608c0cfc5d3b95c97c6d95607f60516ccc14563f2ff9d
glusterfs-debuginfo-3.4.0.68rhs-1.el5.x86_64.rpm SHA-256: 7ce4abff69dd4d3e5bcdd883cf8223c1190ab9553bb72da9216af985d01a7162
glusterfs-devel-3.4.0.68rhs-1.el5.x86_64.rpm SHA-256: 52cb49641378c0c0380771509a0143a2023319be3618a0e32651dc4c82ebc609
glusterfs-fuse-3.4.0.68rhs-1.el5.x86_64.rpm SHA-256: d3e8fc7b7e160d3f412f0b9db232e0cc90d7fbc86c077ea9bae5a23012a0dc49
glusterfs-libs-3.4.0.68rhs-1.el5.x86_64.rpm SHA-256: 57612c1c9a1a853930b2bb8cfad61bedfd57feee4df0f6c955c90ae83beb1332
glusterfs-rdma-3.4.0.68rhs-1.el5.x86_64.rpm SHA-256: 781583306e4531f1b1878b5529319e642fa40b4eaaf5e3e368b5badd895c6998

Red Hat Gluster Storage Server for On-premise 2.1

SRPM
glusterfs-3.4.0.68rhs-1.el6rhs.src.rpm SHA-256: b3cf2bbf45e098a6b659e99e1629a7d3da24550e782f1b86baf413811e8987c5
python-backports-1.0-3.el6.src.rpm SHA-256: a7f12ed82dc9408c54694b669991806123ac93c0a0f3792d5de2cc457db5a856
python-backports-ssl_match_hostname-3.4.0.2-1.el6.src.rpm SHA-256: da73ea873bd8c1925e2a2b85835ff7e4ecc32f5eecaf355ce10c576073223ac7
redhat-storage-server-2.1.4.2-1.el6rhs.src.rpm SHA-256: 959bf6d3c249b806c815171748d5e2ed32ae1380f58ccfba4e1ed2d08bbfc95e
x86_64
glusterfs-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 6f091590183f2a9bd243268bd8124c23604dcda3b34f96a4558a6fd0e80b8d6b
glusterfs-api-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 47dfd6a5c572917069eee9aaa74e2319d9fc75708382aa4eaa275538a18577b7
glusterfs-api-devel-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 6f88498f59675c420303b3580c9b83011cbb8e72698dd5c96c60b955b435265c
glusterfs-debuginfo-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: f79ca1e5d42708c448a81c4199b771e36dbf58c75f2a769276fac9f022bbcbf1
glusterfs-devel-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 46138c00cd42a7275c49b0ca0e679d2d1f4806d396e956cd0b6d1764bfc7affd
glusterfs-fuse-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 15c238a1c2b3ad25525d98ea117331f0b3ba9f5328e1f1c5df4e93e7eb60c7b1
glusterfs-geo-replication-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: c762fcc0fbba2e3f6056614f83a369efd0ccdffefc54c746352499be9a9aeb40
glusterfs-libs-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: bec9fee9b4f8e5e8a812fc4d268a1406e7fa0d9f6c07f4e5236866be7800ba88
glusterfs-rdma-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: a308ac5e7266ac8f87e0235d71163d5305afb223cfdee8bab9c24e9e1a70b72d
glusterfs-server-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 6491687b4f2440517583c287ff0ef28daf48674d7ed698fa3e0f18c05de2ad32
python-backports-1.0-3.el6.x86_64.rpm SHA-256: ad57585d35bca2dc14d67888ca5283ec506739789688f3431e18953fc7740db3
python-backports-ssl_match_hostname-3.4.0.2-1.el6.noarch.rpm SHA-256: 9a63d0d2ed560cb0df72537108c5b106e127f79ee9ac074fb9643b671714e4fb
redhat-storage-server-2.1.4.2-1.el6rhs.noarch.rpm SHA-256: 98c4d83dac1ee7c701e321bf442bad9940b5d87f616891902f8e907f2f4257b4

Red Hat Storage for Public Cloud (via RHUI) 2.1

SRPM
glusterfs-3.4.0.68rhs-1.el6rhs.src.rpm SHA-256: b3cf2bbf45e098a6b659e99e1629a7d3da24550e782f1b86baf413811e8987c5
python-backports-1.0-3.el6.src.rpm SHA-256: a7f12ed82dc9408c54694b669991806123ac93c0a0f3792d5de2cc457db5a856
python-backports-ssl_match_hostname-3.4.0.2-1.el6.src.rpm SHA-256: da73ea873bd8c1925e2a2b85835ff7e4ecc32f5eecaf355ce10c576073223ac7
redhat-storage-server-2.1.4.2-1.el6rhs.src.rpm SHA-256: 959bf6d3c249b806c815171748d5e2ed32ae1380f58ccfba4e1ed2d08bbfc95e
x86_64
glusterfs-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 6f091590183f2a9bd243268bd8124c23604dcda3b34f96a4558a6fd0e80b8d6b
glusterfs-api-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 47dfd6a5c572917069eee9aaa74e2319d9fc75708382aa4eaa275538a18577b7
glusterfs-api-devel-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 6f88498f59675c420303b3580c9b83011cbb8e72698dd5c96c60b955b435265c
glusterfs-debuginfo-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: f79ca1e5d42708c448a81c4199b771e36dbf58c75f2a769276fac9f022bbcbf1
glusterfs-devel-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 46138c00cd42a7275c49b0ca0e679d2d1f4806d396e956cd0b6d1764bfc7affd
glusterfs-fuse-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 15c238a1c2b3ad25525d98ea117331f0b3ba9f5328e1f1c5df4e93e7eb60c7b1
glusterfs-geo-replication-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: c762fcc0fbba2e3f6056614f83a369efd0ccdffefc54c746352499be9a9aeb40
glusterfs-libs-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: bec9fee9b4f8e5e8a812fc4d268a1406e7fa0d9f6c07f4e5236866be7800ba88
glusterfs-rdma-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: a308ac5e7266ac8f87e0235d71163d5305afb223cfdee8bab9c24e9e1a70b72d
glusterfs-server-3.4.0.68rhs-1.el6rhs.x86_64.rpm SHA-256: 6491687b4f2440517583c287ff0ef28daf48674d7ed698fa3e0f18c05de2ad32
python-backports-1.0-3.el6.x86_64.rpm SHA-256: ad57585d35bca2dc14d67888ca5283ec506739789688f3431e18953fc7740db3
python-backports-ssl_match_hostname-3.4.0.2-1.el6.noarch.rpm SHA-256: 9a63d0d2ed560cb0df72537108c5b106e127f79ee9ac074fb9643b671714e4fb
redhat-storage-server-2.1.4.2-1.el6rhs.noarch.rpm SHA-256: 98c4d83dac1ee7c701e321bf442bad9940b5d87f616891902f8e907f2f4257b4

Red Hat Gluster Storage Management Console (for RHEL Server) 2.1

SRPM
rhsc-2.1.2-0.40.el6rhs.src.rpm SHA-256: 9ffccf64dbf9ef0cbc6cdbfe2139a77055c25c3bbf02e377e9532eca9362c0ab
rhsc-branding-rhs-2.1.5-2.0.el6rhs.src.rpm SHA-256: b93ed0ff553e0f6801e7e89ef0658c3aa6a3cc47fa7c29c3a800990d01440030
x86_64
rhsc-2.1.2-0.40.el6rhs.noarch.rpm SHA-256: af5d41e36949b66b33324d92196c94637643106224bab8b36ee1c0b4d61573ae
rhsc-backend-2.1.2-0.40.el6rhs.noarch.rpm SHA-256: 6572988b57610ec7abb13be47d196c1f4c82a43eef619afcbb3497c3afd8f114
rhsc-branding-rhs-2.1.5-2.0.el6rhs.noarch.rpm SHA-256: 1541b85bd4f8c69e3315618f36dd07d1fba4e8de800ed7c2898e246eb02d90ac
rhsc-dbscripts-2.1.2-0.40.el6rhs.noarch.rpm SHA-256: a2a0b873c991ee5debceb15bb99ff62b3480e31befb5da8c16bc10d2a08267af
rhsc-lib-2.1.2-0.40.el6rhs.noarch.rpm SHA-256: 7ed8b7291daf4be90c57e569802da38f6d3b92fb32d52e23899d3603bd47e120
rhsc-restapi-2.1.2-0.40.el6rhs.noarch.rpm SHA-256: 586c9a8e88eefcf3bcd3436f9052c0a9dfb45b8358737200e7f922c516b96315
rhsc-setup-2.1.2-0.40.el6rhs.noarch.rpm SHA-256: 13775da3bcebb5d2ed8de1f302fed860387e05c12ea04d6d3cfa5535b78316f1
rhsc-tools-2.1.2-0.40.el6rhs.noarch.rpm SHA-256: 50e583e9aa83007f45b7f424972d4c8eac53f988776a8cb480494d5372b14202
rhsc-webadmin-portal-2.1.2-0.40.el6rhs.noarch.rpm SHA-256: 7f5a155d21ce590401cb9883a674c3680161b124ab936188b39b2dfd4009c624

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility