Show plain JSON{"acknowledgement": "Red Hat would like to thank qinghao tang (Qihoo 360 Technology) for reporting this issue.", "affected_release": [{"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:2:client:el5", "package": "glusterfs-0:3.6.0.42-1.el5", "product_name": "Native Client for RHEL 5 for Red Hat Storage", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:client:el6", "package": "glusterfs-0:3.6.0.42-1.el6", "product_name": "Native Client for RHEL 6 for Red Hat Storage", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0040", "cpe": "cpe:/a:redhat:rhel_common:7::el7", "package": "glusterfs-0:3.6.0.42-1.el7", "product_name": "Red Hat Common for RHEL 7", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "glusterfs-0:3.6.0.42-1.el6rhs", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "gluster-nagios-addons-0:0.1.14-1.el6rhs", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "gluster-nagios-common-0:0.1.4-1.el6rhs", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "gstatus-0:0.62-1.el6rhs", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "openstack-swift-0:1.13.1-2.el6ost", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "openstack-swift-plugin-swift3-0:1.7-3.el6ost", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "python-paste-deploy-0:1.5.0-10.el6ost", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "python-swiftclient-0:2.1.0-2.el6ost", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "redhat-storage-server-0:3.0.3.4-1.el6rhs", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "samba-0:3.6.509-169.4.el6rhs", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "swiftonfile-0:1.13.1-2.el6rhs", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}, {"advisory": "RHBA-2015:0038", "cpe": "cpe:/a:redhat:storage:3:nagios:el6", "package": "vdsm-0:4.14.7.3-1.el6rhs", "product_name": "Red Hat Storage 3 for RHEL 6", "release_date": "2015-01-15T00:00:00Z"}], "bugzilla": {"description": "glusterfs: fragment header infinite loop DoS", "id": "1138145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138145"}, "csaw": false, "cvss": {"cvss_base_score": "5.0", "cvss_scoring_vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "status": "verified"}, "cwe": "CWE-835", "details": ["The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a \"00000000\" fragment header.", "A denial of service flaw was found in the way the __socket_proto_state_machine() function of glusterfs processed certain fragment headers. A remote attacker could send a specially crafted fragment header that, when processed, would cause the glusterfs process to enter an infinite loop."], "name": "CVE-2014-3619", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:5", "fix_state": "Affected", "package_name": "glusterfs", "product_name": "Red Hat Enterprise Linux 5"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Affected", "package_name": "glusterfs", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Affected", "package_name": "glusterfs", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/a:redhat:storage:2.1", "fix_state": "Will not fix", "package_name": "glusterfs", "product_name": "Red Hat Storage 2.1"}], "public_date": "2014-09-12T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2014-3619\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-3619"], "statement": "Red Hat Storage 2.1 receives only qualified Important and Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Support Matrix:\nhttps://access.redhat.com/support/policy/updates/rhs", "threat_severity": "Moderate"}