RHSA-2018_2607

Vulnerability from csaf_redhat - Published: 2018-09-04 06:24 - Updated: 2024-11-14 23:45
Summary
Red Hat Security Advisory: Red Hat Gluster Storage security, bug fix, and enhancement update
Severity
Important
Notes
Topic: Updated glusterfs packages that fix multiple security issues and bugs, and add various enhancements are now available for Red Hat Gluster Storage 3.4 on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system. Security Fix(es): * glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code (CVE-2018-10904) * glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code (CVE-2018-10907) * glusterfs: I/O to arbitrary devices on storage server (CVE-2018-10923) * glusterfs: Device files can be created in arbitrary locations (CVE-2018-10926) * glusterfs: File status information leak and denial of service (CVE-2018-10927) * glusterfs: Improper resolution of symlinks allows for privilege escalation (CVE-2018-10928) * glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code (CVE-2018-10929) * glusterfs: Files can be renamed outside volume (CVE-2018-10930) * glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911) * glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c (CVE-2018-10914) * glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c (CVE-2018-10913) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting these issues. Additional Changes: These updated glusterfs packages include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Gluster Storage 3.4 Release Notes for information on the most significant of these changes: https://access.redhat.com/site/documentation/en-US/red_hat_gluster_storage/3.4/html/3.4_release_notes/ All users of Red Hat Gluster Storage are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

It was found that glusterfs server does not properly sanitize file paths in the "trusted.io-stats-dump" extended attribute which is used by the "debug/io-stats" translator. An attacker can use this flaw to create files and execute arbitrary code. To exploit this, the attacker would require sufficient access to modify the extended attributes of files on a gluster volume.

CWE-426 - Untrusted Search Path
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607
Workaround To limit exposure of gluster server nodes : 1. gluster server should be on LAN and not reachable from public networks. 2. Use gluster auth.allow and auth.reject. 3. Use TLS certificates to authenticate gluster clients. caveat: This does not protect from attacks against authenticated gluster clients.

It was found that glusterfs server is vulnerable to mulitple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using 'alloca(3)'. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.

CWE-121 - Stack-based Buffer Overflow
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607
Workaround To limit exposure of gluster server nodes : 1. gluster server should be on LAN and not reachable from public networks. 2. Use gluster auth.allow and auth.reject. 3. Use TLS certificates to authenticate gluster clients. caveat: This does not protect from attacks by authenticated gluster clients.

A flaw was found in dict.c:dict_unserialize function of glusterfs, dic_unserialize function does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.

CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607

An information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.

CWE-209 - Generation of Error Message Containing Sensitive Information
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607
Workaround SELinux mitigates this issue on Red Hat Gluster Storage 3. SELinux should be in enforcing mode only as permissive mode does not block attacks.

It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.

CWE-476 - NULL Pointer Dereference
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607
Workaround SELinux mitigates this issue on Red Hat Gluster Storage 3. SELinux should be in enforcing mode only as permissive mode does not block attacks.

It was found that the "mknod" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.

CWE-20 - Improper Input Validation
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607
Workaround To limit exposure of gluster server nodes : 1. gluster server should be on LAN and not reachable from public networks. 2. Use gluster auth.allow and auth.reject. 3. Use TLS certificates to authenticate gluster clients. caveat: This does not protect from attacks by authenticated gluster clients.

A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.

CWE-20 - Improper Input Validation
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607
Workaround To limit exposure of gluster server nodes : 1. gluster server should be on LAN and not reachable from public networks. 2. Use gluster auth.allow and auth.reject. 3. Use TLS certificates to authenticate gluster clients. caveat: This does not protect from attacks by authenticated gluster clients.

A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.

CWE-20 - Improper Input Validation
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607
Workaround To limit exposure of gluster server nodes : 1. gluster server should be on LAN and not reachable from public networks. 2. Use gluster auth.allow and auth.reject. 3. Use TLS certificates to authenticate gluster clients. caveat: This does not protect from attacks by authenticated gluster clients.

A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.

CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607
Workaround To limit exposure of gluster server nodes : 1. gluster server should be on LAN and not reachable from public networks. 2. Use gluster auth.allow and auth.reject. 3. Use TLS certificates to authenticate gluster clients. caveat: This does not protect from attacks by authenticated gluster clients.

A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.

CWE-20 - Improper Input Validation
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607
Workaround To limit exposure of gluster server nodes : 1. gluster server should be on LAN and not reachable from public networks. 2. Use gluster auth.allow and auth.reject. 3. Use TLS certificates to authenticate gluster clients. caveat: This does not protect from attacks by authenticated gluster clients.

A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.

CWE-20 - Improper Input Validation
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2018:2607
Workaround To limit exposure of gluster server nodes : 1. gluster server should be on LAN and not reachable from public networks. 2. Use gluster auth.allow and auth.reject. 3. Use TLS certificates to authenticate gluster clients. caveat: This does not protect from attacks by authenticated gluster clients.
References
https://access.redhat.com/errata/RHSA-2018:2607 self
https://access.redhat.com/security/updates/classi… external
https://access.redhat.com/site/documentation/en-U… external
https://bugzilla.redhat.com/show_bug.cgi?id=1118770 external
https://bugzilla.redhat.com/show_bug.cgi?id=1167789 external
https://bugzilla.redhat.com/show_bug.cgi?id=1186664 external
https://bugzilla.redhat.com/show_bug.cgi?id=1215556 external
https://bugzilla.redhat.com/show_bug.cgi?id=1226874 external
https://bugzilla.redhat.com/show_bug.cgi?id=1234884 external
https://bugzilla.redhat.com/show_bug.cgi?id=1260479 external
https://bugzilla.redhat.com/show_bug.cgi?id=1262230 external
https://bugzilla.redhat.com/show_bug.cgi?id=1277924 external
https://bugzilla.redhat.com/show_bug.cgi?id=1282318 external
https://bugzilla.redhat.com/show_bug.cgi?id=1282731 external
https://bugzilla.redhat.com/show_bug.cgi?id=1283045 external
https://bugzilla.redhat.com/show_bug.cgi?id=1286092 external
https://bugzilla.redhat.com/show_bug.cgi?id=1286820 external
https://bugzilla.redhat.com/show_bug.cgi?id=1288115 external
https://bugzilla.redhat.com/show_bug.cgi?id=1293332 external
https://bugzilla.redhat.com/show_bug.cgi?id=1293349 external
https://bugzilla.redhat.com/show_bug.cgi?id=1294412 external
https://bugzilla.redhat.com/show_bug.cgi?id=1299740 external
https://bugzilla.redhat.com/show_bug.cgi?id=1301474 external
https://bugzilla.redhat.com/show_bug.cgi?id=1319271 external
https://bugzilla.redhat.com/show_bug.cgi?id=1324531 external
https://bugzilla.redhat.com/show_bug.cgi?id=1330526 external
https://bugzilla.redhat.com/show_bug.cgi?id=1333705 external
https://bugzilla.redhat.com/show_bug.cgi?id=1338693 external
https://bugzilla.redhat.com/show_bug.cgi?id=1339054 external
https://bugzilla.redhat.com/show_bug.cgi?id=1339765 external
https://bugzilla.redhat.com/show_bug.cgi?id=1341190 external
https://bugzilla.redhat.com/show_bug.cgi?id=1342785 external
https://bugzilla.redhat.com/show_bug.cgi?id=1345828 external
https://bugzilla.redhat.com/show_bug.cgi?id=1356454 external
https://bugzilla.redhat.com/show_bug.cgi?id=1360331 external
https://bugzilla.redhat.com/show_bug.cgi?id=1361209 external
https://bugzilla.redhat.com/show_bug.cgi?id=1369312 external
https://bugzilla.redhat.com/show_bug.cgi?id=1369420 external
https://bugzilla.redhat.com/show_bug.cgi?id=1375094 external
https://bugzilla.redhat.com/show_bug.cgi?id=1378371 external
https://bugzilla.redhat.com/show_bug.cgi?id=1384762 external
https://bugzilla.redhat.com/show_bug.cgi?id=1384979 external
https://bugzilla.redhat.com/show_bug.cgi?id=1384983 external
https://bugzilla.redhat.com/show_bug.cgi?id=1388218 external
https://bugzilla.redhat.com/show_bug.cgi?id=1392905 external
https://bugzilla.redhat.com/show_bug.cgi?id=1397798 external
https://bugzilla.redhat.com/show_bug.cgi?id=1401969 external
https://bugzilla.redhat.com/show_bug.cgi?id=1406363 external
https://bugzilla.redhat.com/show_bug.cgi?id=1408158 external
https://bugzilla.redhat.com/show_bug.cgi?id=1408354 external
https://bugzilla.redhat.com/show_bug.cgi?id=1409102 external
https://bugzilla.redhat.com/show_bug.cgi?id=1410719 external
https://bugzilla.redhat.com/show_bug.cgi?id=1413005 external
https://bugzilla.redhat.com/show_bug.cgi?id=1413959 external
https://bugzilla.redhat.com/show_bug.cgi?id=1414456 external
https://bugzilla.redhat.com/show_bug.cgi?id=1419438 external
https://bugzilla.redhat.com/show_bug.cgi?id=1419807 external
https://bugzilla.redhat.com/show_bug.cgi?id=1425681 external
https://bugzilla.redhat.com/show_bug.cgi?id=1426042 external
https://bugzilla.redhat.com/show_bug.cgi?id=1436673 external
https://bugzilla.redhat.com/show_bug.cgi?id=1442983 external
https://bugzilla.redhat.com/show_bug.cgi?id=1444820 external
https://bugzilla.redhat.com/show_bug.cgi?id=1446046 external
https://bugzilla.redhat.com/show_bug.cgi?id=1448334 external
https://bugzilla.redhat.com/show_bug.cgi?id=1449638 external
https://bugzilla.redhat.com/show_bug.cgi?id=1449867 external
https://bugzilla.redhat.com/show_bug.cgi?id=1452915 external
https://bugzilla.redhat.com/show_bug.cgi?id=1459101 external
https://bugzilla.redhat.com/show_bug.cgi?id=1459895 external
https://bugzilla.redhat.com/show_bug.cgi?id=1460639 external
https://bugzilla.redhat.com/show_bug.cgi?id=1460918 external
https://bugzilla.redhat.com/show_bug.cgi?id=1461695 external
https://bugzilla.redhat.com/show_bug.cgi?id=1463112 external
https://bugzilla.redhat.com/show_bug.cgi?id=1463114 external
https://bugzilla.redhat.com/show_bug.cgi?id=1463592 external
https://bugzilla.redhat.com/show_bug.cgi?id=1463964 external
https://bugzilla.redhat.com/show_bug.cgi?id=1464150 external
https://bugzilla.redhat.com/show_bug.cgi?id=1464350 external
https://bugzilla.redhat.com/show_bug.cgi?id=1466122 external
https://bugzilla.redhat.com/show_bug.cgi?id=1466129 external
https://bugzilla.redhat.com/show_bug.cgi?id=1467536 external
https://bugzilla.redhat.com/show_bug.cgi?id=1468972 external
https://bugzilla.redhat.com/show_bug.cgi?id=1470566 external
https://bugzilla.redhat.com/show_bug.cgi?id=1470599 external
https://bugzilla.redhat.com/show_bug.cgi?id=1470967 external
https://bugzilla.redhat.com/show_bug.cgi?id=1472757 external
https://bugzilla.redhat.com/show_bug.cgi?id=1474012 external
https://bugzilla.redhat.com/show_bug.cgi?id=1474745 external
https://bugzilla.redhat.com/show_bug.cgi?id=1475466 external
https://bugzilla.redhat.com/show_bug.cgi?id=1475475 external
https://bugzilla.redhat.com/show_bug.cgi?id=1475779 external
https://bugzilla.redhat.com/show_bug.cgi?id=1475789 external
https://bugzilla.redhat.com/show_bug.cgi?id=1476827 external
https://bugzilla.redhat.com/show_bug.cgi?id=1476876 external
https://bugzilla.redhat.com/show_bug.cgi?id=1477087 external
https://bugzilla.redhat.com/show_bug.cgi?id=1477250 external
https://bugzilla.redhat.com/show_bug.cgi?id=1478395 external
https://bugzilla.redhat.com/show_bug.cgi?id=1479335 external
https://bugzilla.redhat.com/show_bug.cgi?id=1480041 external
https://bugzilla.redhat.com/show_bug.cgi?id=1480042 external
https://bugzilla.redhat.com/show_bug.cgi?id=1480188 external
https://bugzilla.redhat.com/show_bug.cgi?id=1482376 external
https://bugzilla.redhat.com/show_bug.cgi?id=1482812 external
https://bugzilla.redhat.com/show_bug.cgi?id=1483541 external
https://bugzilla.redhat.com/show_bug.cgi?id=1483730 external
https://bugzilla.redhat.com/show_bug.cgi?id=1483828 external
https://bugzilla.redhat.com/show_bug.cgi?id=1484113 external
https://bugzilla.redhat.com/show_bug.cgi?id=1484446 external
https://bugzilla.redhat.com/show_bug.cgi?id=1487495 external
https://bugzilla.redhat.com/show_bug.cgi?id=1488120 external
https://bugzilla.redhat.com/show_bug.cgi?id=1489876 external
https://bugzilla.redhat.com/show_bug.cgi?id=1491785 external
https://bugzilla.redhat.com/show_bug.cgi?id=1492591 external
https://bugzilla.redhat.com/show_bug.cgi?id=1492782 external
https://bugzilla.redhat.com/show_bug.cgi?id=1493085 external
https://bugzilla.redhat.com/show_bug.cgi?id=1495161 external
https://bugzilla.redhat.com/show_bug.cgi?id=1498391 external
https://bugzilla.redhat.com/show_bug.cgi?id=1498730 external
https://bugzilla.redhat.com/show_bug.cgi?id=1499644 external
https://bugzilla.redhat.com/show_bug.cgi?id=1499784 external
https://bugzilla.redhat.com/show_bug.cgi?id=1499865 external
https://bugzilla.redhat.com/show_bug.cgi?id=1500704 external
https://bugzilla.redhat.com/show_bug.cgi?id=1501013 external
https://bugzilla.redhat.com/show_bug.cgi?id=1501023 external
https://bugzilla.redhat.com/show_bug.cgi?id=1501253 external
https://bugzilla.redhat.com/show_bug.cgi?id=1501345 external
https://bugzilla.redhat.com/show_bug.cgi?id=1501885 external
https://bugzilla.redhat.com/show_bug.cgi?id=1502812 external
https://bugzilla.redhat.com/show_bug.cgi?id=1503167 external
https://bugzilla.redhat.com/show_bug.cgi?id=1503173 external
https://bugzilla.redhat.com/show_bug.cgi?id=1503174 external
https://bugzilla.redhat.com/show_bug.cgi?id=1503244 external
https://bugzilla.redhat.com/show_bug.cgi?id=1504234 external
https://bugzilla.redhat.com/show_bug.cgi?id=1505363 external
https://bugzilla.redhat.com/show_bug.cgi?id=1507361 external
https://bugzilla.redhat.com/show_bug.cgi?id=1507394 external
https://bugzilla.redhat.com/show_bug.cgi?id=1508780 external
https://bugzilla.redhat.com/show_bug.cgi?id=1508999 external
https://bugzilla.redhat.com/show_bug.cgi?id=1509102 external
https://bugzilla.redhat.com/show_bug.cgi?id=1509191 external
https://bugzilla.redhat.com/show_bug.cgi?id=1509810 external
https://bugzilla.redhat.com/show_bug.cgi?id=1509830 external
https://bugzilla.redhat.com/show_bug.cgi?id=1509833 external
https://bugzilla.redhat.com/show_bug.cgi?id=1510725 external
https://bugzilla.redhat.com/show_bug.cgi?id=1511766 external
https://bugzilla.redhat.com/show_bug.cgi?id=1511767 external
https://bugzilla.redhat.com/show_bug.cgi?id=1512496 external
https://bugzilla.redhat.com/show_bug.cgi?id=1512963 external
https://bugzilla.redhat.com/show_bug.cgi?id=1515051 external
https://bugzilla.redhat.com/show_bug.cgi?id=1516249 external
https://bugzilla.redhat.com/show_bug.cgi?id=1517463 external
https://bugzilla.redhat.com/show_bug.cgi?id=1517987 external
https://bugzilla.redhat.com/show_bug.cgi?id=1518260 external
https://bugzilla.redhat.com/show_bug.cgi?id=1519076 external
https://bugzilla.redhat.com/show_bug.cgi?id=1519740 external
https://bugzilla.redhat.com/show_bug.cgi?id=1520767 external
https://bugzilla.redhat.com/show_bug.cgi?id=1522833 external
https://bugzilla.redhat.com/show_bug.cgi?id=1523216 external
https://bugzilla.redhat.com/show_bug.cgi?id=1527309 external
https://bugzilla.redhat.com/show_bug.cgi?id=1528566 external
https://bugzilla.redhat.com/show_bug.cgi?id=1528733 external
https://bugzilla.redhat.com/show_bug.cgi?id=1529072 external
https://bugzilla.redhat.com/show_bug.cgi?id=1529451 external
https://bugzilla.redhat.com/show_bug.cgi?id=1530146 external
https://bugzilla.redhat.com/show_bug.cgi?id=1530325 external
https://bugzilla.redhat.com/show_bug.cgi?id=1530512 external
https://bugzilla.redhat.com/show_bug.cgi?id=1530519 external
https://bugzilla.redhat.com/show_bug.cgi?id=1531041 external
https://bugzilla.redhat.com/show_bug.cgi?id=1534253 external
https://bugzilla.redhat.com/show_bug.cgi?id=1534530 external
https://bugzilla.redhat.com/show_bug.cgi?id=1535281 external
https://bugzilla.redhat.com/show_bug.cgi?id=1535852 external
https://bugzilla.redhat.com/show_bug.cgi?id=1537357 external
https://bugzilla.redhat.com/show_bug.cgi?id=1538366 external
https://bugzilla.redhat.com/show_bug.cgi?id=1539699 external
https://bugzilla.redhat.com/show_bug.cgi?id=1540600 external
https://bugzilla.redhat.com/show_bug.cgi?id=1540664 external
https://bugzilla.redhat.com/show_bug.cgi?id=1540908 external
https://bugzilla.redhat.com/show_bug.cgi?id=1540961 external
https://bugzilla.redhat.com/show_bug.cgi?id=1541122 external
https://bugzilla.redhat.com/show_bug.cgi?id=1541830 external
https://bugzilla.redhat.com/show_bug.cgi?id=1541932 external
https://bugzilla.redhat.com/show_bug.cgi?id=1543068 external
https://bugzilla.redhat.com/show_bug.cgi?id=1543296 external
https://bugzilla.redhat.com/show_bug.cgi?id=1544382 external
https://bugzilla.redhat.com/show_bug.cgi?id=1544451 external
https://bugzilla.redhat.com/show_bug.cgi?id=1544824 external
https://bugzilla.redhat.com/show_bug.cgi?id=1544852 external
https://bugzilla.redhat.com/show_bug.cgi?id=1545277 external
https://bugzilla.redhat.com/show_bug.cgi?id=1545486 external
https://bugzilla.redhat.com/show_bug.cgi?id=1545523 external
https://bugzilla.redhat.com/show_bug.cgi?id=1545570 external
https://bugzilla.redhat.com/show_bug.cgi?id=1546075 external
https://bugzilla.redhat.com/show_bug.cgi?id=1546717 external
https://bugzilla.redhat.com/show_bug.cgi?id=1546941 external
https://bugzilla.redhat.com/show_bug.cgi?id=1546945 external
https://bugzilla.redhat.com/show_bug.cgi?id=1546960 external
https://bugzilla.redhat.com/show_bug.cgi?id=1547012 external
https://bugzilla.redhat.com/show_bug.cgi?id=1547903 external
https://bugzilla.redhat.com/show_bug.cgi?id=1548337 external
https://bugzilla.redhat.com/show_bug.cgi?id=1548829 external
https://bugzilla.redhat.com/show_bug.cgi?id=1549023 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550315 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550474 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550771 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550896 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550918 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550982 external
https://bugzilla.redhat.com/show_bug.cgi?id=1550991 external
https://bugzilla.redhat.com/show_bug.cgi?id=1551186 external
https://bugzilla.redhat.com/show_bug.cgi?id=1552360 external
https://bugzilla.redhat.com/show_bug.cgi?id=1552414 external
https://bugzilla.redhat.com/show_bug.cgi?id=1552425 external
https://bugzilla.redhat.com/show_bug.cgi?id=1553677 external
https://bugzilla.redhat.com/show_bug.cgi?id=1554291 external
https://bugzilla.redhat.com/show_bug.cgi?id=1554905 external
https://bugzilla.redhat.com/show_bug.cgi?id=1555261 external
https://bugzilla.redhat.com/show_bug.cgi?id=1556895 external
https://bugzilla.redhat.com/show_bug.cgi?id=1557297 external
https://bugzilla.redhat.com/show_bug.cgi?id=1557365 external
https://bugzilla.redhat.com/show_bug.cgi?id=1557551 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558433 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558463 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558515 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558517 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558948 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558989 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558990 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558991 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558993 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558994 external
https://bugzilla.redhat.com/show_bug.cgi?id=1558995 external
https://bugzilla.redhat.com/show_bug.cgi?id=1559084 external
https://bugzilla.redhat.com/show_bug.cgi?id=1559452 external
https://bugzilla.redhat.com/show_bug.cgi?id=1559788 external
https://bugzilla.redhat.com/show_bug.cgi?id=1559831 external
https://bugzilla.redhat.com/show_bug.cgi?id=1559884 external
https://bugzilla.redhat.com/show_bug.cgi?id=1559886 external
https://bugzilla.redhat.com/show_bug.cgi?id=1560955 external
https://bugzilla.redhat.com/show_bug.cgi?id=1561733 external
https://bugzilla.redhat.com/show_bug.cgi?id=1561999 external
https://bugzilla.redhat.com/show_bug.cgi?id=1562744 external
https://bugzilla.redhat.com/show_bug.cgi?id=1563692 external
https://bugzilla.redhat.com/show_bug.cgi?id=1563804 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565015 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565119 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565399 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565577 external
https://bugzilla.redhat.com/show_bug.cgi?id=1565962 external
https://bugzilla.redhat.com/show_bug.cgi?id=1566336 external
https://bugzilla.redhat.com/show_bug.cgi?id=1567001 external
https://bugzilla.redhat.com/show_bug.cgi?id=1567100 external
https://bugzilla.redhat.com/show_bug.cgi?id=1567110 external
https://bugzilla.redhat.com/show_bug.cgi?id=1567899 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568297 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568374 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568655 external
https://bugzilla.redhat.com/show_bug.cgi?id=1568896 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569457 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569490 external
https://bugzilla.redhat.com/show_bug.cgi?id=1569951 external
https://bugzilla.redhat.com/show_bug.cgi?id=1570514 external
https://bugzilla.redhat.com/show_bug.cgi?id=1570541 external
https://bugzilla.redhat.com/show_bug.cgi?id=1570582 external
https://bugzilla.redhat.com/show_bug.cgi?id=1570586 external
https://bugzilla.redhat.com/show_bug.cgi?id=1571645 external
https://bugzilla.redhat.com/show_bug.cgi?id=1572043 external
https://bugzilla.redhat.com/show_bug.cgi?id=1572075 external
https://bugzilla.redhat.com/show_bug.cgi?id=1572087 external
https://bugzilla.redhat.com/show_bug.cgi?id=1572570 external
https://bugzilla.redhat.com/show_bug.cgi?id=1572585 external
https://bugzilla.redhat.com/show_bug.cgi?id=1575539 external
https://bugzilla.redhat.com/show_bug.cgi?id=1575555 external
https://bugzilla.redhat.com/show_bug.cgi?id=1575557 external
https://bugzilla.redhat.com/show_bug.cgi?id=1575840 external
https://bugzilla.redhat.com/show_bug.cgi?id=1575877 external
https://bugzilla.redhat.com/show_bug.cgi?id=1575895 external
https://bugzilla.redhat.com/show_bug.cgi?id=1577051 external
https://bugzilla.redhat.com/show_bug.cgi?id=1578647 external
https://bugzilla.redhat.com/show_bug.cgi?id=1579981 external
https://bugzilla.redhat.com/show_bug.cgi?id=1580120 external
https://bugzilla.redhat.com/show_bug.cgi?id=1580344 external
https://bugzilla.redhat.com/show_bug.cgi?id=1581047 external
https://bugzilla.redhat.com/show_bug.cgi?id=1581057 external
https://bugzilla.redhat.com/show_bug.cgi?id=1581184 external
https://bugzilla.redhat.com/show_bug.cgi?id=1581219 external
https://bugzilla.redhat.com/show_bug.cgi?id=1581231 external
https://bugzilla.redhat.com/show_bug.cgi?id=1581553 external
https://bugzilla.redhat.com/show_bug.cgi?id=1581647 external
https://bugzilla.redhat.com/show_bug.cgi?id=1582066 external
https://bugzilla.redhat.com/show_bug.cgi?id=1582119 external
https://bugzilla.redhat.com/show_bug.cgi?id=1582417 external
https://bugzilla.redhat.com/show_bug.cgi?id=1583047 external
https://bugzilla.redhat.com/show_bug.cgi?id=1588408 external
https://bugzilla.redhat.com/show_bug.cgi?id=1592666 external
https://bugzilla.redhat.com/show_bug.cgi?id=1593865 external
https://bugzilla.redhat.com/show_bug.cgi?id=1594658 external
https://bugzilla.redhat.com/show_bug.cgi?id=1597506 external
https://bugzilla.redhat.com/show_bug.cgi?id=1597511 external
https://bugzilla.redhat.com/show_bug.cgi?id=1597654 external
https://bugzilla.redhat.com/show_bug.cgi?id=1597768 external
https://bugzilla.redhat.com/show_bug.cgi?id=1598105 external
https://bugzilla.redhat.com/show_bug.cgi?id=1598356 external
https://bugzilla.redhat.com/show_bug.cgi?id=1598384 external
https://bugzilla.redhat.com/show_bug.cgi?id=1599037 external
https://bugzilla.redhat.com/show_bug.cgi?id=1599362 external
https://bugzilla.redhat.com/show_bug.cgi?id=1599823 external
https://bugzilla.redhat.com/show_bug.cgi?id=1599998 external
https://bugzilla.redhat.com/show_bug.cgi?id=1600057 external
https://bugzilla.redhat.com/show_bug.cgi?id=1600790 external
https://bugzilla.redhat.com/show_bug.cgi?id=1601245 external
https://bugzilla.redhat.com/show_bug.cgi?id=1601298 external
https://bugzilla.redhat.com/show_bug.cgi?id=1601314 external
https://bugzilla.redhat.com/show_bug.cgi?id=1601331 external
https://bugzilla.redhat.com/show_bug.cgi?id=1601642 external
https://bugzilla.redhat.com/show_bug.cgi?id=1601657 external
https://bugzilla.redhat.com/show_bug.cgi?id=1607617 external
https://bugzilla.redhat.com/show_bug.cgi?id=1607618 external
https://bugzilla.redhat.com/show_bug.cgi?id=1608352 external
https://bugzilla.redhat.com/show_bug.cgi?id=1609163 external
https://bugzilla.redhat.com/show_bug.cgi?id=1609724 external
https://bugzilla.redhat.com/show_bug.cgi?id=1610659 external
https://bugzilla.redhat.com/show_bug.cgi?id=1611151 external
https://bugzilla.redhat.com/show_bug.cgi?id=1612098 external
https://bugzilla.redhat.com/show_bug.cgi?id=1612658 external
https://bugzilla.redhat.com/show_bug.cgi?id=1612659 external
https://bugzilla.redhat.com/show_bug.cgi?id=1612660 external
https://bugzilla.redhat.com/show_bug.cgi?id=1612664 external
https://bugzilla.redhat.com/show_bug.cgi?id=1613143 external
https://bugzilla.redhat.com/show_bug.cgi?id=1615338 external
https://bugzilla.redhat.com/show_bug.cgi?id=1615440 external
https://bugzilla.redhat.com/show_bug.cgi?id=1615911 external
https://bugzilla.redhat.com/show_bug.cgi?id=1619416 external
https://bugzilla.redhat.com/show_bug.cgi?id=1619538 external
https://bugzilla.redhat.com/show_bug.cgi?id=1620469 external
https://bugzilla.redhat.com/show_bug.cgi?id=1620765 external
https://bugzilla.redhat.com/show_bug.cgi?id=1622029 external
https://bugzilla.redhat.com/show_bug.cgi?id=1622452 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2018-10904 self
https://bugzilla.redhat.com/show_bug.cgi?id=1601298 external
https://www.cve.org/CVERecord?id=CVE-2018-10904 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10904 external
https://access.redhat.com/security/cve/CVE-2018-10907 self
https://bugzilla.redhat.com/show_bug.cgi?id=1601642 external
https://www.cve.org/CVERecord?id=CVE-2018-10907 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10907 external
https://access.redhat.com/security/cve/CVE-2018-10911 self
https://bugzilla.redhat.com/show_bug.cgi?id=1601657 external
https://www.cve.org/CVERecord?id=CVE-2018-10911 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10911 external
https://access.redhat.com/security/cve/CVE-2018-10913 self
https://bugzilla.redhat.com/show_bug.cgi?id=1607618 external
https://www.cve.org/CVERecord?id=CVE-2018-10913 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10913 external
https://access.redhat.com/security/cve/CVE-2018-10914 self
https://bugzilla.redhat.com/show_bug.cgi?id=1607617 external
https://www.cve.org/CVERecord?id=CVE-2018-10914 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10914 external
https://access.redhat.com/security/cve/CVE-2018-10923 self
https://bugzilla.redhat.com/show_bug.cgi?id=1610659 external
https://www.cve.org/CVERecord?id=CVE-2018-10923 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10923 external
https://access.redhat.com/security/cve/CVE-2018-10926 self
https://bugzilla.redhat.com/show_bug.cgi?id=1613143 external
https://www.cve.org/CVERecord?id=CVE-2018-10926 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10926 external
https://access.redhat.com/security/cve/CVE-2018-10927 self
https://bugzilla.redhat.com/show_bug.cgi?id=1612658 external
https://www.cve.org/CVERecord?id=CVE-2018-10927 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10927 external
https://access.redhat.com/security/cve/CVE-2018-10928 self
https://bugzilla.redhat.com/show_bug.cgi?id=1612659 external
https://www.cve.org/CVERecord?id=CVE-2018-10928 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10928 external
https://access.redhat.com/security/cve/CVE-2018-10929 self
https://bugzilla.redhat.com/show_bug.cgi?id=1612660 external
https://www.cve.org/CVERecord?id=CVE-2018-10929 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10929 external
https://access.redhat.com/security/cve/CVE-2018-10930 self
https://bugzilla.redhat.com/show_bug.cgi?id=1612664 external
https://www.cve.org/CVERecord?id=CVE-2018-10930 external
https://nvd.nist.gov/vuln/detail/CVE-2018-10930 external
Acknowledgments
hansmi.ch Michael Hanselmann

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated glusterfs packages that fix multiple security issues and bugs, and add various enhancements are now available for Red Hat Gluster Storage 3.4 on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "GlusterFS is a key building block of Red Hat Gluster Storage. It is based on a stackable user-space design and can deliver exceptional performance for diverse workloads. GlusterFS aggregates various storage servers over network interconnections into one large, parallel network file system.\n\nSecurity Fix(es):\n\n* glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code (CVE-2018-10904)\n\n* glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code (CVE-2018-10907)\n\n* glusterfs: I/O to arbitrary devices on storage server (CVE-2018-10923)\n\n* glusterfs: Device files can be created in arbitrary locations (CVE-2018-10926)\n\n* glusterfs: File status information leak and denial of service (CVE-2018-10927)\n\n* glusterfs: Improper resolution of symlinks allows for privilege escalation (CVE-2018-10928)\n\n* glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code (CVE-2018-10929)\n\n* glusterfs: Files can be renamed outside volume (CVE-2018-10930)\n\n* glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)\n\n* glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c (CVE-2018-10914)\n\n* glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c (CVE-2018-10913)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Michael Hanselmann (hansmi.ch) for reporting these issues.\n\nAdditional Changes:\n\nThese updated glusterfs packages include numerous bug fixes and enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Gluster Storage 3.4 Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/site/documentation/en-US/red_hat_gluster_storage/3.4/html/3.4_release_notes/\n\nAll users of Red Hat Gluster Storage are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2018:2607",
        "url": "https://access.redhat.com/errata/RHSA-2018:2607"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/site/documentation/en-US/red_hat_gluster_storage/3.4/html/3.4_release_notes/",
        "url": "https://access.redhat.com/site/documentation/en-US/red_hat_gluster_storage/3.4/html/3.4_release_notes/"
      },
      {
        "category": "external",
        "summary": "1118770",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118770"
      },
      {
        "category": "external",
        "summary": "1167789",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167789"
      },
      {
        "category": "external",
        "summary": "1186664",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186664"
      },
      {
        "category": "external",
        "summary": "1215556",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215556"
      },
      {
        "category": "external",
        "summary": "1226874",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1226874"
      },
      {
        "category": "external",
        "summary": "1234884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1234884"
      },
      {
        "category": "external",
        "summary": "1260479",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260479"
      },
      {
        "category": "external",
        "summary": "1262230",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262230"
      },
      {
        "category": "external",
        "summary": "1277924",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277924"
      },
      {
        "category": "external",
        "summary": "1282318",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1282318"
      },
      {
        "category": "external",
        "summary": "1282731",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1282731"
      },
      {
        "category": "external",
        "summary": "1283045",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1283045"
      },
      {
        "category": "external",
        "summary": "1286092",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286092"
      },
      {
        "category": "external",
        "summary": "1286820",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286820"
      },
      {
        "category": "external",
        "summary": "1288115",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288115"
      },
      {
        "category": "external",
        "summary": "1293332",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1293332"
      },
      {
        "category": "external",
        "summary": "1293349",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1293349"
      },
      {
        "category": "external",
        "summary": "1294412",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1294412"
      },
      {
        "category": "external",
        "summary": "1299740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299740"
      },
      {
        "category": "external",
        "summary": "1301474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301474"
      },
      {
        "category": "external",
        "summary": "1319271",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319271"
      },
      {
        "category": "external",
        "summary": "1324531",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324531"
      },
      {
        "category": "external",
        "summary": "1330526",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330526"
      },
      {
        "category": "external",
        "summary": "1333705",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333705"
      },
      {
        "category": "external",
        "summary": "1338693",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1338693"
      },
      {
        "category": "external",
        "summary": "1339054",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1339054"
      },
      {
        "category": "external",
        "summary": "1339765",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1339765"
      },
      {
        "category": "external",
        "summary": "1341190",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341190"
      },
      {
        "category": "external",
        "summary": "1342785",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1342785"
      },
      {
        "category": "external",
        "summary": "1345828",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1345828"
      },
      {
        "category": "external",
        "summary": "1356454",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356454"
      },
      {
        "category": "external",
        "summary": "1360331",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360331"
      },
      {
        "category": "external",
        "summary": "1361209",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361209"
      },
      {
        "category": "external",
        "summary": "1369312",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369312"
      },
      {
        "category": "external",
        "summary": "1369420",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369420"
      },
      {
        "category": "external",
        "summary": "1375094",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375094"
      },
      {
        "category": "external",
        "summary": "1378371",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378371"
      },
      {
        "category": "external",
        "summary": "1384762",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384762"
      },
      {
        "category": "external",
        "summary": "1384979",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384979"
      },
      {
        "category": "external",
        "summary": "1384983",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384983"
      },
      {
        "category": "external",
        "summary": "1388218",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388218"
      },
      {
        "category": "external",
        "summary": "1392905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1392905"
      },
      {
        "category": "external",
        "summary": "1397798",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1397798"
      },
      {
        "category": "external",
        "summary": "1401969",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401969"
      },
      {
        "category": "external",
        "summary": "1406363",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406363"
      },
      {
        "category": "external",
        "summary": "1408158",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408158"
      },
      {
        "category": "external",
        "summary": "1408354",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408354"
      },
      {
        "category": "external",
        "summary": "1409102",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409102"
      },
      {
        "category": "external",
        "summary": "1410719",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1410719"
      },
      {
        "category": "external",
        "summary": "1413005",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413005"
      },
      {
        "category": "external",
        "summary": "1413959",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413959"
      },
      {
        "category": "external",
        "summary": "1414456",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414456"
      },
      {
        "category": "external",
        "summary": "1419438",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419438"
      },
      {
        "category": "external",
        "summary": "1419807",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419807"
      },
      {
        "category": "external",
        "summary": "1425681",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1425681"
      },
      {
        "category": "external",
        "summary": "1426042",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426042"
      },
      {
        "category": "external",
        "summary": "1436673",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436673"
      },
      {
        "category": "external",
        "summary": "1442983",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1442983"
      },
      {
        "category": "external",
        "summary": "1444820",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444820"
      },
      {
        "category": "external",
        "summary": "1446046",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446046"
      },
      {
        "category": "external",
        "summary": "1448334",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448334"
      },
      {
        "category": "external",
        "summary": "1449638",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1449638"
      },
      {
        "category": "external",
        "summary": "1449867",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1449867"
      },
      {
        "category": "external",
        "summary": "1452915",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452915"
      },
      {
        "category": "external",
        "summary": "1459101",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459101"
      },
      {
        "category": "external",
        "summary": "1459895",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459895"
      },
      {
        "category": "external",
        "summary": "1460639",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460639"
      },
      {
        "category": "external",
        "summary": "1460918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1460918"
      },
      {
        "category": "external",
        "summary": "1461695",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461695"
      },
      {
        "category": "external",
        "summary": "1463112",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463112"
      },
      {
        "category": "external",
        "summary": "1463114",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463114"
      },
      {
        "category": "external",
        "summary": "1463592",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463592"
      },
      {
        "category": "external",
        "summary": "1463964",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463964"
      },
      {
        "category": "external",
        "summary": "1464150",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464150"
      },
      {
        "category": "external",
        "summary": "1464350",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1464350"
      },
      {
        "category": "external",
        "summary": "1466122",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1466122"
      },
      {
        "category": "external",
        "summary": "1466129",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1466129"
      },
      {
        "category": "external",
        "summary": "1467536",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1467536"
      },
      {
        "category": "external",
        "summary": "1468972",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1468972"
      },
      {
        "category": "external",
        "summary": "1470566",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470566"
      },
      {
        "category": "external",
        "summary": "1470599",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470599"
      },
      {
        "category": "external",
        "summary": "1470967",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470967"
      },
      {
        "category": "external",
        "summary": "1472757",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472757"
      },
      {
        "category": "external",
        "summary": "1474012",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474012"
      },
      {
        "category": "external",
        "summary": "1474745",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1474745"
      },
      {
        "category": "external",
        "summary": "1475466",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475466"
      },
      {
        "category": "external",
        "summary": "1475475",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475475"
      },
      {
        "category": "external",
        "summary": "1475779",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475779"
      },
      {
        "category": "external",
        "summary": "1475789",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475789"
      },
      {
        "category": "external",
        "summary": "1476827",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476827"
      },
      {
        "category": "external",
        "summary": "1476876",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1476876"
      },
      {
        "category": "external",
        "summary": "1477087",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477087"
      },
      {
        "category": "external",
        "summary": "1477250",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1477250"
      },
      {
        "category": "external",
        "summary": "1478395",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1478395"
      },
      {
        "category": "external",
        "summary": "1479335",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1479335"
      },
      {
        "category": "external",
        "summary": "1480041",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480041"
      },
      {
        "category": "external",
        "summary": "1480042",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480042"
      },
      {
        "category": "external",
        "summary": "1480188",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480188"
      },
      {
        "category": "external",
        "summary": "1482376",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482376"
      },
      {
        "category": "external",
        "summary": "1482812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1482812"
      },
      {
        "category": "external",
        "summary": "1483541",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483541"
      },
      {
        "category": "external",
        "summary": "1483730",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483730"
      },
      {
        "category": "external",
        "summary": "1483828",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1483828"
      },
      {
        "category": "external",
        "summary": "1484113",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484113"
      },
      {
        "category": "external",
        "summary": "1484446",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484446"
      },
      {
        "category": "external",
        "summary": "1487495",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487495"
      },
      {
        "category": "external",
        "summary": "1488120",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488120"
      },
      {
        "category": "external",
        "summary": "1489876",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1489876"
      },
      {
        "category": "external",
        "summary": "1491785",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491785"
      },
      {
        "category": "external",
        "summary": "1492591",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492591"
      },
      {
        "category": "external",
        "summary": "1492782",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492782"
      },
      {
        "category": "external",
        "summary": "1493085",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493085"
      },
      {
        "category": "external",
        "summary": "1495161",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495161"
      },
      {
        "category": "external",
        "summary": "1498391",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498391"
      },
      {
        "category": "external",
        "summary": "1498730",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498730"
      },
      {
        "category": "external",
        "summary": "1499644",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499644"
      },
      {
        "category": "external",
        "summary": "1499784",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499784"
      },
      {
        "category": "external",
        "summary": "1499865",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1499865"
      },
      {
        "category": "external",
        "summary": "1500704",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1500704"
      },
      {
        "category": "external",
        "summary": "1501013",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501013"
      },
      {
        "category": "external",
        "summary": "1501023",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501023"
      },
      {
        "category": "external",
        "summary": "1501253",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501253"
      },
      {
        "category": "external",
        "summary": "1501345",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501345"
      },
      {
        "category": "external",
        "summary": "1501885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501885"
      },
      {
        "category": "external",
        "summary": "1502812",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1502812"
      },
      {
        "category": "external",
        "summary": "1503167",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503167"
      },
      {
        "category": "external",
        "summary": "1503173",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503173"
      },
      {
        "category": "external",
        "summary": "1503174",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503174"
      },
      {
        "category": "external",
        "summary": "1503244",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1503244"
      },
      {
        "category": "external",
        "summary": "1504234",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504234"
      },
      {
        "category": "external",
        "summary": "1505363",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1505363"
      },
      {
        "category": "external",
        "summary": "1507361",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507361"
      },
      {
        "category": "external",
        "summary": "1507394",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1507394"
      },
      {
        "category": "external",
        "summary": "1508780",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508780"
      },
      {
        "category": "external",
        "summary": "1508999",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508999"
      },
      {
        "category": "external",
        "summary": "1509102",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509102"
      },
      {
        "category": "external",
        "summary": "1509191",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509191"
      },
      {
        "category": "external",
        "summary": "1509810",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509810"
      },
      {
        "category": "external",
        "summary": "1509830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509830"
      },
      {
        "category": "external",
        "summary": "1509833",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509833"
      },
      {
        "category": "external",
        "summary": "1510725",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510725"
      },
      {
        "category": "external",
        "summary": "1511766",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511766"
      },
      {
        "category": "external",
        "summary": "1511767",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1511767"
      },
      {
        "category": "external",
        "summary": "1512496",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512496"
      },
      {
        "category": "external",
        "summary": "1512963",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512963"
      },
      {
        "category": "external",
        "summary": "1515051",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1515051"
      },
      {
        "category": "external",
        "summary": "1516249",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516249"
      },
      {
        "category": "external",
        "summary": "1517463",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517463"
      },
      {
        "category": "external",
        "summary": "1517987",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517987"
      },
      {
        "category": "external",
        "summary": "1518260",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1518260"
      },
      {
        "category": "external",
        "summary": "1519076",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519076"
      },
      {
        "category": "external",
        "summary": "1519740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519740"
      },
      {
        "category": "external",
        "summary": "1520767",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520767"
      },
      {
        "category": "external",
        "summary": "1522833",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1522833"
      },
      {
        "category": "external",
        "summary": "1523216",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523216"
      },
      {
        "category": "external",
        "summary": "1527309",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1527309"
      },
      {
        "category": "external",
        "summary": "1528566",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528566"
      },
      {
        "category": "external",
        "summary": "1528733",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528733"
      },
      {
        "category": "external",
        "summary": "1529072",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1529072"
      },
      {
        "category": "external",
        "summary": "1529451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1529451"
      },
      {
        "category": "external",
        "summary": "1530146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530146"
      },
      {
        "category": "external",
        "summary": "1530325",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530325"
      },
      {
        "category": "external",
        "summary": "1530512",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530512"
      },
      {
        "category": "external",
        "summary": "1530519",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530519"
      },
      {
        "category": "external",
        "summary": "1531041",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531041"
      },
      {
        "category": "external",
        "summary": "1534253",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534253"
      },
      {
        "category": "external",
        "summary": "1534530",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1534530"
      },
      {
        "category": "external",
        "summary": "1535281",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535281"
      },
      {
        "category": "external",
        "summary": "1535852",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535852"
      },
      {
        "category": "external",
        "summary": "1537357",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1537357"
      },
      {
        "category": "external",
        "summary": "1538366",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1538366"
      },
      {
        "category": "external",
        "summary": "1539699",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1539699"
      },
      {
        "category": "external",
        "summary": "1540600",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540600"
      },
      {
        "category": "external",
        "summary": "1540664",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540664"
      },
      {
        "category": "external",
        "summary": "1540908",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540908"
      },
      {
        "category": "external",
        "summary": "1540961",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1540961"
      },
      {
        "category": "external",
        "summary": "1541122",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541122"
      },
      {
        "category": "external",
        "summary": "1541830",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541830"
      },
      {
        "category": "external",
        "summary": "1541932",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1541932"
      },
      {
        "category": "external",
        "summary": "1543068",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1543068"
      },
      {
        "category": "external",
        "summary": "1543296",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1543296"
      },
      {
        "category": "external",
        "summary": "1544382",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544382"
      },
      {
        "category": "external",
        "summary": "1544451",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544451"
      },
      {
        "category": "external",
        "summary": "1544824",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544824"
      },
      {
        "category": "external",
        "summary": "1544852",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544852"
      },
      {
        "category": "external",
        "summary": "1545277",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545277"
      },
      {
        "category": "external",
        "summary": "1545486",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545486"
      },
      {
        "category": "external",
        "summary": "1545523",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545523"
      },
      {
        "category": "external",
        "summary": "1545570",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1545570"
      },
      {
        "category": "external",
        "summary": "1546075",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546075"
      },
      {
        "category": "external",
        "summary": "1546717",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546717"
      },
      {
        "category": "external",
        "summary": "1546941",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546941"
      },
      {
        "category": "external",
        "summary": "1546945",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546945"
      },
      {
        "category": "external",
        "summary": "1546960",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1546960"
      },
      {
        "category": "external",
        "summary": "1547012",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547012"
      },
      {
        "category": "external",
        "summary": "1547903",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1547903"
      },
      {
        "category": "external",
        "summary": "1548337",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548337"
      },
      {
        "category": "external",
        "summary": "1548829",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1548829"
      },
      {
        "category": "external",
        "summary": "1549023",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549023"
      },
      {
        "category": "external",
        "summary": "1550315",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550315"
      },
      {
        "category": "external",
        "summary": "1550474",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550474"
      },
      {
        "category": "external",
        "summary": "1550771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550771"
      },
      {
        "category": "external",
        "summary": "1550896",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550896"
      },
      {
        "category": "external",
        "summary": "1550918",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550918"
      },
      {
        "category": "external",
        "summary": "1550982",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550982"
      },
      {
        "category": "external",
        "summary": "1550991",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550991"
      },
      {
        "category": "external",
        "summary": "1551186",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551186"
      },
      {
        "category": "external",
        "summary": "1552360",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552360"
      },
      {
        "category": "external",
        "summary": "1552414",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552414"
      },
      {
        "category": "external",
        "summary": "1552425",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552425"
      },
      {
        "category": "external",
        "summary": "1553677",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553677"
      },
      {
        "category": "external",
        "summary": "1554291",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554291"
      },
      {
        "category": "external",
        "summary": "1554905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1554905"
      },
      {
        "category": "external",
        "summary": "1555261",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1555261"
      },
      {
        "category": "external",
        "summary": "1556895",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1556895"
      },
      {
        "category": "external",
        "summary": "1557297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557297"
      },
      {
        "category": "external",
        "summary": "1557365",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557365"
      },
      {
        "category": "external",
        "summary": "1557551",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1557551"
      },
      {
        "category": "external",
        "summary": "1558433",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558433"
      },
      {
        "category": "external",
        "summary": "1558463",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558463"
      },
      {
        "category": "external",
        "summary": "1558515",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558515"
      },
      {
        "category": "external",
        "summary": "1558517",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558517"
      },
      {
        "category": "external",
        "summary": "1558948",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558948"
      },
      {
        "category": "external",
        "summary": "1558989",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558989"
      },
      {
        "category": "external",
        "summary": "1558990",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558990"
      },
      {
        "category": "external",
        "summary": "1558991",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558991"
      },
      {
        "category": "external",
        "summary": "1558993",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558993"
      },
      {
        "category": "external",
        "summary": "1558994",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558994"
      },
      {
        "category": "external",
        "summary": "1558995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1558995"
      },
      {
        "category": "external",
        "summary": "1559084",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559084"
      },
      {
        "category": "external",
        "summary": "1559452",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559452"
      },
      {
        "category": "external",
        "summary": "1559788",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559788"
      },
      {
        "category": "external",
        "summary": "1559831",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559831"
      },
      {
        "category": "external",
        "summary": "1559884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559884"
      },
      {
        "category": "external",
        "summary": "1559886",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559886"
      },
      {
        "category": "external",
        "summary": "1560955",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560955"
      },
      {
        "category": "external",
        "summary": "1561733",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561733"
      },
      {
        "category": "external",
        "summary": "1561999",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561999"
      },
      {
        "category": "external",
        "summary": "1562744",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1562744"
      },
      {
        "category": "external",
        "summary": "1563692",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563692"
      },
      {
        "category": "external",
        "summary": "1563804",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1563804"
      },
      {
        "category": "external",
        "summary": "1565015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565015"
      },
      {
        "category": "external",
        "summary": "1565119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565119"
      },
      {
        "category": "external",
        "summary": "1565399",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565399"
      },
      {
        "category": "external",
        "summary": "1565577",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565577"
      },
      {
        "category": "external",
        "summary": "1565962",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565962"
      },
      {
        "category": "external",
        "summary": "1566336",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566336"
      },
      {
        "category": "external",
        "summary": "1567001",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567001"
      },
      {
        "category": "external",
        "summary": "1567100",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567100"
      },
      {
        "category": "external",
        "summary": "1567110",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567110"
      },
      {
        "category": "external",
        "summary": "1567899",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1567899"
      },
      {
        "category": "external",
        "summary": "1568297",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568297"
      },
      {
        "category": "external",
        "summary": "1568374",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568374"
      },
      {
        "category": "external",
        "summary": "1568655",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568655"
      },
      {
        "category": "external",
        "summary": "1568896",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568896"
      },
      {
        "category": "external",
        "summary": "1569457",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569457"
      },
      {
        "category": "external",
        "summary": "1569490",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569490"
      },
      {
        "category": "external",
        "summary": "1569951",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1569951"
      },
      {
        "category": "external",
        "summary": "1570514",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570514"
      },
      {
        "category": "external",
        "summary": "1570541",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570541"
      },
      {
        "category": "external",
        "summary": "1570582",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570582"
      },
      {
        "category": "external",
        "summary": "1570586",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1570586"
      },
      {
        "category": "external",
        "summary": "1571645",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571645"
      },
      {
        "category": "external",
        "summary": "1572043",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572043"
      },
      {
        "category": "external",
        "summary": "1572075",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572075"
      },
      {
        "category": "external",
        "summary": "1572087",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572087"
      },
      {
        "category": "external",
        "summary": "1572570",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572570"
      },
      {
        "category": "external",
        "summary": "1572585",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1572585"
      },
      {
        "category": "external",
        "summary": "1575539",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575539"
      },
      {
        "category": "external",
        "summary": "1575555",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575555"
      },
      {
        "category": "external",
        "summary": "1575557",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575557"
      },
      {
        "category": "external",
        "summary": "1575840",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575840"
      },
      {
        "category": "external",
        "summary": "1575877",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575877"
      },
      {
        "category": "external",
        "summary": "1575895",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1575895"
      },
      {
        "category": "external",
        "summary": "1577051",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1577051"
      },
      {
        "category": "external",
        "summary": "1578647",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1578647"
      },
      {
        "category": "external",
        "summary": "1579981",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579981"
      },
      {
        "category": "external",
        "summary": "1580120",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580120"
      },
      {
        "category": "external",
        "summary": "1580344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580344"
      },
      {
        "category": "external",
        "summary": "1581047",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581047"
      },
      {
        "category": "external",
        "summary": "1581057",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581057"
      },
      {
        "category": "external",
        "summary": "1581184",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581184"
      },
      {
        "category": "external",
        "summary": "1581219",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581219"
      },
      {
        "category": "external",
        "summary": "1581231",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581231"
      },
      {
        "category": "external",
        "summary": "1581553",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581553"
      },
      {
        "category": "external",
        "summary": "1581647",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1581647"
      },
      {
        "category": "external",
        "summary": "1582066",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1582066"
      },
      {
        "category": "external",
        "summary": "1582119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1582119"
      },
      {
        "category": "external",
        "summary": "1582417",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1582417"
      },
      {
        "category": "external",
        "summary": "1583047",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1583047"
      },
      {
        "category": "external",
        "summary": "1588408",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588408"
      },
      {
        "category": "external",
        "summary": "1592666",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1592666"
      },
      {
        "category": "external",
        "summary": "1593865",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1593865"
      },
      {
        "category": "external",
        "summary": "1594658",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594658"
      },
      {
        "category": "external",
        "summary": "1597506",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597506"
      },
      {
        "category": "external",
        "summary": "1597511",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597511"
      },
      {
        "category": "external",
        "summary": "1597654",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597654"
      },
      {
        "category": "external",
        "summary": "1597768",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1597768"
      },
      {
        "category": "external",
        "summary": "1598105",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1598105"
      },
      {
        "category": "external",
        "summary": "1598356",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1598356"
      },
      {
        "category": "external",
        "summary": "1598384",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1598384"
      },
      {
        "category": "external",
        "summary": "1599037",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599037"
      },
      {
        "category": "external",
        "summary": "1599362",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599362"
      },
      {
        "category": "external",
        "summary": "1599823",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599823"
      },
      {
        "category": "external",
        "summary": "1599998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1599998"
      },
      {
        "category": "external",
        "summary": "1600057",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600057"
      },
      {
        "category": "external",
        "summary": "1600790",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600790"
      },
      {
        "category": "external",
        "summary": "1601245",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601245"
      },
      {
        "category": "external",
        "summary": "1601298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601298"
      },
      {
        "category": "external",
        "summary": "1601314",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601314"
      },
      {
        "category": "external",
        "summary": "1601331",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601331"
      },
      {
        "category": "external",
        "summary": "1601642",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601642"
      },
      {
        "category": "external",
        "summary": "1601657",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601657"
      },
      {
        "category": "external",
        "summary": "1607617",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607617"
      },
      {
        "category": "external",
        "summary": "1607618",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607618"
      },
      {
        "category": "external",
        "summary": "1608352",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1608352"
      },
      {
        "category": "external",
        "summary": "1609163",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609163"
      },
      {
        "category": "external",
        "summary": "1609724",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1609724"
      },
      {
        "category": "external",
        "summary": "1610659",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610659"
      },
      {
        "category": "external",
        "summary": "1611151",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1611151"
      },
      {
        "category": "external",
        "summary": "1612098",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612098"
      },
      {
        "category": "external",
        "summary": "1612658",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612658"
      },
      {
        "category": "external",
        "summary": "1612659",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612659"
      },
      {
        "category": "external",
        "summary": "1612660",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612660"
      },
      {
        "category": "external",
        "summary": "1612664",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612664"
      },
      {
        "category": "external",
        "summary": "1613143",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1613143"
      },
      {
        "category": "external",
        "summary": "1615338",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615338"
      },
      {
        "category": "external",
        "summary": "1615440",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615440"
      },
      {
        "category": "external",
        "summary": "1615911",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1615911"
      },
      {
        "category": "external",
        "summary": "1619416",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619416"
      },
      {
        "category": "external",
        "summary": "1619538",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1619538"
      },
      {
        "category": "external",
        "summary": "1620469",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620469"
      },
      {
        "category": "external",
        "summary": "1620765",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1620765"
      },
      {
        "category": "external",
        "summary": "1622029",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622029"
      },
      {
        "category": "external",
        "summary": "1622452",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1622452"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2607.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat Gluster Storage security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-14T23:45:08+00:00",
      "generator": {
        "date": "2024-11-14T23:45:08+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2018:2607",
      "initial_release_date": "2018-09-04T06:24:50+00:00",
      "revision_history": [
        {
          "date": "2018-09-04T06:24:50+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2018-09-04T06:24:50+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-14T23:45:08+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Gluster Storage Server 3.4 on RHEL-7",
                "product": {
                  "name": "Red Hat Gluster Storage Server 3.4 on RHEL-7",
                  "product_id": "7Server-RH-Gluster-3.4-Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:storage:3.4:server:el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
                "product": {
                  "name": "Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
                  "product_id": "7Server-RHSClient",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:storage:3:client:el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
                "product": {
                  "name": "Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
                  "product_id": "7Server-RHEV-4-Agents-7",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Gluster Storage"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-server-0:7.5-11.el7rhgs.x86_64",
                "product": {
                  "name": "redhat-release-server-0:7.5-11.el7rhgs.x86_64",
                  "product_id": "redhat-release-server-0:7.5-11.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-server@7.5-11.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-devel@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-libs@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-api@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-fuse@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-server@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python2-gluster@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-rdma@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-cli@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-geo-replication@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-events@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
                "product": {
                  "name": "glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
                  "product_id": "glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-ganesha@3.12.2-18.el7rhgs?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python2-gluster-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "python2-gluster-0:3.12.2-18.el7.x86_64",
                  "product_id": "python2-gluster-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python2-gluster@3.12.2-18.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-libs-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "glusterfs-libs-0:3.12.2-18.el7.x86_64",
                  "product_id": "glusterfs-libs-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-libs@3.12.2-18.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-cli-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "glusterfs-cli-0:3.12.2-18.el7.x86_64",
                  "product_id": "glusterfs-cli-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-cli@3.12.2-18.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
                  "product_id": "glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-api-devel@3.12.2-18.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-fuse-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "glusterfs-fuse-0:3.12.2-18.el7.x86_64",
                  "product_id": "glusterfs-fuse-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-fuse@3.12.2-18.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-rdma-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "glusterfs-rdma-0:3.12.2-18.el7.x86_64",
                  "product_id": "glusterfs-rdma-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-rdma@3.12.2-18.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-devel-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "glusterfs-devel-0:3.12.2-18.el7.x86_64",
                  "product_id": "glusterfs-devel-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-devel@3.12.2-18.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
                  "product_id": "glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-client-xlators@3.12.2-18.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "glusterfs-0:3.12.2-18.el7.x86_64",
                  "product_id": "glusterfs-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs@3.12.2-18.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-api-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "glusterfs-api-0:3.12.2-18.el7.x86_64",
                  "product_id": "glusterfs-api-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-api@3.12.2-18.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
                "product": {
                  "name": "glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
                  "product_id": "glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-debuginfo@3.12.2-18.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-release-server-0:7.5-11.el7rhgs.src",
                "product": {
                  "name": "redhat-release-server-0:7.5-11.el7rhgs.src",
                  "product_id": "redhat-release-server-0:7.5-11.el7rhgs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-release-server@7.5-11.el7rhgs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
                "product": {
                  "name": "redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
                  "product_id": "redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-storage-server@3.4.0.0-1.el7rhgs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-0:3.12.2-18.el7rhgs.src",
                "product": {
                  "name": "glusterfs-0:3.12.2-18.el7rhgs.src",
                  "product_id": "glusterfs-0:3.12.2-18.el7rhgs.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs@3.12.2-18.el7rhgs?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-0:3.12.2-18.el7.src",
                "product": {
                  "name": "glusterfs-0:3.12.2-18.el7.src",
                  "product_id": "glusterfs-0:3.12.2-18.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs@3.12.2-18.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
                "product": {
                  "name": "redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
                  "product_id": "redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/redhat-storage-server@3.4.0.0-1.el7rhgs?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
                "product": {
                  "name": "glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
                  "product_id": "glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/glusterfs-resource-agents@3.12.2-18.el7rhgs?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-0:3.12.2-18.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src"
        },
        "product_reference": "glusterfs-0:3.12.2-18.el7rhgs.src",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-api-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-events-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch"
        },
        "product_reference": "glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-server-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python2-gluster-0:3.12.2-18.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64"
        },
        "product_reference": "python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-server-0:7.5-11.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src"
        },
        "product_reference": "redhat-release-server-0:7.5-11.el7rhgs.src",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-release-server-0:7.5-11.el7rhgs.x86_64 as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64"
        },
        "product_reference": "redhat-release-server-0:7.5-11.el7rhgs.x86_64",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch"
        },
        "product_reference": "redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "redhat-storage-server-0:3.4.0.0-1.el7rhgs.src as a component of Red Hat Gluster Storage Server 3.4 on RHEL-7",
          "product_id": "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src"
        },
        "product_reference": "redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
        "relates_to_product_reference": "7Server-RH-Gluster-3.4-Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-0:3.12.2-18.el7.src as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src"
        },
        "product_reference": "glusterfs-0:3.12.2-18.el7.src",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-api-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-api-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-api-devel-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-cli-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-cli-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-client-xlators-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-debuginfo-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-devel-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-devel-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-fuse-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-fuse-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-libs-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-libs-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-rdma-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-rdma-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python2-gluster-0:3.12.2-18.el7.x86_64 as a component of Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts",
          "product_id": "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "python2-gluster-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHEV-4-Agents-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-0:3.12.2-18.el7.src as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src"
        },
        "product_reference": "glusterfs-0:3.12.2-18.el7.src",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-api-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-api-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-api-devel-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-cli-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-cli-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-client-xlators-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-debuginfo-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-devel-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-devel-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-fuse-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-fuse-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-libs-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-libs-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "glusterfs-rdma-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "glusterfs-rdma-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python2-gluster-0:3.12.2-18.el7.x86_64 as a component of Red Hat Storage Native Client for Red Hat Enterprise Linux 7",
          "product_id": "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        },
        "product_reference": "python2-gluster-0:3.12.2-18.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSClient"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10904",
      "cwe": {
        "id": "CWE-426",
        "name": "Untrusted Search Path"
      },
      "discovery_date": "2018-07-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1601298"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that glusterfs server does not properly sanitize file paths in the \"trusted.io-stats-dump\" extended attribute which is used by the \"debug/io-stats\" translator. An attacker can use this flaw to create files and execute arbitrary code. To exploit this, the attacker would require sufficient access to modify the extended attributes of files on a gluster volume.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there.\n\nThis flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network. For Red Hat Virtualization, Product Security has rated this flaw as Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10904"
        },
        {
          "category": "external",
          "summary": "RHBZ#1601298",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601298"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10904",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10904"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10904",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10904"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        },
        {
          "category": "workaround",
          "details": "To limit exposure of gluster server nodes :  \n\n1. gluster server should be on LAN and not reachable from public networks.  \n2. Use gluster auth.allow and auth.reject.  \n3. Use TLS certificates to authenticate gluster clients.\n\ncaveat: This does not protect from attacks against authenticated gluster clients.",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "glusterfs: Unsanitized file names in debug/io-stats translator can allow remote attackers to execute arbitrary code"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10907",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2018-07-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1601642"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that glusterfs server is vulnerable to mulitple stack based buffer overflows due to functions in server-rpc-fopc.c allocating fixed size buffers using \u0027alloca(3)\u0027. An authenticated attacker could exploit this by mounting a gluster volume and sending a string longer that the fixed buffer size to cause crash or potential code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there.\n\nThis flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network. For Red Hat Virtualization, Product Security has rated this flaw as Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10907"
        },
        {
          "category": "external",
          "summary": "RHBZ#1601642",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601642"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10907",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10907"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10907",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10907"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        },
        {
          "category": "workaround",
          "details": "To limit exposure of gluster server nodes :  \n\n1. gluster server should be on LAN and not reachable from public networks.  \n2. Use gluster auth.allow and auth.reject.  \n3. Use TLS certificates to authenticate gluster clients.\n\ncaveat: This does not protect from attacks by authenticated gluster clients.",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "glusterfs: Stack-based buffer overflow in server-rpc-fops.c allows remote attackers to execute arbitrary code"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10911",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2018-07-17T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1601657"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in dict.c:dict_unserialize function of glusterfs, dic_unserialize function does not handle negative key length values. An attacker could use this flaw to read memory from other locations into the stored dict value.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network. For Red Hat Virtualization, Product Security has rated this flaw as Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10911"
        },
        {
          "category": "external",
          "summary": "RHBZ#1601657",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1601657"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10911",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10911"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10911",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10911"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10913",
      "cwe": {
        "id": "CWE-209",
        "name": "Generation of Error Message Containing Sensitive Information"
      },
      "discovery_date": "2018-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1607618"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An information disclosure vulnerability was discovered in glusterfs server. An attacker could issue a xattr request via glusterfs FUSE to determine the existence of any file.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there.\n\nThis flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10913"
        },
        {
          "category": "external",
          "summary": "RHBZ#1607618",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607618"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10913",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10913"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10913",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10913"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        },
        {
          "category": "workaround",
          "details": "SELinux mitigates this issue on Red Hat Gluster Storage 3. SELinux should be in enforcing mode only as permissive mode does not block attacks.",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "glusterfs: Information Exposure in posix_get_file_contents function in posix-helpers.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10914",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2018-07-23T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1607617"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that an attacker could issue a xattr request via glusterfs FUSE to cause gluster brick process to crash which will result in a remote denial of service. If gluster multiplexing is enabled this will result in a crash of multiple bricks and gluster volumes.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there.\n\nThis flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10914"
        },
        {
          "category": "external",
          "summary": "RHBZ#1607617",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1607617"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10914",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10914"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10914",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10914"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        },
        {
          "category": "workaround",
          "details": "SELinux mitigates this issue on Red Hat Gluster Storage 3. SELinux should be in enforcing mode only as permissive mode does not block attacks.",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "glusterfs: remote denial of service of gluster volumes via posix_get_file_contents function in posix-helpers.c"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10923",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2018-07-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1610659"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was found that the \"mknod\" call derived from mknod(2) can create files pointing to devices on a glusterfs server node. An authenticated attacker could use this to create an arbitrary device and read data from any device attached to the glusterfs server node.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: I/O to arbitrary devices on storage server",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there.\n\nThis flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network. For Red Hat Virtualization, Product Security has rated this flaw as Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10923"
        },
        {
          "category": "external",
          "summary": "RHBZ#1610659",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610659"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10923",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10923"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10923",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10923"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        },
        {
          "category": "workaround",
          "details": "To limit exposure of gluster server nodes :  \n\n1. gluster server should be on LAN and not reachable from public networks.  \n2. Use gluster auth.allow and auth.reject.  \n3. Use TLS certificates to authenticate gluster clients.\n\ncaveat: This does not protect from attacks by authenticated gluster clients.",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "glusterfs: I/O to arbitrary devices on storage server"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10926",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2018-07-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1613143"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in RPC request using gfs3_mknod_req supported by glusterfs server. An authenticated attacker could use this flaw to write files to an arbitrary location via path traversal and execute arbitrary code on a glusterfs server node.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: Device files can be created in arbitrary locations",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there.\n\nThis flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network. For Red Hat Virtualization, Product Security has rated this flaw as Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10926"
        },
        {
          "category": "external",
          "summary": "RHBZ#1613143",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1613143"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10926",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10926"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10926",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10926"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        },
        {
          "category": "workaround",
          "details": "To limit exposure of gluster server nodes :  \n\n1. gluster server should be on LAN and not reachable from public networks.  \n2. Use gluster auth.allow and auth.reject.  \n3. Use TLS certificates to authenticate gluster clients.\n\ncaveat: This does not protect from attacks by authenticated gluster clients.",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "glusterfs: Device files can be created in arbitrary locations"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10927",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2018-07-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1612658"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: File status information leak and denial of service",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there.\n\nThis flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network. For Red Hat Virtualization, Product Security has rated this flaw as Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10927"
        },
        {
          "category": "external",
          "summary": "RHBZ#1612658",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612658"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10927",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10927"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10927",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10927"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        },
        {
          "category": "workaround",
          "details": "To limit exposure of gluster server nodes :  \n\n1. gluster server should be on LAN and not reachable from public networks.  \n2. Use gluster auth.allow and auth.reject.  \n3. Use TLS certificates to authenticate gluster clients.\n\ncaveat: This does not protect from attacks by authenticated gluster clients.",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "glusterfs: File status information leak and denial of service"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10928",
      "cwe": {
        "id": "CWE-59",
        "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
      },
      "discovery_date": "2018-07-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1612659"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in RPC request using gfs3_symlink_req in glusterfs server which allows symlink destinations to point to file paths outside of the gluster volume. An authenticated attacker could use this flaw to create arbitrary symlinks pointing anywhere on the server and execute arbitrary code on glusterfs server nodes.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: Improper resolution of symlinks allows for privilege escalation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there.\n\nThis flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network. For Red Hat Virtualization, Product Security has rated this flaw as Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10928"
        },
        {
          "category": "external",
          "summary": "RHBZ#1612659",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612659"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10928",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10928"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10928",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10928"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        },
        {
          "category": "workaround",
          "details": "To limit exposure of gluster server nodes :  \n\n1. gluster server should be on LAN and not reachable from public networks.  \n2. Use gluster auth.allow and auth.reject.  \n3. Use TLS certificates to authenticate gluster clients.\n\ncaveat: This does not protect from attacks by authenticated gluster clients.",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "glusterfs: Improper resolution of symlinks allows for privilege escalation"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10929",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2018-07-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1612660"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in RPC request using gfs2_create_req in glusterfs server. An authenticated attacker could use this flaw to create arbitrary files and execute arbitrary code on glusterfs server nodes.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there.\n\nThis flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network. For Red Hat Virtualization, Product Security has rated this flaw as Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10929"
        },
        {
          "category": "external",
          "summary": "RHBZ#1612660",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612660"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10929",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10929"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10929",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10929"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        },
        {
          "category": "workaround",
          "details": "To limit exposure of gluster server nodes :  \n\n1. gluster server should be on LAN and not reachable from public networks.  \n2. Use gluster auth.allow and auth.reject.  \n3. Use TLS certificates to authenticate gluster clients.\n\ncaveat: This does not protect from attacks by authenticated gluster clients.",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "glusterfs: Arbitrary file creation on storage server allows for execution of arbitrary code"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Michael Hanselmann"
          ],
          "organization": "hansmi.ch"
        }
      ],
      "cve": "CVE-2018-10930",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2018-07-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1612664"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in RPC request using gfs3_rename_req in glusterfs server. An authenticated attacker could use this flaw to write to a destination outside the gluster volume.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "glusterfs: Files can be renamed outside volume",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue did not affect Red Hat Enterprise Linux 6 and 7 as the flaw is present in glusterfs-server, which is not shipped there.\n\nThis flaw affects glusterfs versions included in Red Hat Virtualization 4 Hypervisor. However, in recommended configurations, the vulnerability is only exposed to hypervisor administrators and can not be exploited from virtual machines or other hosts on the network. For Red Hat Virtualization, Product Security has rated this flaw as Moderate. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
          "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
          "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
          "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
          "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2018-10930"
        },
        {
          "category": "external",
          "summary": "RHBZ#1612664",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1612664"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2018-10930",
          "url": "https://www.cve.org/CVERecord?id=CVE-2018-10930"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-10930",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10930"
        }
      ],
      "release_date": "2018-09-04T05:30:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2018-09-04T06:24:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2018:2607"
        },
        {
          "category": "workaround",
          "details": "To limit exposure of gluster server nodes :  \n\n1. gluster server should be on LAN and not reachable from public networks.  \n2. Use gluster auth.allow and auth.reject.  \n3. Use TLS certificates to authenticate gluster clients.\n\ncaveat: This does not protect from attacks by authenticated gluster clients.",
          "product_ids": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:glusterfs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-api-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-cli-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-client-xlators-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-debuginfo-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-devel-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-events-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-fuse-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-ganesha-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-geo-replication-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-libs-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-rdma-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:glusterfs-resource-agents-0:3.12.2-18.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:glusterfs-server-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:python2-gluster-0:3.12.2-18.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.src",
            "7Server-RH-Gluster-3.4-Server:redhat-release-server-0:7.5-11.el7rhgs.x86_64",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.noarch",
            "7Server-RH-Gluster-3.4-Server:redhat-storage-server-0:3.4.0.0-1.el7rhgs.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHEV-4-Agents-7:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHEV-4-Agents-7:python2-gluster-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.src",
            "7Server-RHSClient:glusterfs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-api-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-cli-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-client-xlators-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-debuginfo-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-devel-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-fuse-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-libs-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:glusterfs-rdma-0:3.12.2-18.el7.x86_64",
            "7Server-RHSClient:python2-gluster-0:3.12.2-18.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "glusterfs: Files can be renamed outside volume"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…