Vulnerabilities > CVE-2014-3619 - Resource Management Errors vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

Vulnerable Configurations

Part Description Count
OS
Opensuse
1
Application
Gluster
1

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2015-211.NASL
    descriptionUpdated glusterfs packages fix security vulnerability : glusterfs was vulnerable to a fragment header infinite loop denial of service attack (CVE-2014-3619). Also, the glusterfsd SysV init script was failing to properly start the service. This was fixed by replacing it with systemd unit files for the service that work properly (mga#14049).
    last seen2020-06-01
    modified2020-06-02
    plugin id83103
    published2015-04-28
    reporterThis script is Copyright (C) 2015-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/83103
    titleMandriva Linux Security Advisory : glusterfs (MDVSA-2015:211)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandriva Linux Security Advisory MDVSA-2015:211. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(83103);
      script_version("2.3");
      script_cvs_date("Date: 2019/08/02 13:32:57");
    
      script_cve_id("CVE-2014-3619");
      script_xref(name:"MDVSA", value:"2015:211");
    
      script_name(english:"Mandriva Linux Security Advisory : glusterfs (MDVSA-2015:211)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandriva Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated glusterfs packages fix security vulnerability :
    
    glusterfs was vulnerable to a fragment header infinite loop denial of
    service attack (CVE-2014-3619).
    
    Also, the glusterfsd SysV init script was failing to properly start
    the service. This was fixed by replacing it with systemd unit files
    for the service that work properly (mga#14049)."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://advisories.mageia.org/MGASA-2015-0145.html"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:glusterfs-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:glusterfs-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:glusterfs-geo-replication");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:glusterfs-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64glusterfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64glusterfs0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:business_server:2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/04/27");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/04/28");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"glusterfs-client-3.4.1-2.1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"glusterfs-common-3.4.1-2.1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"glusterfs-geo-replication-3.4.1-2.1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"glusterfs-server-3.4.1-2.1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64glusterfs-devel-3.4.1-2.1.mbs2")) flag++;
    if (rpm_check(release:"MDK-MBS2", cpu:"x86_64", reference:"lib64glusterfs0-3.4.1-2.1.mbs2")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-219.NASL
    descriptionglusterfs was updated to fix a fragment header infinite loop denial of service attack (CVE-2014-3619).
    last seen2020-06-05
    modified2015-03-12
    plugin id81763
    published2015-03-12
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81763
    titleopenSUSE Security Update : glusterfs (openSUSE-2015-219)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2015-219.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(81763);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2014-3619");
    
      script_name(english:"openSUSE Security Update : glusterfs (openSUSE-2015-219)");
      script_summary(english:"Check for the openSUSE-2015-219 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "glusterfs was updated to fix a fragment header infinite loop denial of
    service attack (CVE-2014-3619)."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=919879"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected glusterfs packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:glusterfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:glusterfs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:glusterfs-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:glusterfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfapi0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfapi0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfrpc0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfrpc0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfxdr0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfxdr0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libglusterfs0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libglusterfs0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/03/03");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/12");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE13.1", reference:"glusterfs-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"glusterfs-debuginfo-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"glusterfs-debugsource-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"glusterfs-devel-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libgfapi0-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libgfapi0-debuginfo-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libgfrpc0-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libgfrpc0-debuginfo-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libgfxdr0-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libgfxdr0-debuginfo-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libglusterfs0-3.4.0~qa9-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.1", reference:"libglusterfs0-debuginfo-3.4.0~qa9-2.4.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "glusterfs / glusterfs-debuginfo / glusterfs-debugsource / etc");
    }
    
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-241.NASL
    descriptionglusterfs was updated to fix a fragment header infinite loop denial of service attack (CVE-2014-3619).
    last seen2020-06-05
    modified2015-03-20
    plugin id81964
    published2015-03-20
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/81964
    titleopenSUSE Security Update : glusterfs (openSUSE-2015-241)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update openSUSE-2015-241.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(81964);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04");
    
      script_cve_id("CVE-2014-3619");
    
      script_name(english:"openSUSE Security Update : glusterfs (openSUSE-2015-241)");
      script_summary(english:"Check for the openSUSE-2015-241 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "glusterfs was updated to fix a fragment header infinite loop denial of
    service attack (CVE-2014-3619)."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.opensuse.org/show_bug.cgi?id=919879"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected glusterfs packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:glusterfs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:glusterfs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:glusterfs-debugsource");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:glusterfs-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfapi0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfapi0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfchangelog0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfchangelog0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfrpc0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfrpc0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfxdr0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libgfxdr0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libglusterfs0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libglusterfs0-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2015/03/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/03/20");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE13\.2)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.2", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE13.2", reference:"glusterfs-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"glusterfs-debuginfo-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"glusterfs-debugsource-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"glusterfs-devel-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libgfapi0-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libgfapi0-debuginfo-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libgfchangelog0-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libgfchangelog0-debuginfo-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libgfrpc0-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libgfrpc0-debuginfo-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libgfxdr0-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libgfxdr0-debuginfo-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libglusterfs0-3.5.2-2.4.1") ) flag++;
    if ( rpm_check(release:"SUSE13.2", reference:"libglusterfs0-debuginfo-3.5.2-2.4.1") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "glusterfs / glusterfs-debuginfo / glusterfs-debugsource / etc");
    }
    

Redhat

rpms
  • gluster-nagios-addons-0:0.1.14-1.el6rhs
  • gluster-nagios-addons-debuginfo-0:0.1.14-1.el6rhs
  • gluster-nagios-common-0:0.1.4-1.el6rhs
  • glusterfs-0:3.6.0.42-1.el5
  • glusterfs-0:3.6.0.42-1.el6
  • glusterfs-0:3.6.0.42-1.el6rhs
  • glusterfs-api-0:3.6.0.42-1.el5
  • glusterfs-api-0:3.6.0.42-1.el6
  • glusterfs-api-0:3.6.0.42-1.el6rhs
  • glusterfs-api-devel-0:3.6.0.42-1.el5
  • glusterfs-api-devel-0:3.6.0.42-1.el6
  • glusterfs-api-devel-0:3.6.0.42-1.el6rhs
  • glusterfs-cli-0:3.6.0.42-1.el6rhs
  • glusterfs-debuginfo-0:3.6.0.42-1.el5
  • glusterfs-debuginfo-0:3.6.0.42-1.el6
  • glusterfs-debuginfo-0:3.6.0.42-1.el6rhs
  • glusterfs-devel-0:3.6.0.42-1.el5
  • glusterfs-devel-0:3.6.0.42-1.el6
  • glusterfs-devel-0:3.6.0.42-1.el6rhs
  • glusterfs-fuse-0:3.6.0.42-1.el5
  • glusterfs-fuse-0:3.6.0.42-1.el6
  • glusterfs-fuse-0:3.6.0.42-1.el6rhs
  • glusterfs-geo-replication-0:3.6.0.42-1.el6rhs
  • glusterfs-libs-0:3.6.0.42-1.el5
  • glusterfs-libs-0:3.6.0.42-1.el6
  • glusterfs-libs-0:3.6.0.42-1.el6rhs
  • glusterfs-rdma-0:3.6.0.42-1.el5
  • glusterfs-rdma-0:3.6.0.42-1.el6
  • glusterfs-rdma-0:3.6.0.42-1.el6rhs
  • glusterfs-server-0:3.6.0.42-1.el6rhs
  • gstatus-0:0.62-1.el6rhs
  • gstatus-debuginfo-0:0.62-1.el6rhs
  • libsmbclient-0:3.6.509-169.4.el6rhs
  • libsmbclient-devel-0:3.6.509-169.4.el6rhs
  • openstack-swift-0:1.13.1-2.el6ost
  • openstack-swift-account-0:1.13.1-2.el6ost
  • openstack-swift-container-0:1.13.1-2.el6ost
  • openstack-swift-doc-0:1.13.1-2.el6ost
  • openstack-swift-object-0:1.13.1-2.el6ost
  • openstack-swift-plugin-swift3-0:1.7-3.el6ost
  • openstack-swift-proxy-0:1.13.1-2.el6ost
  • python-paste-deploy-0:1.5.0-10.el6ost
  • python-swiftclient-0:2.1.0-2.el6ost
  • python-swiftclient-doc-0:2.1.0-2.el6ost
  • redhat-storage-server-0:3.0.3.4-1.el6rhs
  • samba-0:3.6.509-169.4.el6rhs
  • samba-client-0:3.6.509-169.4.el6rhs
  • samba-common-0:3.6.509-169.4.el6rhs
  • samba-debuginfo-0:3.6.509-169.4.el6rhs
  • samba-doc-0:3.6.509-169.4.el6rhs
  • samba-domainjoin-gui-0:3.6.509-169.4.el6rhs
  • samba-glusterfs-0:3.6.509-169.4.el6rhs
  • samba-swat-0:3.6.509-169.4.el6rhs
  • samba-winbind-0:3.6.509-169.4.el6rhs
  • samba-winbind-clients-0:3.6.509-169.4.el6rhs
  • samba-winbind-devel-0:3.6.509-169.4.el6rhs
  • samba-winbind-krb5-locator-0:3.6.509-169.4.el6rhs
  • swiftonfile-0:1.13.1-2.el6rhs
  • vdsm-0:4.14.7.3-1.el6rhs
  • vdsm-api-0:4.14.7.3-1.el6rhs
  • vdsm-cli-0:4.14.7.3-1.el6rhs
  • vdsm-debug-plugin-0:4.14.7.3-1.el6rhs
  • vdsm-debuginfo-0:4.14.7.3-1.el6rhs
  • vdsm-gluster-0:4.14.7.3-1.el6rhs
  • vdsm-hook-faqemu-0:4.14.7.3-1.el6rhs
  • vdsm-hook-openstacknet-0:4.14.7.3-1.el6rhs
  • vdsm-hook-qemucmdline-0:4.14.7.3-1.el6rhs
  • vdsm-jsonrpc-0:4.14.7.3-1.el6rhs
  • vdsm-python-0:4.14.7.3-1.el6rhs
  • vdsm-python-zombiereaper-0:4.14.7.3-1.el6rhs
  • vdsm-reg-0:4.14.7.3-1.el6rhs
  • vdsm-tests-0:4.14.7.3-1.el6rhs
  • vdsm-xmlrpc-0:4.14.7.3-1.el6rhs
  • vdsm-yajsonrpc-0:4.14.7.3-1.el6rhs
  • glusterfs-0:3.6.0.42-1.el7
  • glusterfs-api-0:3.6.0.42-1.el7
  • glusterfs-api-devel-0:3.6.0.42-1.el7
  • glusterfs-debuginfo-0:3.6.0.42-1.el7
  • glusterfs-devel-0:3.6.0.42-1.el7
  • glusterfs-fuse-0:3.6.0.42-1.el7
  • glusterfs-libs-0:3.6.0.42-1.el7
  • glusterfs-rdma-0:3.6.0.42-1.el7