Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:1846 - Security Advisory
Issued:
2015-10-05
Updated:
2015-10-05

RHSA-2015:1846 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat Gluster Storage 3.1 update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat Gluster Storage 3.1 Update 1, which fixes one security issue,
several bugs, and adds various enhancements, is now available for Red Hat
Enterprise Linux 7.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

Description

Red Hat Gluster Storage is a software only scale-out storage solution that
provides flexible and affordable unstructured data storage. It unifies data
storage and infrastructure, increases performance, and improves
availability and manageability to meet enterprise-level storage challenges.

Red Hat Gluster Storage's Unified File and Object Storage is built on
OpenStack's Object Storage (swift).

A flaw was found in the metadata constraints in Red Hat Gluster Storage's
OpenStack Object Storage (swiftonfile). By adding metadata in several
separate calls, a malicious user could bypass the max_meta_count
constraint, and store more metadata than allowed by the configuration.
(CVE-2014-8177)

This update also fixes numerous bugs and adds various enhancements. Space
precludes documenting all of these changes in this advisory. Users are
directed to the Red Hat Gluster Storage 3.1 Technical Notes, linked to in
the References section, for information on the most significant of these
changes.

This advisory introduces the following new features:

  • Gdeploy is a tool which automates the process of creating, formatting,

and mounting bricks. When setting up a fresh cluster, gdeploy could be the
preferred choice of cluster set up, as manually executing numerous commands
can be error prone. The advantages of using gdeploy includes automated
brick creation, flexibility in choosing the drives to configure (sd, vd,
etc.), and flexibility in naming the logical volumes (LV) and volume groups
(VG). (BZ#1248899)

  • The gstatus command is now fully supported. The gstatus command provides

an easy-to-use, high-level view of the health of a trusted storage pool
with a single command. It gathers information about the health of a Red Hat
Gluster Storage trusted storage pool for distributed, replicated,
distributed-replicated, dispersed, and distributed-dispersed volumes.
(BZ#1250453)

  • You can now recover a bad file detected by BitRot from a replicated

volume. The information about the bad file will be logged in the scrubber
log file located at /var/log/glusterfs/scrub.log. (BZ#1238171)

  • Two tailored tuned profiles are introduced to improve the performance for

specific Red Hat Gluster Storage workloads. They are: rhgs-sequential-io,
which improves performance of large files with sequential I/O workloads,
and rhgs-random-io, which improves performance of small files with random
I/O workloads (BZ# 1251360)

All users of Red Hat Gluster Storage are advised to apply this update.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Gluster Storage Server for On-premise 3 for RHEL 7 x86_64
  • Red Hat Gluster Storage Nagios Server 3 for RHEL 7 x86_64

Fixes

  • BZ - 1242749 - On killing the ganesha process, systemd restarts nfs-ganesha process by itself on rhel7.1
  • BZ - 1257525 - CVE-2014-8177 gluster-swift metadata constraints are not correctly enforced
  • BZ - 1259221 - Add node of nfs-ganesha not working on rhel7.1

CVEs

  • CVE-2014-8177
  • CVE-2015-1856

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 7

SRPM
glusterfs-3.7.1-16.el7.src.rpm SHA-256: 53fb99187f0719e57c89f3d830c32e06481d5ff04f886756486fc43ead5a5795
x86_64
glusterfs-3.7.1-16.el7.x86_64.rpm SHA-256: c4f49424cbb528528b478f9d1d544e7494d4785b9ed92925905522ba3fb4c7e0
glusterfs-api-3.7.1-16.el7.x86_64.rpm SHA-256: 750c17af306be57e693c59dc297bddc5f724a31183b4fec4abba6aaf247aa4d3
glusterfs-api-devel-3.7.1-16.el7.x86_64.rpm SHA-256: 6db73a1fe17c91e0cea1df4852cba0915a9bf4bb8eca827aa96af65e9e4465b1
glusterfs-cli-3.7.1-16.el7.x86_64.rpm SHA-256: 8443d290295683470f1e2d6e3e79f96ee635dcd8818e3b9ac02cf5eee4a6dbf5
glusterfs-client-xlators-3.7.1-16.el7.x86_64.rpm SHA-256: 7b9f9c6bc0b98a3f74ec8076543eb9eb76f51c6fe4a651b2859e0ff6f0909023
glusterfs-debuginfo-3.7.1-16.el7.x86_64.rpm SHA-256: ed77d5a6455691f948a19e3a2a4284dae24a48a6a7e2719b933dde8f9a195a23
glusterfs-devel-3.7.1-16.el7.x86_64.rpm SHA-256: 5b7a7db9ffded5e1b180fb44480da0cc176e088479ca627d8062703bb9155c2f
glusterfs-fuse-3.7.1-16.el7.x86_64.rpm SHA-256: 352abf9aaffc6dd2d0f7b9db81ab912e7b0623dd5fdb09a160ca82396074fae9
glusterfs-libs-3.7.1-16.el7.x86_64.rpm SHA-256: 4bac858962052efc8244aa6e111cb3adf98a5b2aa9d187ff345dbcb9198c803e
glusterfs-rdma-3.7.1-16.el7.x86_64.rpm SHA-256: b92e33b810ab26a2bd463864c20fc03d9d6d487c7ec32f795fb746523433ccc1
python-gluster-3.7.1-16.el7.x86_64.rpm SHA-256: 0cd513e16f6f2544959811a5f2dea78d92308d04496e7ed6b80fd252a54a2734

Red Hat Gluster Storage Server for On-premise 3 for RHEL 7

SRPM
gdeploy-1.0-12.el7rhgs.src.rpm SHA-256: 671d72c68cc294d4dcf603700a741b300aefd8f967ea11f6d7ba3076f35078a5
gluster-nagios-addons-0.2.5-1.el7rhgs.src.rpm SHA-256: 2dfc0c939f4aad64493cfc5dcdb9a60db250de591b39667e839bf44073c473b3
gluster-nagios-common-0.2.2-1.el7rhgs.src.rpm SHA-256: bffacfa137e629932613a90d80166224d02f8d7c03f39282f198a4e1715e5252
glusterfs-3.7.1-16.el7rhgs.src.rpm SHA-256: efea882fa8e514107c405db02ec8c2d310587051bdb90d35b62892e7d40e4c4f
gstatus-0.65-1.el7rhgs.src.rpm SHA-256: 0fc39e5b1c23fa5beb53abbd2f230e7f9a2b9d21664886e598b2be0c1d62abe4
nfs-ganesha-2.2.0-9.el7rhgs.src.rpm SHA-256: e6fe3ba0e9be78037eaf9bcd62dd3b2bb901a0fbc9efba4cecd6b7c8aeabfab3
openstack-swift-1.13.1-6.el7ost.src.rpm SHA-256: f8d5ca2f506a93d68ced4b5739dbc83ba5342b25787816a2ab731577ca5a78d9
redhat-storage-server-3.1.1.0-2.el7rhgs.src.rpm SHA-256: f1e031da3db46bec34ae26cbec212b5c4e8573dd0f2b954fbde806e8704daad5
swiftonfile-1.13.1-5.el7rhgs.src.rpm SHA-256: e308a3604ac33ac60f6361e78456a85cafff1e7cb5ac8a4215383a8133c07162
vdsm-4.16.20-1.3.el7rhgs.src.rpm SHA-256: 017948ae092cc9689d667be024ba5100ce69c17f5d0988341ab6f80b3ec91ac8
x86_64
gdeploy-1.0-12.el7rhgs.noarch.rpm SHA-256: afe415ee4e449344eb79aafb6c8d67b38330c0de11ead4107f51b531419c9b6a
gluster-nagios-addons-0.2.5-1.el7rhgs.x86_64.rpm SHA-256: 0f49635a806f2add593789329f6ecc9c347ebf6851126aef557518044c390952
gluster-nagios-addons-debuginfo-0.2.5-1.el7rhgs.x86_64.rpm SHA-256: d0c29614ef7a2f6fdfe3532a95b693e24ea7ffc0b0eae4bceb861aa4b536bc80
gluster-nagios-common-0.2.2-1.el7rhgs.noarch.rpm SHA-256: f10172770f714f05fe0f3e0f554b5b23b92a635722838f3c23d0baa7495e5f75
glusterfs-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: c208838a85c7bd46ef9025f935cfb076aa6adcc8844101092e79ba615ac444d4
glusterfs-api-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: 280abcf0c0f871aebf3cf96621fe78e77b14cc6876cb7e65c9de16fc02ac93cc
glusterfs-api-devel-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: 8341af3a3f1e992a896d4b5333900ad0c100db0e0b69693c08300c2e95521b64
glusterfs-cli-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: e8f9e33ca0961b1171f2098854f90b05becc57cd231533ec0ba5e42eacfbf7df
glusterfs-client-xlators-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: 63d0bde00639a77544052920c48fef0404147d47ab779fc11cb6f9726bda6c7e
glusterfs-debuginfo-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: dfd095efe2657432074659878b2974cfa2beb0e4182ccb8dc32db80e4437ea27
glusterfs-devel-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: 4543212bf5dc22f727d4ee0427b669b8f7b9c59931cbd6b17e8e85d716cd98d8
glusterfs-fuse-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: c9999985b0a509e51a3d88c01ccb5006962cc834c4ee67c388743409b937fa48
glusterfs-ganesha-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: ab1742ef054f7bbce58b9f3a0bcebd1850c55d545a18dcf8d0f36236c377b867
glusterfs-geo-replication-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: 243642010f7dcd8133c08ce4586abc1bbd9838622239bc4117526fba1ab718a9
glusterfs-libs-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: 262a8592949bd15b5d4437f1fcacde4d708b45c093307e85d9fee08cbc3d272a
glusterfs-rdma-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: e16144676d95869dc2cf5026d5bc9b8d2cd1a3fbcf38f0c6aa75d40398b46fbf
glusterfs-server-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: 05ca6e6d2cee4296db89f63f82f11389cf35e67a2fe1a6cbdb2d35a6896fb8a7
gstatus-0.65-1.el7rhgs.x86_64.rpm SHA-256: 4f9528f23f5706e918de613759535fb43f7f34eea227e8d376fb33843acc665c
gstatus-debuginfo-0.65-1.el7rhgs.x86_64.rpm SHA-256: f883e93bc858cd531db9706a8a6b191e5589038485343b67095b81181a057728
nfs-ganesha-2.2.0-9.el7rhgs.x86_64.rpm SHA-256: 2c6f2d31e6577700ace97a1784b770f391ffcf82c993d3f3dc98e45f19f2ac51
nfs-ganesha-debuginfo-2.2.0-9.el7rhgs.x86_64.rpm SHA-256: 486d4683b525741d7ad86f5994454b267739bdeeb8829ff5649e606f94ba44f0
nfs-ganesha-gluster-2.2.0-9.el7rhgs.x86_64.rpm SHA-256: b492f0f8100095372057301acc4e5becb2977956d4d9c907b424ec84b8cb6185
openstack-swift-1.13.1-6.el7ost.noarch.rpm SHA-256: 0b27468ed88211a3f52e034f010b3d33256f42e72c05f75abce507ef0b67095c
openstack-swift-account-1.13.1-6.el7ost.noarch.rpm SHA-256: 13180e8361b79b916daaf5bbf4da78a11cb1430f7138706170701b0eccbaeeb7
openstack-swift-container-1.13.1-6.el7ost.noarch.rpm SHA-256: 21aed4a4632889651f2dca0b6a023fc1dddd957de9098d71db0599b87f55680a
openstack-swift-doc-1.13.1-6.el7ost.noarch.rpm SHA-256: 20a51329120f8b277bd2b57bc6115bf725f2db82791051e5aea636bb964b8c11
openstack-swift-object-1.13.1-6.el7ost.noarch.rpm SHA-256: f1d9fb3a7cccc6acd5ea9ac884ce8de8226a0824e7ff396c4dcb0da911638d5b
openstack-swift-proxy-1.13.1-6.el7ost.noarch.rpm SHA-256: 3d5d89696f4fdcff392704f1cffebe001de65e2892a4ec42d72c9c48226a472c
python-gluster-3.7.1-16.el7rhgs.x86_64.rpm SHA-256: 86f7e5f613c6321b0e7259f26ea586adc32cb17f2443d4693d2f6ede07c946ee
redhat-storage-server-3.1.1.0-2.el7rhgs.noarch.rpm SHA-256: 20560b4e5ecb0198b8740d36ab7d51a68984cc915312234b10585551aea58255
swiftonfile-1.13.1-5.el7rhgs.noarch.rpm SHA-256: fffab91aa18122483ae91535f79eb31180c180c5993d08129ed1ae8695fdca8d
vdsm-4.16.20-1.3.el7rhgs.x86_64.rpm SHA-256: 96f469b2bf9b6a5367dec630cd04aa1f6a73f0d469b7f1b862c7188febd33e79
vdsm-cli-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: feb01765acec03f444124190ee45583fb0696da94949fee12456f479206fe56a
vdsm-debug-plugin-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: 9fc97d66f8a47127d6439cf788ca54cb31fc7de09b2e4752c5c2e18762b763b0
vdsm-debuginfo-4.16.20-1.3.el7rhgs.x86_64.rpm SHA-256: 4383befa381a0a54ef351e1ca88124e10edd04b5346459c42fd66a8c5d6ae662
vdsm-gluster-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: 15244260fb42a16025dd375f3006f0e818318b3824283ac8750bb6371a340bf6
vdsm-hook-ethtool-options-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: 3b2e494e7faa7f5e654ee11a3eef8f3a91352120fc81d9d651c8e7df7aed463d
vdsm-hook-faqemu-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: 3e5bc31e02fad2c8e58f824af9f852cffa62922176e67bf1846bf06c09deab4f
vdsm-hook-openstacknet-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: 3dc4acdfd3281d33574dbed9c8ad87609c8c15243eccafffcaa5134b9b994888
vdsm-hook-qemucmdline-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: 2ff22482ab9912293eaf8f46d19c81509bc02a87c2d6515204a7818cf7dfa73c
vdsm-jsonrpc-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: 74b04def35588c021a9b4214e1f676b7b7f65b24592c43dcba90c421f0275a75
vdsm-python-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: 66cb15b8688506266bd0953b1b1130bf4f9dda9f5d0e31741439d2fc08995aa3
vdsm-python-zombiereaper-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: bfd46e5a19cf1fcf3ba2be0beeb953a693d064de41c2f3694bb5453a3c9ebc35
vdsm-reg-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: e23ffc1800049b77db3c5b8bb97fccdde24a01f6b5776b4a9f2bb72e4df97433
vdsm-tests-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: f11ea582502cc8ebea681aa87b0c61d137a0173f175fe88040224e1d4f147494
vdsm-xmlrpc-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: f409b103eed9c38fa4e7ffde6f488c0d9dae7683be19c225ff747270cbe078c0
vdsm-yajsonrpc-4.16.20-1.3.el7rhgs.noarch.rpm SHA-256: 8e4fcb9d51b759a2f7a75ba72eabbd7b97c7bb8d84ed5ac7b10ae13d21e0438e

Red Hat Gluster Storage Nagios Server 3 for RHEL 7

SRPM
x86_64
gluster-nagios-common-0.2.2-1.el7rhgs.noarch.rpm SHA-256: f10172770f714f05fe0f3e0f554b5b23b92a635722838f3c23d0baa7495e5f75
nagios-server-addons-0.2.2-1.el7rhgs.x86_64.rpm SHA-256: 2f65abcbcfa08921af4b81affbf0966ad6774832f8a9702cc4e9c39d55968e46

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility