First published: Thu Aug 27 2015(Updated: )
Description: A flaw was found in the metadata constraints in gluster-swift package. By adding metadata in several separate calls, a malicious user could bypass the max_meta_count constraint, and store more metadata than allowed by the configuration. References: <a href="http://seclists.org/oss-sec/2015/q3/448">http://seclists.org/oss-sec/2015/q3/448</a> <a href="https://review.openstack.org/#/c/215487">https://review.openstack.org/#/c/215487</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Gluster Storage Management Console | =3.1 | |
Redhat Gluster Storage Server | =3.1 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Storage Native Client | ||
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.