Show plain JSON{"affected_release": [{"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3:client:el6", "package": "glusterfs-0:3.7.1-16.el6", "product_name": "Native Client for RHEL 6 for Red Hat Storage", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3:client:el7", "package": "glusterfs-0:3.7.1-16.el7", "product_name": "Native Client for RHEL 7 for Red Hat Storage", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "gdeploy-0:1.0-12.el6rhs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "glusterfs-0:3.7.1-16.el6rhs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "gluster-nagios-addons-0:0.2.5-1.el6rhs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "gluster-nagios-common-0:0.2.2-1.el6rhs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "gstatus-0:0.65-1.el6rhs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "nagios-server-addons-0:0.2.2-1.el6rhs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "nfs-ganesha-0:2.2.0-9.el6rhs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "openstack-swift-0:1.13.1-6.el6ost", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "redhat-storage-server-0:3.1.1.0-2.el6rhs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "swiftonfile-0:1.13.1-5.el6rhs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1845", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el6", "package": "vdsm-0:4.16.20-1.3.el6rhs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 6", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "gdeploy-0:1.0-12.el7rhgs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "glusterfs-0:3.7.1-16.el7rhgs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "gluster-nagios-addons-0:0.2.5-1.el7rhgs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "gluster-nagios-common-0:0.2.2-1.el7rhgs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "gstatus-0:0.65-1.el7rhgs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "nagios-server-addons-0:0.2.2-1.el7rhgs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "nfs-ganesha-0:2.2.0-9.el7rhgs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "openstack-swift-0:1.13.1-6.el7ost", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "redhat-storage-server-0:3.1.1.0-2.el7rhgs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "swiftonfile-0:1.13.1-5.el7rhgs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/a:redhat:storage:3.1:nfs:el7", "package": "vdsm-0:4.16.20-1.3.el7rhgs", "product_name": "Red Hat Gluster Storage 3.1 for RHEL 7", "release_date": "2015-10-05T00:00:00Z"}, {"advisory": "RHSA-2015:1846", "cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor", "package": "glusterfs-0:3.7.1-16.el7", "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 7", "release_date": "2015-10-05T00:00:00Z"}], "bugzilla": {"description": "gluster-swift metadata constraints are not correctly enforced", "id": "1257525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257525"}, "csaw": false, "cvss": {"cvss_base_score": "4.0", "cvss_scoring_vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "status": "verified"}, "details": ["The Red Hat gluster-swift package, as used in Red Hat Gluster Storage (formerly Red Hat Storage Server), allows remote authenticated users to bypass the max_meta_count constraint via multiple crafted requests which exceed the limit when combined.", "A flaw was found in the metadata constraints in Red Hat Gluster Storage's OpenStack Object Storage (swiftonfile). By adding metadata in several separate calls, a malicious user could bypass the max_meta_count constraint, and store more metadata than allowed by the configuration."], "name": "CVE-2014-8177", "public_date": "2015-08-21T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2014-8177\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-8177"], "threat_severity": "Moderate"}