Red Hat Storage 2.0 allows local users to overwrite arbitrary files via a symlink attack on the (1) e, (2) local-bricks.list, (3) bricks.err, or (4) limits.conf files in /tmp.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Storage_server | Redhat | 2.0 (including) | 2.0 (including) |
| Red Hat Storage 2.0 | RedHat | appliance-0:2.0.6.0-2.el6rhs | * |
| Red Hat Storage 2.0 | RedHat | glusterfs-0:3.3.0.14rhs-1.el6rhs | * |
| Red Hat Storage 2.0 | RedHat | gluster-swift-plugin-0:1.0-7 | * |