Security Advisory Low: Red Hat Storage 2.0 security, bug fix, and enhancement update #6

Advisory: RHSA-2013:1205-1
Type: Security Advisory
Severity: Low
Issued on: 2013-09-04
Last updated on: 2013-09-04
Affected Products: Red Hat Storage Server 2.0
CVEs ( CVE-2013-4157


Updated Red Hat Storage 2.0 packages that fix multiple security issues,
various bugs, and add one enhancement are now available.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Red Hat Storage is a software only, scale-out storage solution that
provides flexible and agile unstructured data storage for the enterprise.

Multiple insecure temporary file creation flaws were found in Red Hat
Storage server. A local user on the Red Hat Storage server could use these
flaws to cause arbitrary files to be overwritten as the root user via a
symbolic link attack. (CVE-2013-4157)

These issues were discovered by Gowrishankar Rajaiyan of Red Hat and Kurt
Seifried of the Red Hat Security Response Team.

This update also fixes the following bugs:

* Previously, rolling upgrades on a volume caused some processes to abort
which led to a possible corruption of the volume. Yum update aborts with a
message to stop the volume during an update. Now, with this update rolling
upgrades is not supported and it is mandatory to stop the volume before any
'yum update'. (BZ#998649)

* Installing or upgrading the gluster-swift-plugin RPM overwrites
/etc/swift configuration files. Hence, the customer configuration is
overwritten, causing data unavailability. Now, the RPM installs or upgrades
new configuration files with a non-conflicting extension and customer
configuration files are not overwritten, maintaining data availability.
(BZ#997940, BZ#1000423)

This update also adds the following enhancement:

* A new upgrade script has been added. When Red Hat Storage Server 2.1 is
released, this script will help users upgrade and resubscribe their
Red Hat Storage Server 2.0 Update 6 systems to Red Hat Storage Server 2.1.

All users of Red Hat Storage are advised to upgrade to these updated


Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

Updated packages

Red Hat Storage Server 2.0

appliance-     MD5: 15263a6c15c5c1891565963348687ad6
SHA-256: de11d3813c2ef8dedafe9a492b590fc09b574771dc8c73ce2e747b16d64cb115
gluster-swift-plugin-1.0-7.src.rpm     MD5: f3e09af147c1434c9f0f47c0e6dca3c7
SHA-256: 3df58a6fdeace2a1d30d38bd3a6a3ad384bb5ff1bd5b8e3adbe1ae6d33ce074c
glusterfs-     MD5: f31ea47147cb03010e65adbe4f5653b3
SHA-256: 7afdddb0e5433a2ffe5eba1ce5357468f996323e2669bcaf9d735666602b41fc
appliance-base-     MD5: a5e6b58ca258d0f1346bc2c225d42e9c
SHA-256: a32ac258b6f47ca27dbb0f4d91a804e2cd5c35004944bff3200748acb9565d77
gluster-swift-plugin-1.0-7.noarch.rpm     MD5: bdcfa6cf6b0096392a18cb4a9b6c52dd
SHA-256: 625e2f5ea373fd5ec000c2599f92fbc742eae602ff94f02cadfb778fced6ef07
glusterfs-     MD5: 6156e98fa38c2a298b0fcc2224d71604
SHA-256: 76bb30e0ac212bb47453786dfa496231757f68dbf45b12794d8fe2f337321ae5
glusterfs-debuginfo-     MD5: a81a9d7f6e0ab40828f1353c8583013c
SHA-256: 70389444ae9cfb7c0bd95df0b6a62d4f84222ed6dd59aed350c4df35fb058d56
glusterfs-devel-     MD5: 7c043124ea54e17c286083df3288bc3a
SHA-256: 86d31bf4cc4e8bb50cbc62b0f4568efbd6a342b56bfd19246755ea1770d6860d
glusterfs-fuse-     MD5: 0c0de5f48004c32aafc6634b138bc841
SHA-256: 0b9b0999405fe86fcbda431061f6288b65311207a4c805ccd7f48b3c5daf4f80
glusterfs-geo-replication-     MD5: 064d64cb00bac59247d70542be8a5fd1
SHA-256: 69aecd357348f7a7aff4087d305942f229b01eb23964198b0742180020df3e2d
glusterfs-rdma-     MD5: c4d1937756555ddfe6ffda91c473bd46
SHA-256: bdb413c63c0721bc2db8a05a09e470869e4100e516bde2dabf01f6136b045a80
glusterfs-server-     MD5: 9dc423789e9bbe2bdf19179b59272cd2
SHA-256: aa6f204a410410aef6e2380f04e9228d1c1af8a4be1923518af31a60ac8610db
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1000423 - Upgrade from RHS2.0-U5 to U6 results in broken gluster-swift services, it gives 503 for every request
986516 - CVE-2013-4157 Red Hat Storage Server 2.0: appliance-base / redhat-storage-server /tmp file creation vuln
997940 - Inclusion of gluster-swift gluster-swift-plugin-1.0-6 package needed


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at