Action not permitted
Modal body text goes here.
CVE-2013-4238
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2013:1582", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1582.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "openSUSE-SU-2013:1463", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" }, { "name": "openSUSE-SU-2013:1440", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "DSA-2880", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2880" }, { "name": "USN-1982-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1982-1" }, { "name": "openSUSE-SU-2013:1437", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "openSUSE-SU-2013:1462", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" }, { "name": "openSUSE-SU-2013:1438", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.python.org/issue18709" }, { "name": "openSUSE-SU-2013:1439", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" }, { "name": "openSUSE-SU-2020:0086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-21T21:06:34", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2013:1582", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1582.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "openSUSE-SU-2013:1463", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" }, { "name": "openSUSE-SU-2013:1440", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "DSA-2880", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2880" }, { "name": "USN-1982-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1982-1" }, { "name": "openSUSE-SU-2013:1437", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "openSUSE-SU-2013:1462", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" }, { "name": "openSUSE-SU-2013:1438", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.python.org/issue18709" }, { "name": "openSUSE-SU-2013:1439", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" }, { "name": "openSUSE-SU-2020:0086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4238", "datePublished": "2013-08-18T01:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-4238\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-08-18T02:52:22.943\",\"lastModified\":\"2019-10-25T11:53:59.117\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n ssl.match_hostname en el m\u00f3dulo SSL en Python v2.6 hasta v3.4 no manejar adecuadamente un car\u00e1cter \u201c\\\\0\u201d en un nombre de dominio en el campo Subject Alternative Name de un certificado X.509, lo que permite a atacantes \\\"man-in-the-middle\\\" suplantar servidores SSL de su elecci\u00f3n mediante un certificado manipulado expedido por una Autoridad Certificadora leg\u00edtima, un problema relacionado con CVE-2009-2408\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"7118F616-25CA-4E34-AA13-4D14BB62419F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"244740D0-CACA-4607-964C-F0F46153653D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA3487C5-05AD-4553-B123-45F0A51BBA3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"486AB201-5BE7-4947-B18B-DA8F86E5D626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E852D2C6-D744-4311-97B3-CAEF073D6585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"845FBD14-4175-49F1-B762-4F550CEF5B0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E7646B-BC7C-4ED6-925B-268291F31610\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CD6B328-E333-48C3-B2CC-41EC95321B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C22EAA6-B771-46C3-A0B8-E342493E1F77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.6.2150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BAEB1E3-E3E6-4807-A2FF-ACD2F4356E39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.6.6150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92FF153A-69D5-444F-8FB3-78BF1C33F209\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CE2063E-5B74-4731-885F-80D2D7B15604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC647F82-9679-4B26-AFF1-1B43B0AF18B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"046BCC55-F166-4C31-AB2B-815A0DFA2BEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A3CABCB-9FA8-4B13-8CF1-AA89B9E9B7E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D00809F-8D47-428E-9347-2BF36A61901A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:x64:*\",\"matchCriteriaId\":\"14EF3E9D-8F0D-40C4-A171-866D091CB531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC94B908-E405-4BD2-BE36-2BB90238F7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC0C702F-59E0-40AB-BA95-8F0803AB0550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3190C547-7230-476C-A43F-641FE7B891EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74AC7EE5-F01D-4F28-80D1-4076B7B24BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B547525-E0DB-4D64-8ED1-AF3F1B6FF65F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19064C18-1CD7-4F10-8065-4B900BB31F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1997CB6-FD72-4B13-915A-7500AA06F4B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06A1811C-4E97-4226-8335-ADF0827A03B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF2C50D1-187B-4E98-BA02-008D0ED4C220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.1.2150:*:*:*:*:*:x64:*\",\"matchCriteriaId\":\"9EB9683A-EE1C-4EB6-BF27-39A274B37D3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87845E79-F4A3-4390-9ACF-A14E86BCDB10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C8F3C4-91AB-4AE3-A2FB-A093F97742FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"027FD902-9B08-4EDF-9F83-314FBF0583ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.2.2150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F236E583-D23D-4769-8A25-EBFC930E4798\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF7665B-3A10-46D1-B486-AFC9ED6C0B8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.3:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E2DAB9D-5D7D-40ED-8110-E3FDF7AE0729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:python:3.4:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B567FD3B-10F2-45DF-BC50-04316DF15113\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE554781-1EB9-446E-911F-6C11970C47F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806A17E-B8F9-466D-807D-3F1E77603DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"}]}]}],\"references\":[{\"url\":\"http://bugs.python.org/issue18709\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1582.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2014/Dec/23\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2880\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/534161/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1982-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0012.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=996381\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]}]}}" } }
rhsa-2013_1582
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated python packages that fix one security issue, several bugs, and add\none enhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Python is an interpreted, interactive, object-oriented programming\nlanguage.\n\nA flaw was found in the way the Python SSL module handled X.509 certificate\nfields that contain a NULL byte. An attacker could potentially exploit this\nflaw to conduct man-in-the-middle attacks to spoof SSL servers. Note that\nto exploit this issue, an attacker would need to obtain a carefully crafted\ncertificate signed by an authority that the client trusts. (CVE-2013-4238)\n\nThese updated python packages include numerous bug fixes and one\nenhancement. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 6.5 Technical\nNotes, linked to in the References, for information on the most significant\nof these changes.\n\nAll users of python are advised to upgrade to these updated packages, which\nfix these issues and add this enhancement.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1582", "url": "https://access.redhat.com/errata/RHSA-2013:1582" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.5_Technical_Notes/python.html#RHSA-2013-1582", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.5_Technical_Notes/python.html#RHSA-2013-1582" }, { "category": "external", "summary": "521898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521898" }, { "category": "external", "summary": "841937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841937" }, { "category": "external", "summary": "845802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845802" }, { "category": "external", "summary": "893034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=893034" }, { "category": "external", "summary": "919163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=919163" }, { "category": "external", "summary": "928390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928390" }, { "category": "external", "summary": "948025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=948025" }, { "category": "external", "summary": "958868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=958868" }, { "category": "external", "summary": "960168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=960168" }, { "category": "external", "summary": "978129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=978129" }, { "category": "external", "summary": "996381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1582.json" } ], "title": "Red Hat Security Advisory: python security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-05T18:14:37+00:00", "generator": { "date": "2024-11-05T18:14:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2013:1582", "initial_release_date": "2013-11-20T16:37:00+00:00", "revision_history": [ { "date": "2013-11-20T16:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-11-20T16:39:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:14:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-tools-0:2.6.6-51.el6.i686", "product": { "name": "python-tools-0:2.6.6-51.el6.i686", "product_id": "python-tools-0:2.6.6-51.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.6.6-51.el6?arch=i686" } } }, { "category": "product_version", "name": "python-test-0:2.6.6-51.el6.i686", "product": { "name": "python-test-0:2.6.6-51.el6.i686", "product_id": "python-test-0:2.6.6-51.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-test@2.6.6-51.el6?arch=i686" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.6.6-51.el6.i686", "product": { "name": "python-debuginfo-0:2.6.6-51.el6.i686", "product_id": "python-debuginfo-0:2.6.6-51.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.6.6-51.el6?arch=i686" } } }, { "category": "product_version", "name": "python-devel-0:2.6.6-51.el6.i686", "product": { "name": "python-devel-0:2.6.6-51.el6.i686", "product_id": "python-devel-0:2.6.6-51.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.6.6-51.el6?arch=i686" } } }, { "category": "product_version", "name": "python-0:2.6.6-51.el6.i686", "product": { "name": "python-0:2.6.6-51.el6.i686", "product_id": "python-0:2.6.6-51.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.6.6-51.el6?arch=i686" } } }, { "category": "product_version", "name": "python-libs-0:2.6.6-51.el6.i686", "product": { "name": "python-libs-0:2.6.6-51.el6.i686", "product_id": "python-libs-0:2.6.6-51.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-libs@2.6.6-51.el6?arch=i686" } } }, { "category": "product_version", "name": "tkinter-0:2.6.6-51.el6.i686", "product": { "name": "tkinter-0:2.6.6-51.el6.i686", "product_id": "tkinter-0:2.6.6-51.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.6.6-51.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "python-tools-0:2.6.6-51.el6.x86_64", "product": { "name": "python-tools-0:2.6.6-51.el6.x86_64", "product_id": "python-tools-0:2.6.6-51.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.6.6-51.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-test-0:2.6.6-51.el6.x86_64", "product": { "name": "python-test-0:2.6.6-51.el6.x86_64", "product_id": "python-test-0:2.6.6-51.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-test@2.6.6-51.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.6.6-51.el6.x86_64", "product": { "name": "python-debuginfo-0:2.6.6-51.el6.x86_64", "product_id": "python-debuginfo-0:2.6.6-51.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.6.6-51.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-0:2.6.6-51.el6.x86_64", "product": { "name": "python-0:2.6.6-51.el6.x86_64", "product_id": "python-0:2.6.6-51.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.6.6-51.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-devel-0:2.6.6-51.el6.x86_64", "product": { "name": "python-devel-0:2.6.6-51.el6.x86_64", "product_id": "python-devel-0:2.6.6-51.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.6.6-51.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-libs-0:2.6.6-51.el6.x86_64", "product": { "name": "python-libs-0:2.6.6-51.el6.x86_64", "product_id": "python-libs-0:2.6.6-51.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-libs@2.6.6-51.el6?arch=x86_64" } } }, { "category": "product_version", "name": "tkinter-0:2.6.6-51.el6.x86_64", "product": { "name": "tkinter-0:2.6.6-51.el6.x86_64", "product_id": "tkinter-0:2.6.6-51.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.6.6-51.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-0:2.6.6-51.el6.src", "product": { "name": "python-0:2.6.6-51.el6.src", "product_id": "python-0:2.6.6-51.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.6.6-51.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-0:2.6.6-51.el6.s390x", "product": { "name": "python-0:2.6.6-51.el6.s390x", "product_id": "python-0:2.6.6-51.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.6.6-51.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.6.6-51.el6.s390x", "product": { "name": "python-debuginfo-0:2.6.6-51.el6.s390x", "product_id": "python-debuginfo-0:2.6.6-51.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.6.6-51.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-devel-0:2.6.6-51.el6.s390x", "product": { "name": "python-devel-0:2.6.6-51.el6.s390x", "product_id": "python-devel-0:2.6.6-51.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.6.6-51.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-libs-0:2.6.6-51.el6.s390x", "product": { "name": "python-libs-0:2.6.6-51.el6.s390x", "product_id": "python-libs-0:2.6.6-51.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-libs@2.6.6-51.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-tools-0:2.6.6-51.el6.s390x", "product": { "name": "python-tools-0:2.6.6-51.el6.s390x", "product_id": "python-tools-0:2.6.6-51.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.6.6-51.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-test-0:2.6.6-51.el6.s390x", "product": { "name": "python-test-0:2.6.6-51.el6.s390x", "product_id": "python-test-0:2.6.6-51.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-test@2.6.6-51.el6?arch=s390x" } } }, { "category": "product_version", "name": "tkinter-0:2.6.6-51.el6.s390x", "product": { "name": "tkinter-0:2.6.6-51.el6.s390x", "product_id": "tkinter-0:2.6.6-51.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.6.6-51.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-0:2.6.6-51.el6.ppc64", "product": { "name": "python-0:2.6.6-51.el6.ppc64", "product_id": "python-0:2.6.6-51.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python@2.6.6-51.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-debuginfo-0:2.6.6-51.el6.ppc64", "product": { "name": "python-debuginfo-0:2.6.6-51.el6.ppc64", "product_id": "python-debuginfo-0:2.6.6-51.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debuginfo@2.6.6-51.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-devel-0:2.6.6-51.el6.ppc64", "product": { "name": "python-devel-0:2.6.6-51.el6.ppc64", "product_id": "python-devel-0:2.6.6-51.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-devel@2.6.6-51.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-libs-0:2.6.6-51.el6.ppc64", "product": { "name": "python-libs-0:2.6.6-51.el6.ppc64", "product_id": "python-libs-0:2.6.6-51.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-libs@2.6.6-51.el6?arch=ppc64" } } }, { "category": "product_version", "name": "tkinter-0:2.6.6-51.el6.ppc64", "product": { "name": "tkinter-0:2.6.6-51.el6.ppc64", "product_id": "tkinter-0:2.6.6-51.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tkinter@2.6.6-51.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-tools-0:2.6.6-51.el6.ppc64", "product": { "name": "python-tools-0:2.6.6-51.el6.ppc64", "product_id": "python-tools-0:2.6.6-51.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tools@2.6.6-51.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-test-0:2.6.6-51.el6.ppc64", "product": { "name": "python-test-0:2.6.6-51.el6.ppc64", "product_id": "python-test-0:2.6.6-51.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-test@2.6.6-51.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-0:2.6.6-51.el6.i686" }, "product_reference": "python-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-0:2.6.6-51.el6.s390x" }, "product_reference": "python-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-0:2.6.6-51.el6.src" }, "product_reference": "python-0:2.6.6-51.el6.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-debuginfo-0:2.6.6-51.el6.i686" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-debuginfo-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-debuginfo-0:2.6.6-51.el6.s390x" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-debuginfo-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-devel-0:2.6.6-51.el6.i686" }, "product_reference": "python-devel-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-devel-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-devel-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-devel-0:2.6.6-51.el6.s390x" }, "product_reference": "python-devel-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-devel-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-devel-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-libs-0:2.6.6-51.el6.i686" }, "product_reference": "python-libs-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-libs-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-libs-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-libs-0:2.6.6-51.el6.s390x" }, "product_reference": "python-libs-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-libs-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-libs-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-test-0:2.6.6-51.el6.i686" }, "product_reference": "python-test-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-test-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-test-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-test-0:2.6.6-51.el6.s390x" }, "product_reference": "python-test-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-test-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-test-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-tools-0:2.6.6-51.el6.i686" }, "product_reference": "python-tools-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-tools-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-tools-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-tools-0:2.6.6-51.el6.s390x" }, "product_reference": "python-tools-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-tools-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-tools-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tkinter-0:2.6.6-51.el6.i686" }, "product_reference": "tkinter-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tkinter-0:2.6.6-51.el6.ppc64" }, "product_reference": "tkinter-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tkinter-0:2.6.6-51.el6.s390x" }, "product_reference": "tkinter-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tkinter-0:2.6.6-51.el6.x86_64" }, "product_reference": "tkinter-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-0:2.6.6-51.el6.i686" }, "product_reference": "python-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-0:2.6.6-51.el6.s390x" }, "product_reference": "python-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-0:2.6.6-51.el6.src" }, "product_reference": "python-0:2.6.6-51.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-debuginfo-0:2.6.6-51.el6.i686" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-debuginfo-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-debuginfo-0:2.6.6-51.el6.s390x" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-debuginfo-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-devel-0:2.6.6-51.el6.i686" }, "product_reference": "python-devel-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-devel-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-devel-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-devel-0:2.6.6-51.el6.s390x" }, "product_reference": "python-devel-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-devel-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-devel-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-libs-0:2.6.6-51.el6.i686" }, "product_reference": "python-libs-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-libs-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-libs-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-libs-0:2.6.6-51.el6.s390x" }, "product_reference": "python-libs-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-libs-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-libs-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-test-0:2.6.6-51.el6.i686" }, "product_reference": "python-test-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-test-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-test-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-test-0:2.6.6-51.el6.s390x" }, "product_reference": "python-test-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-test-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-test-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-tools-0:2.6.6-51.el6.i686" }, "product_reference": "python-tools-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-tools-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-tools-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-tools-0:2.6.6-51.el6.s390x" }, "product_reference": "python-tools-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-tools-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-tools-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:tkinter-0:2.6.6-51.el6.i686" }, "product_reference": "tkinter-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:tkinter-0:2.6.6-51.el6.ppc64" }, "product_reference": "tkinter-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:tkinter-0:2.6.6-51.el6.s390x" }, "product_reference": "tkinter-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:tkinter-0:2.6.6-51.el6.x86_64" }, "product_reference": "tkinter-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-0:2.6.6-51.el6.i686" }, "product_reference": "python-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-0:2.6.6-51.el6.s390x" }, "product_reference": "python-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-0:2.6.6-51.el6.src" }, "product_reference": "python-0:2.6.6-51.el6.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.i686" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.s390x" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.i686" }, "product_reference": "python-devel-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-devel-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.s390x" }, "product_reference": "python-devel-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-devel-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.i686" }, "product_reference": "python-libs-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-libs-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.s390x" }, "product_reference": "python-libs-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-libs-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-test-0:2.6.6-51.el6.i686" }, "product_reference": "python-test-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-test-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-test-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-test-0:2.6.6-51.el6.s390x" }, "product_reference": "python-test-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-test-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-test-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.i686" }, "product_reference": "python-tools-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-tools-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.s390x" }, "product_reference": "python-tools-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-tools-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.i686" }, "product_reference": "tkinter-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.ppc64" }, "product_reference": "tkinter-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.s390x" }, "product_reference": "tkinter-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.x86_64" }, "product_reference": "tkinter-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-0:2.6.6-51.el6.i686" }, "product_reference": "python-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-0:2.6.6-51.el6.s390x" }, "product_reference": "python-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-0:2.6.6-51.el6.src" }, "product_reference": "python-0:2.6.6-51.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.i686" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.s390x" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-devel-0:2.6.6-51.el6.i686" }, "product_reference": "python-devel-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-devel-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-devel-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-devel-0:2.6.6-51.el6.s390x" }, "product_reference": "python-devel-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-devel-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-devel-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-libs-0:2.6.6-51.el6.i686" }, "product_reference": "python-libs-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-libs-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-libs-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-libs-0:2.6.6-51.el6.s390x" }, "product_reference": "python-libs-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-libs-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-libs-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-test-0:2.6.6-51.el6.i686" }, "product_reference": "python-test-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-test-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-test-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-test-0:2.6.6-51.el6.s390x" }, "product_reference": "python-test-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-test-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-test-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-tools-0:2.6.6-51.el6.i686" }, "product_reference": "python-tools-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-tools-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-tools-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-tools-0:2.6.6-51.el6.s390x" }, "product_reference": "python-tools-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-tools-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-tools-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:tkinter-0:2.6.6-51.el6.i686" }, "product_reference": "tkinter-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:tkinter-0:2.6.6-51.el6.ppc64" }, "product_reference": "tkinter-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:tkinter-0:2.6.6-51.el6.s390x" }, "product_reference": "tkinter-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:tkinter-0:2.6.6-51.el6.x86_64" }, "product_reference": "tkinter-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-0:2.6.6-51.el6.i686" }, "product_reference": "python-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-0:2.6.6-51.el6.s390x" }, "product_reference": "python-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-0:2.6.6-51.el6.src" }, "product_reference": "python-0:2.6.6-51.el6.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-debuginfo-0:2.6.6-51.el6.i686" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-debuginfo-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-debuginfo-0:2.6.6-51.el6.s390x" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-debuginfo-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-devel-0:2.6.6-51.el6.i686" }, "product_reference": "python-devel-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-devel-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-devel-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-devel-0:2.6.6-51.el6.s390x" }, "product_reference": "python-devel-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-devel-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-devel-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-libs-0:2.6.6-51.el6.i686" }, "product_reference": "python-libs-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-libs-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-libs-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-libs-0:2.6.6-51.el6.s390x" }, "product_reference": "python-libs-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-libs-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-libs-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-test-0:2.6.6-51.el6.i686" }, "product_reference": "python-test-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-test-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-test-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-test-0:2.6.6-51.el6.s390x" }, "product_reference": "python-test-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-test-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-test-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-tools-0:2.6.6-51.el6.i686" }, "product_reference": "python-tools-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-tools-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-tools-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-tools-0:2.6.6-51.el6.s390x" }, "product_reference": "python-tools-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-tools-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-tools-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tkinter-0:2.6.6-51.el6.i686" }, "product_reference": "tkinter-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tkinter-0:2.6.6-51.el6.ppc64" }, "product_reference": "tkinter-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tkinter-0:2.6.6-51.el6.s390x" }, "product_reference": "tkinter-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tkinter-0:2.6.6-51.el6.x86_64" }, "product_reference": "tkinter-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-0:2.6.6-51.el6.i686" }, "product_reference": "python-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-0:2.6.6-51.el6.s390x" }, "product_reference": "python-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-0:2.6.6-51.el6.src" }, "product_reference": "python-0:2.6.6-51.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-debuginfo-0:2.6.6-51.el6.i686" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-debuginfo-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-debuginfo-0:2.6.6-51.el6.s390x" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-debuginfo-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-devel-0:2.6.6-51.el6.i686" }, "product_reference": "python-devel-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-devel-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-devel-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-devel-0:2.6.6-51.el6.s390x" }, "product_reference": "python-devel-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-devel-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-devel-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-libs-0:2.6.6-51.el6.i686" }, "product_reference": "python-libs-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-libs-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-libs-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-libs-0:2.6.6-51.el6.s390x" }, "product_reference": "python-libs-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-libs-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-libs-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-test-0:2.6.6-51.el6.i686" }, "product_reference": "python-test-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-test-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-test-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-test-0:2.6.6-51.el6.s390x" }, "product_reference": "python-test-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-test-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-test-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-tools-0:2.6.6-51.el6.i686" }, "product_reference": "python-tools-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-tools-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-tools-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-tools-0:2.6.6-51.el6.s390x" }, "product_reference": "python-tools-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-tools-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-tools-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tkinter-0:2.6.6-51.el6.i686" }, "product_reference": "tkinter-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tkinter-0:2.6.6-51.el6.ppc64" }, "product_reference": "tkinter-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tkinter-0:2.6.6-51.el6.s390x" }, "product_reference": "tkinter-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tkinter-0:2.6.6-51.el6.x86_64" }, "product_reference": "tkinter-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-0:2.6.6-51.el6.i686" }, "product_reference": "python-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-0:2.6.6-51.el6.s390x" }, "product_reference": "python-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-0:2.6.6-51.el6.src" }, "product_reference": "python-0:2.6.6-51.el6.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.i686" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.s390x" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-devel-0:2.6.6-51.el6.i686" }, "product_reference": "python-devel-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-devel-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-devel-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-devel-0:2.6.6-51.el6.s390x" }, "product_reference": "python-devel-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-devel-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-devel-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-libs-0:2.6.6-51.el6.i686" }, "product_reference": "python-libs-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-libs-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-libs-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-libs-0:2.6.6-51.el6.s390x" }, "product_reference": "python-libs-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-libs-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-libs-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-test-0:2.6.6-51.el6.i686" }, "product_reference": "python-test-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-test-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-test-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-test-0:2.6.6-51.el6.s390x" }, "product_reference": "python-test-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-test-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-test-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-tools-0:2.6.6-51.el6.i686" }, "product_reference": "python-tools-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-tools-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-tools-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-tools-0:2.6.6-51.el6.s390x" }, "product_reference": "python-tools-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-tools-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-tools-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tkinter-0:2.6.6-51.el6.i686" }, "product_reference": "tkinter-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tkinter-0:2.6.6-51.el6.ppc64" }, "product_reference": "tkinter-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tkinter-0:2.6.6-51.el6.s390x" }, "product_reference": "tkinter-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tkinter-0:2.6.6-51.el6.x86_64" }, "product_reference": "tkinter-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-0:2.6.6-51.el6.i686" }, "product_reference": "python-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-0:2.6.6-51.el6.s390x" }, "product_reference": "python-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-0:2.6.6-51.el6.src" }, "product_reference": "python-0:2.6.6-51.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-debuginfo-0:2.6.6-51.el6.i686" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-debuginfo-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-debuginfo-0:2.6.6-51.el6.s390x" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-debuginfo-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-debuginfo-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-debuginfo-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-devel-0:2.6.6-51.el6.i686" }, "product_reference": "python-devel-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-devel-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-devel-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-devel-0:2.6.6-51.el6.s390x" }, "product_reference": "python-devel-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-devel-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-devel-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-devel-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-libs-0:2.6.6-51.el6.i686" }, "product_reference": "python-libs-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-libs-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-libs-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-libs-0:2.6.6-51.el6.s390x" }, "product_reference": "python-libs-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-libs-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-libs-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-libs-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-test-0:2.6.6-51.el6.i686" }, "product_reference": "python-test-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-test-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-test-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-test-0:2.6.6-51.el6.s390x" }, "product_reference": "python-test-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-test-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-test-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-test-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-tools-0:2.6.6-51.el6.i686" }, "product_reference": "python-tools-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-tools-0:2.6.6-51.el6.ppc64" }, "product_reference": "python-tools-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-tools-0:2.6.6-51.el6.s390x" }, "product_reference": "python-tools-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-tools-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-tools-0:2.6.6-51.el6.x86_64" }, "product_reference": "python-tools-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tkinter-0:2.6.6-51.el6.i686" }, "product_reference": "tkinter-0:2.6.6-51.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tkinter-0:2.6.6-51.el6.ppc64" }, "product_reference": "tkinter-0:2.6.6-51.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tkinter-0:2.6.6-51.el6.s390x" }, "product_reference": "tkinter-0:2.6.6-51.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tkinter-0:2.6.6-51.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tkinter-0:2.6.6-51.el6.x86_64" }, "product_reference": "tkinter-0:2.6.6-51.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4238", "discovery_date": "2013-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "996381" } ], "notes": [ { "category": "description", "text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: hostname check bypassing vulnerability in SSL module", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of python as shipped with Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:python-0:2.6.6-51.el6.i686", "6Client-optional:python-0:2.6.6-51.el6.ppc64", "6Client-optional:python-0:2.6.6-51.el6.s390x", "6Client-optional:python-0:2.6.6-51.el6.src", "6Client-optional:python-0:2.6.6-51.el6.x86_64", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Client-optional:python-devel-0:2.6.6-51.el6.i686", "6Client-optional:python-devel-0:2.6.6-51.el6.ppc64", "6Client-optional:python-devel-0:2.6.6-51.el6.s390x", "6Client-optional:python-devel-0:2.6.6-51.el6.x86_64", "6Client-optional:python-libs-0:2.6.6-51.el6.i686", "6Client-optional:python-libs-0:2.6.6-51.el6.ppc64", "6Client-optional:python-libs-0:2.6.6-51.el6.s390x", "6Client-optional:python-libs-0:2.6.6-51.el6.x86_64", "6Client-optional:python-test-0:2.6.6-51.el6.i686", "6Client-optional:python-test-0:2.6.6-51.el6.ppc64", "6Client-optional:python-test-0:2.6.6-51.el6.s390x", "6Client-optional:python-test-0:2.6.6-51.el6.x86_64", "6Client-optional:python-tools-0:2.6.6-51.el6.i686", "6Client-optional:python-tools-0:2.6.6-51.el6.ppc64", "6Client-optional:python-tools-0:2.6.6-51.el6.s390x", "6Client-optional:python-tools-0:2.6.6-51.el6.x86_64", "6Client-optional:tkinter-0:2.6.6-51.el6.i686", "6Client-optional:tkinter-0:2.6.6-51.el6.ppc64", "6Client-optional:tkinter-0:2.6.6-51.el6.s390x", "6Client-optional:tkinter-0:2.6.6-51.el6.x86_64", "6Client:python-0:2.6.6-51.el6.i686", "6Client:python-0:2.6.6-51.el6.ppc64", "6Client:python-0:2.6.6-51.el6.s390x", "6Client:python-0:2.6.6-51.el6.src", "6Client:python-0:2.6.6-51.el6.x86_64", "6Client:python-debuginfo-0:2.6.6-51.el6.i686", "6Client:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Client:python-debuginfo-0:2.6.6-51.el6.s390x", "6Client:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Client:python-devel-0:2.6.6-51.el6.i686", "6Client:python-devel-0:2.6.6-51.el6.ppc64", "6Client:python-devel-0:2.6.6-51.el6.s390x", "6Client:python-devel-0:2.6.6-51.el6.x86_64", "6Client:python-libs-0:2.6.6-51.el6.i686", "6Client:python-libs-0:2.6.6-51.el6.ppc64", "6Client:python-libs-0:2.6.6-51.el6.s390x", "6Client:python-libs-0:2.6.6-51.el6.x86_64", "6Client:python-test-0:2.6.6-51.el6.i686", "6Client:python-test-0:2.6.6-51.el6.ppc64", "6Client:python-test-0:2.6.6-51.el6.s390x", "6Client:python-test-0:2.6.6-51.el6.x86_64", "6Client:python-tools-0:2.6.6-51.el6.i686", "6Client:python-tools-0:2.6.6-51.el6.ppc64", "6Client:python-tools-0:2.6.6-51.el6.s390x", "6Client:python-tools-0:2.6.6-51.el6.x86_64", "6Client:tkinter-0:2.6.6-51.el6.i686", "6Client:tkinter-0:2.6.6-51.el6.ppc64", "6Client:tkinter-0:2.6.6-51.el6.s390x", "6Client:tkinter-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-0:2.6.6-51.el6.src", "6ComputeNode-optional:python-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.i686", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-0:2.6.6-51.el6.i686", "6ComputeNode:python-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-0:2.6.6-51.el6.s390x", "6ComputeNode:python-0:2.6.6-51.el6.src", "6ComputeNode:python-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.i686", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.s390x", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-devel-0:2.6.6-51.el6.i686", "6ComputeNode:python-devel-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-devel-0:2.6.6-51.el6.s390x", "6ComputeNode:python-devel-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-libs-0:2.6.6-51.el6.i686", "6ComputeNode:python-libs-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-libs-0:2.6.6-51.el6.s390x", "6ComputeNode:python-libs-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-test-0:2.6.6-51.el6.i686", "6ComputeNode:python-test-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-test-0:2.6.6-51.el6.s390x", "6ComputeNode:python-test-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-tools-0:2.6.6-51.el6.i686", "6ComputeNode:python-tools-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-tools-0:2.6.6-51.el6.s390x", "6ComputeNode:python-tools-0:2.6.6-51.el6.x86_64", "6ComputeNode:tkinter-0:2.6.6-51.el6.i686", "6ComputeNode:tkinter-0:2.6.6-51.el6.ppc64", "6ComputeNode:tkinter-0:2.6.6-51.el6.s390x", "6ComputeNode:tkinter-0:2.6.6-51.el6.x86_64", "6Server-optional:python-0:2.6.6-51.el6.i686", "6Server-optional:python-0:2.6.6-51.el6.ppc64", "6Server-optional:python-0:2.6.6-51.el6.s390x", "6Server-optional:python-0:2.6.6-51.el6.src", "6Server-optional:python-0:2.6.6-51.el6.x86_64", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Server-optional:python-devel-0:2.6.6-51.el6.i686", "6Server-optional:python-devel-0:2.6.6-51.el6.ppc64", "6Server-optional:python-devel-0:2.6.6-51.el6.s390x", "6Server-optional:python-devel-0:2.6.6-51.el6.x86_64", "6Server-optional:python-libs-0:2.6.6-51.el6.i686", "6Server-optional:python-libs-0:2.6.6-51.el6.ppc64", "6Server-optional:python-libs-0:2.6.6-51.el6.s390x", "6Server-optional:python-libs-0:2.6.6-51.el6.x86_64", "6Server-optional:python-test-0:2.6.6-51.el6.i686", "6Server-optional:python-test-0:2.6.6-51.el6.ppc64", "6Server-optional:python-test-0:2.6.6-51.el6.s390x", "6Server-optional:python-test-0:2.6.6-51.el6.x86_64", "6Server-optional:python-tools-0:2.6.6-51.el6.i686", "6Server-optional:python-tools-0:2.6.6-51.el6.ppc64", "6Server-optional:python-tools-0:2.6.6-51.el6.s390x", "6Server-optional:python-tools-0:2.6.6-51.el6.x86_64", "6Server-optional:tkinter-0:2.6.6-51.el6.i686", "6Server-optional:tkinter-0:2.6.6-51.el6.ppc64", "6Server-optional:tkinter-0:2.6.6-51.el6.s390x", "6Server-optional:tkinter-0:2.6.6-51.el6.x86_64", "6Server:python-0:2.6.6-51.el6.i686", "6Server:python-0:2.6.6-51.el6.ppc64", "6Server:python-0:2.6.6-51.el6.s390x", "6Server:python-0:2.6.6-51.el6.src", "6Server:python-0:2.6.6-51.el6.x86_64", "6Server:python-debuginfo-0:2.6.6-51.el6.i686", "6Server:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Server:python-debuginfo-0:2.6.6-51.el6.s390x", "6Server:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Server:python-devel-0:2.6.6-51.el6.i686", "6Server:python-devel-0:2.6.6-51.el6.ppc64", "6Server:python-devel-0:2.6.6-51.el6.s390x", "6Server:python-devel-0:2.6.6-51.el6.x86_64", "6Server:python-libs-0:2.6.6-51.el6.i686", "6Server:python-libs-0:2.6.6-51.el6.ppc64", "6Server:python-libs-0:2.6.6-51.el6.s390x", "6Server:python-libs-0:2.6.6-51.el6.x86_64", "6Server:python-test-0:2.6.6-51.el6.i686", "6Server:python-test-0:2.6.6-51.el6.ppc64", "6Server:python-test-0:2.6.6-51.el6.s390x", "6Server:python-test-0:2.6.6-51.el6.x86_64", "6Server:python-tools-0:2.6.6-51.el6.i686", "6Server:python-tools-0:2.6.6-51.el6.ppc64", "6Server:python-tools-0:2.6.6-51.el6.s390x", "6Server:python-tools-0:2.6.6-51.el6.x86_64", "6Server:tkinter-0:2.6.6-51.el6.i686", "6Server:tkinter-0:2.6.6-51.el6.ppc64", "6Server:tkinter-0:2.6.6-51.el6.s390x", "6Server:tkinter-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-0:2.6.6-51.el6.i686", "6Workstation-optional:python-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-0:2.6.6-51.el6.src", "6Workstation-optional:python-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-devel-0:2.6.6-51.el6.i686", "6Workstation-optional:python-devel-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-devel-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-devel-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-libs-0:2.6.6-51.el6.i686", "6Workstation-optional:python-libs-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-libs-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-libs-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-test-0:2.6.6-51.el6.i686", "6Workstation-optional:python-test-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-test-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-test-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-tools-0:2.6.6-51.el6.i686", "6Workstation-optional:python-tools-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-tools-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-tools-0:2.6.6-51.el6.x86_64", "6Workstation-optional:tkinter-0:2.6.6-51.el6.i686", "6Workstation-optional:tkinter-0:2.6.6-51.el6.ppc64", "6Workstation-optional:tkinter-0:2.6.6-51.el6.s390x", "6Workstation-optional:tkinter-0:2.6.6-51.el6.x86_64", "6Workstation:python-0:2.6.6-51.el6.i686", "6Workstation:python-0:2.6.6-51.el6.ppc64", "6Workstation:python-0:2.6.6-51.el6.s390x", "6Workstation:python-0:2.6.6-51.el6.src", "6Workstation:python-0:2.6.6-51.el6.x86_64", "6Workstation:python-debuginfo-0:2.6.6-51.el6.i686", "6Workstation:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Workstation:python-debuginfo-0:2.6.6-51.el6.s390x", "6Workstation:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Workstation:python-devel-0:2.6.6-51.el6.i686", "6Workstation:python-devel-0:2.6.6-51.el6.ppc64", "6Workstation:python-devel-0:2.6.6-51.el6.s390x", "6Workstation:python-devel-0:2.6.6-51.el6.x86_64", "6Workstation:python-libs-0:2.6.6-51.el6.i686", "6Workstation:python-libs-0:2.6.6-51.el6.ppc64", "6Workstation:python-libs-0:2.6.6-51.el6.s390x", "6Workstation:python-libs-0:2.6.6-51.el6.x86_64", "6Workstation:python-test-0:2.6.6-51.el6.i686", "6Workstation:python-test-0:2.6.6-51.el6.ppc64", "6Workstation:python-test-0:2.6.6-51.el6.s390x", "6Workstation:python-test-0:2.6.6-51.el6.x86_64", "6Workstation:python-tools-0:2.6.6-51.el6.i686", "6Workstation:python-tools-0:2.6.6-51.el6.ppc64", "6Workstation:python-tools-0:2.6.6-51.el6.s390x", "6Workstation:python-tools-0:2.6.6-51.el6.x86_64", "6Workstation:tkinter-0:2.6.6-51.el6.i686", "6Workstation:tkinter-0:2.6.6-51.el6.ppc64", "6Workstation:tkinter-0:2.6.6-51.el6.s390x", "6Workstation:tkinter-0:2.6.6-51.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4238" }, { "category": "external", "summary": "RHBZ#996381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4238", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4238" } ], "release_date": "2013-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-11-20T16:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Client-optional:python-0:2.6.6-51.el6.i686", "6Client-optional:python-0:2.6.6-51.el6.ppc64", "6Client-optional:python-0:2.6.6-51.el6.s390x", "6Client-optional:python-0:2.6.6-51.el6.src", "6Client-optional:python-0:2.6.6-51.el6.x86_64", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Client-optional:python-devel-0:2.6.6-51.el6.i686", "6Client-optional:python-devel-0:2.6.6-51.el6.ppc64", "6Client-optional:python-devel-0:2.6.6-51.el6.s390x", "6Client-optional:python-devel-0:2.6.6-51.el6.x86_64", "6Client-optional:python-libs-0:2.6.6-51.el6.i686", "6Client-optional:python-libs-0:2.6.6-51.el6.ppc64", "6Client-optional:python-libs-0:2.6.6-51.el6.s390x", "6Client-optional:python-libs-0:2.6.6-51.el6.x86_64", "6Client-optional:python-test-0:2.6.6-51.el6.i686", "6Client-optional:python-test-0:2.6.6-51.el6.ppc64", "6Client-optional:python-test-0:2.6.6-51.el6.s390x", "6Client-optional:python-test-0:2.6.6-51.el6.x86_64", "6Client-optional:python-tools-0:2.6.6-51.el6.i686", "6Client-optional:python-tools-0:2.6.6-51.el6.ppc64", "6Client-optional:python-tools-0:2.6.6-51.el6.s390x", "6Client-optional:python-tools-0:2.6.6-51.el6.x86_64", "6Client-optional:tkinter-0:2.6.6-51.el6.i686", "6Client-optional:tkinter-0:2.6.6-51.el6.ppc64", "6Client-optional:tkinter-0:2.6.6-51.el6.s390x", "6Client-optional:tkinter-0:2.6.6-51.el6.x86_64", "6Client:python-0:2.6.6-51.el6.i686", "6Client:python-0:2.6.6-51.el6.ppc64", "6Client:python-0:2.6.6-51.el6.s390x", "6Client:python-0:2.6.6-51.el6.src", "6Client:python-0:2.6.6-51.el6.x86_64", "6Client:python-debuginfo-0:2.6.6-51.el6.i686", "6Client:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Client:python-debuginfo-0:2.6.6-51.el6.s390x", "6Client:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Client:python-devel-0:2.6.6-51.el6.i686", "6Client:python-devel-0:2.6.6-51.el6.ppc64", "6Client:python-devel-0:2.6.6-51.el6.s390x", "6Client:python-devel-0:2.6.6-51.el6.x86_64", "6Client:python-libs-0:2.6.6-51.el6.i686", "6Client:python-libs-0:2.6.6-51.el6.ppc64", "6Client:python-libs-0:2.6.6-51.el6.s390x", "6Client:python-libs-0:2.6.6-51.el6.x86_64", "6Client:python-test-0:2.6.6-51.el6.i686", "6Client:python-test-0:2.6.6-51.el6.ppc64", "6Client:python-test-0:2.6.6-51.el6.s390x", "6Client:python-test-0:2.6.6-51.el6.x86_64", "6Client:python-tools-0:2.6.6-51.el6.i686", "6Client:python-tools-0:2.6.6-51.el6.ppc64", "6Client:python-tools-0:2.6.6-51.el6.s390x", "6Client:python-tools-0:2.6.6-51.el6.x86_64", "6Client:tkinter-0:2.6.6-51.el6.i686", "6Client:tkinter-0:2.6.6-51.el6.ppc64", "6Client:tkinter-0:2.6.6-51.el6.s390x", "6Client:tkinter-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-0:2.6.6-51.el6.src", "6ComputeNode-optional:python-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.i686", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-0:2.6.6-51.el6.i686", "6ComputeNode:python-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-0:2.6.6-51.el6.s390x", "6ComputeNode:python-0:2.6.6-51.el6.src", "6ComputeNode:python-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.i686", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.s390x", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-devel-0:2.6.6-51.el6.i686", "6ComputeNode:python-devel-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-devel-0:2.6.6-51.el6.s390x", "6ComputeNode:python-devel-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-libs-0:2.6.6-51.el6.i686", "6ComputeNode:python-libs-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-libs-0:2.6.6-51.el6.s390x", "6ComputeNode:python-libs-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-test-0:2.6.6-51.el6.i686", "6ComputeNode:python-test-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-test-0:2.6.6-51.el6.s390x", "6ComputeNode:python-test-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-tools-0:2.6.6-51.el6.i686", "6ComputeNode:python-tools-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-tools-0:2.6.6-51.el6.s390x", "6ComputeNode:python-tools-0:2.6.6-51.el6.x86_64", "6ComputeNode:tkinter-0:2.6.6-51.el6.i686", "6ComputeNode:tkinter-0:2.6.6-51.el6.ppc64", "6ComputeNode:tkinter-0:2.6.6-51.el6.s390x", "6ComputeNode:tkinter-0:2.6.6-51.el6.x86_64", "6Server-optional:python-0:2.6.6-51.el6.i686", "6Server-optional:python-0:2.6.6-51.el6.ppc64", "6Server-optional:python-0:2.6.6-51.el6.s390x", "6Server-optional:python-0:2.6.6-51.el6.src", "6Server-optional:python-0:2.6.6-51.el6.x86_64", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Server-optional:python-devel-0:2.6.6-51.el6.i686", "6Server-optional:python-devel-0:2.6.6-51.el6.ppc64", "6Server-optional:python-devel-0:2.6.6-51.el6.s390x", "6Server-optional:python-devel-0:2.6.6-51.el6.x86_64", "6Server-optional:python-libs-0:2.6.6-51.el6.i686", "6Server-optional:python-libs-0:2.6.6-51.el6.ppc64", "6Server-optional:python-libs-0:2.6.6-51.el6.s390x", "6Server-optional:python-libs-0:2.6.6-51.el6.x86_64", "6Server-optional:python-test-0:2.6.6-51.el6.i686", "6Server-optional:python-test-0:2.6.6-51.el6.ppc64", "6Server-optional:python-test-0:2.6.6-51.el6.s390x", "6Server-optional:python-test-0:2.6.6-51.el6.x86_64", "6Server-optional:python-tools-0:2.6.6-51.el6.i686", "6Server-optional:python-tools-0:2.6.6-51.el6.ppc64", "6Server-optional:python-tools-0:2.6.6-51.el6.s390x", "6Server-optional:python-tools-0:2.6.6-51.el6.x86_64", "6Server-optional:tkinter-0:2.6.6-51.el6.i686", "6Server-optional:tkinter-0:2.6.6-51.el6.ppc64", "6Server-optional:tkinter-0:2.6.6-51.el6.s390x", "6Server-optional:tkinter-0:2.6.6-51.el6.x86_64", "6Server:python-0:2.6.6-51.el6.i686", "6Server:python-0:2.6.6-51.el6.ppc64", "6Server:python-0:2.6.6-51.el6.s390x", "6Server:python-0:2.6.6-51.el6.src", "6Server:python-0:2.6.6-51.el6.x86_64", "6Server:python-debuginfo-0:2.6.6-51.el6.i686", "6Server:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Server:python-debuginfo-0:2.6.6-51.el6.s390x", "6Server:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Server:python-devel-0:2.6.6-51.el6.i686", "6Server:python-devel-0:2.6.6-51.el6.ppc64", "6Server:python-devel-0:2.6.6-51.el6.s390x", "6Server:python-devel-0:2.6.6-51.el6.x86_64", "6Server:python-libs-0:2.6.6-51.el6.i686", "6Server:python-libs-0:2.6.6-51.el6.ppc64", "6Server:python-libs-0:2.6.6-51.el6.s390x", "6Server:python-libs-0:2.6.6-51.el6.x86_64", "6Server:python-test-0:2.6.6-51.el6.i686", "6Server:python-test-0:2.6.6-51.el6.ppc64", "6Server:python-test-0:2.6.6-51.el6.s390x", "6Server:python-test-0:2.6.6-51.el6.x86_64", "6Server:python-tools-0:2.6.6-51.el6.i686", "6Server:python-tools-0:2.6.6-51.el6.ppc64", "6Server:python-tools-0:2.6.6-51.el6.s390x", "6Server:python-tools-0:2.6.6-51.el6.x86_64", "6Server:tkinter-0:2.6.6-51.el6.i686", "6Server:tkinter-0:2.6.6-51.el6.ppc64", "6Server:tkinter-0:2.6.6-51.el6.s390x", "6Server:tkinter-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-0:2.6.6-51.el6.i686", "6Workstation-optional:python-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-0:2.6.6-51.el6.src", "6Workstation-optional:python-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-devel-0:2.6.6-51.el6.i686", "6Workstation-optional:python-devel-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-devel-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-devel-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-libs-0:2.6.6-51.el6.i686", "6Workstation-optional:python-libs-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-libs-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-libs-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-test-0:2.6.6-51.el6.i686", "6Workstation-optional:python-test-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-test-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-test-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-tools-0:2.6.6-51.el6.i686", "6Workstation-optional:python-tools-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-tools-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-tools-0:2.6.6-51.el6.x86_64", "6Workstation-optional:tkinter-0:2.6.6-51.el6.i686", "6Workstation-optional:tkinter-0:2.6.6-51.el6.ppc64", "6Workstation-optional:tkinter-0:2.6.6-51.el6.s390x", "6Workstation-optional:tkinter-0:2.6.6-51.el6.x86_64", "6Workstation:python-0:2.6.6-51.el6.i686", "6Workstation:python-0:2.6.6-51.el6.ppc64", "6Workstation:python-0:2.6.6-51.el6.s390x", "6Workstation:python-0:2.6.6-51.el6.src", "6Workstation:python-0:2.6.6-51.el6.x86_64", "6Workstation:python-debuginfo-0:2.6.6-51.el6.i686", "6Workstation:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Workstation:python-debuginfo-0:2.6.6-51.el6.s390x", "6Workstation:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Workstation:python-devel-0:2.6.6-51.el6.i686", "6Workstation:python-devel-0:2.6.6-51.el6.ppc64", "6Workstation:python-devel-0:2.6.6-51.el6.s390x", "6Workstation:python-devel-0:2.6.6-51.el6.x86_64", "6Workstation:python-libs-0:2.6.6-51.el6.i686", "6Workstation:python-libs-0:2.6.6-51.el6.ppc64", "6Workstation:python-libs-0:2.6.6-51.el6.s390x", "6Workstation:python-libs-0:2.6.6-51.el6.x86_64", "6Workstation:python-test-0:2.6.6-51.el6.i686", "6Workstation:python-test-0:2.6.6-51.el6.ppc64", "6Workstation:python-test-0:2.6.6-51.el6.s390x", "6Workstation:python-test-0:2.6.6-51.el6.x86_64", "6Workstation:python-tools-0:2.6.6-51.el6.i686", "6Workstation:python-tools-0:2.6.6-51.el6.ppc64", "6Workstation:python-tools-0:2.6.6-51.el6.s390x", "6Workstation:python-tools-0:2.6.6-51.el6.x86_64", "6Workstation:tkinter-0:2.6.6-51.el6.i686", "6Workstation:tkinter-0:2.6.6-51.el6.ppc64", "6Workstation:tkinter-0:2.6.6-51.el6.s390x", "6Workstation:tkinter-0:2.6.6-51.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1582" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:python-0:2.6.6-51.el6.i686", "6Client-optional:python-0:2.6.6-51.el6.ppc64", "6Client-optional:python-0:2.6.6-51.el6.s390x", "6Client-optional:python-0:2.6.6-51.el6.src", "6Client-optional:python-0:2.6.6-51.el6.x86_64", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6Client-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Client-optional:python-devel-0:2.6.6-51.el6.i686", "6Client-optional:python-devel-0:2.6.6-51.el6.ppc64", "6Client-optional:python-devel-0:2.6.6-51.el6.s390x", "6Client-optional:python-devel-0:2.6.6-51.el6.x86_64", "6Client-optional:python-libs-0:2.6.6-51.el6.i686", "6Client-optional:python-libs-0:2.6.6-51.el6.ppc64", "6Client-optional:python-libs-0:2.6.6-51.el6.s390x", "6Client-optional:python-libs-0:2.6.6-51.el6.x86_64", "6Client-optional:python-test-0:2.6.6-51.el6.i686", "6Client-optional:python-test-0:2.6.6-51.el6.ppc64", "6Client-optional:python-test-0:2.6.6-51.el6.s390x", "6Client-optional:python-test-0:2.6.6-51.el6.x86_64", "6Client-optional:python-tools-0:2.6.6-51.el6.i686", "6Client-optional:python-tools-0:2.6.6-51.el6.ppc64", "6Client-optional:python-tools-0:2.6.6-51.el6.s390x", "6Client-optional:python-tools-0:2.6.6-51.el6.x86_64", "6Client-optional:tkinter-0:2.6.6-51.el6.i686", "6Client-optional:tkinter-0:2.6.6-51.el6.ppc64", "6Client-optional:tkinter-0:2.6.6-51.el6.s390x", "6Client-optional:tkinter-0:2.6.6-51.el6.x86_64", "6Client:python-0:2.6.6-51.el6.i686", "6Client:python-0:2.6.6-51.el6.ppc64", "6Client:python-0:2.6.6-51.el6.s390x", "6Client:python-0:2.6.6-51.el6.src", "6Client:python-0:2.6.6-51.el6.x86_64", "6Client:python-debuginfo-0:2.6.6-51.el6.i686", "6Client:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Client:python-debuginfo-0:2.6.6-51.el6.s390x", "6Client:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Client:python-devel-0:2.6.6-51.el6.i686", "6Client:python-devel-0:2.6.6-51.el6.ppc64", "6Client:python-devel-0:2.6.6-51.el6.s390x", "6Client:python-devel-0:2.6.6-51.el6.x86_64", "6Client:python-libs-0:2.6.6-51.el6.i686", "6Client:python-libs-0:2.6.6-51.el6.ppc64", "6Client:python-libs-0:2.6.6-51.el6.s390x", "6Client:python-libs-0:2.6.6-51.el6.x86_64", "6Client:python-test-0:2.6.6-51.el6.i686", "6Client:python-test-0:2.6.6-51.el6.ppc64", "6Client:python-test-0:2.6.6-51.el6.s390x", "6Client:python-test-0:2.6.6-51.el6.x86_64", "6Client:python-tools-0:2.6.6-51.el6.i686", "6Client:python-tools-0:2.6.6-51.el6.ppc64", "6Client:python-tools-0:2.6.6-51.el6.s390x", "6Client:python-tools-0:2.6.6-51.el6.x86_64", "6Client:tkinter-0:2.6.6-51.el6.i686", "6Client:tkinter-0:2.6.6-51.el6.ppc64", "6Client:tkinter-0:2.6.6-51.el6.s390x", "6Client:tkinter-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-0:2.6.6-51.el6.src", "6ComputeNode-optional:python-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-devel-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-libs-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-test-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.i686", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:python-tools-0:2.6.6-51.el6.x86_64", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.i686", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.ppc64", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.s390x", "6ComputeNode-optional:tkinter-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-0:2.6.6-51.el6.i686", "6ComputeNode:python-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-0:2.6.6-51.el6.s390x", "6ComputeNode:python-0:2.6.6-51.el6.src", "6ComputeNode:python-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.i686", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.s390x", "6ComputeNode:python-debuginfo-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-devel-0:2.6.6-51.el6.i686", "6ComputeNode:python-devel-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-devel-0:2.6.6-51.el6.s390x", "6ComputeNode:python-devel-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-libs-0:2.6.6-51.el6.i686", "6ComputeNode:python-libs-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-libs-0:2.6.6-51.el6.s390x", "6ComputeNode:python-libs-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-test-0:2.6.6-51.el6.i686", "6ComputeNode:python-test-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-test-0:2.6.6-51.el6.s390x", "6ComputeNode:python-test-0:2.6.6-51.el6.x86_64", "6ComputeNode:python-tools-0:2.6.6-51.el6.i686", "6ComputeNode:python-tools-0:2.6.6-51.el6.ppc64", "6ComputeNode:python-tools-0:2.6.6-51.el6.s390x", "6ComputeNode:python-tools-0:2.6.6-51.el6.x86_64", "6ComputeNode:tkinter-0:2.6.6-51.el6.i686", "6ComputeNode:tkinter-0:2.6.6-51.el6.ppc64", "6ComputeNode:tkinter-0:2.6.6-51.el6.s390x", "6ComputeNode:tkinter-0:2.6.6-51.el6.x86_64", "6Server-optional:python-0:2.6.6-51.el6.i686", "6Server-optional:python-0:2.6.6-51.el6.ppc64", "6Server-optional:python-0:2.6.6-51.el6.s390x", "6Server-optional:python-0:2.6.6-51.el6.src", "6Server-optional:python-0:2.6.6-51.el6.x86_64", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6Server-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Server-optional:python-devel-0:2.6.6-51.el6.i686", "6Server-optional:python-devel-0:2.6.6-51.el6.ppc64", "6Server-optional:python-devel-0:2.6.6-51.el6.s390x", "6Server-optional:python-devel-0:2.6.6-51.el6.x86_64", "6Server-optional:python-libs-0:2.6.6-51.el6.i686", "6Server-optional:python-libs-0:2.6.6-51.el6.ppc64", "6Server-optional:python-libs-0:2.6.6-51.el6.s390x", "6Server-optional:python-libs-0:2.6.6-51.el6.x86_64", "6Server-optional:python-test-0:2.6.6-51.el6.i686", "6Server-optional:python-test-0:2.6.6-51.el6.ppc64", "6Server-optional:python-test-0:2.6.6-51.el6.s390x", "6Server-optional:python-test-0:2.6.6-51.el6.x86_64", "6Server-optional:python-tools-0:2.6.6-51.el6.i686", "6Server-optional:python-tools-0:2.6.6-51.el6.ppc64", "6Server-optional:python-tools-0:2.6.6-51.el6.s390x", "6Server-optional:python-tools-0:2.6.6-51.el6.x86_64", "6Server-optional:tkinter-0:2.6.6-51.el6.i686", "6Server-optional:tkinter-0:2.6.6-51.el6.ppc64", "6Server-optional:tkinter-0:2.6.6-51.el6.s390x", "6Server-optional:tkinter-0:2.6.6-51.el6.x86_64", "6Server:python-0:2.6.6-51.el6.i686", "6Server:python-0:2.6.6-51.el6.ppc64", "6Server:python-0:2.6.6-51.el6.s390x", "6Server:python-0:2.6.6-51.el6.src", "6Server:python-0:2.6.6-51.el6.x86_64", "6Server:python-debuginfo-0:2.6.6-51.el6.i686", "6Server:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Server:python-debuginfo-0:2.6.6-51.el6.s390x", "6Server:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Server:python-devel-0:2.6.6-51.el6.i686", "6Server:python-devel-0:2.6.6-51.el6.ppc64", "6Server:python-devel-0:2.6.6-51.el6.s390x", "6Server:python-devel-0:2.6.6-51.el6.x86_64", "6Server:python-libs-0:2.6.6-51.el6.i686", "6Server:python-libs-0:2.6.6-51.el6.ppc64", "6Server:python-libs-0:2.6.6-51.el6.s390x", "6Server:python-libs-0:2.6.6-51.el6.x86_64", "6Server:python-test-0:2.6.6-51.el6.i686", "6Server:python-test-0:2.6.6-51.el6.ppc64", "6Server:python-test-0:2.6.6-51.el6.s390x", "6Server:python-test-0:2.6.6-51.el6.x86_64", "6Server:python-tools-0:2.6.6-51.el6.i686", "6Server:python-tools-0:2.6.6-51.el6.ppc64", "6Server:python-tools-0:2.6.6-51.el6.s390x", "6Server:python-tools-0:2.6.6-51.el6.x86_64", "6Server:tkinter-0:2.6.6-51.el6.i686", "6Server:tkinter-0:2.6.6-51.el6.ppc64", "6Server:tkinter-0:2.6.6-51.el6.s390x", "6Server:tkinter-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-0:2.6.6-51.el6.i686", "6Workstation-optional:python-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-0:2.6.6-51.el6.src", "6Workstation-optional:python-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.i686", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-devel-0:2.6.6-51.el6.i686", "6Workstation-optional:python-devel-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-devel-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-devel-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-libs-0:2.6.6-51.el6.i686", "6Workstation-optional:python-libs-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-libs-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-libs-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-test-0:2.6.6-51.el6.i686", "6Workstation-optional:python-test-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-test-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-test-0:2.6.6-51.el6.x86_64", "6Workstation-optional:python-tools-0:2.6.6-51.el6.i686", "6Workstation-optional:python-tools-0:2.6.6-51.el6.ppc64", "6Workstation-optional:python-tools-0:2.6.6-51.el6.s390x", "6Workstation-optional:python-tools-0:2.6.6-51.el6.x86_64", "6Workstation-optional:tkinter-0:2.6.6-51.el6.i686", "6Workstation-optional:tkinter-0:2.6.6-51.el6.ppc64", "6Workstation-optional:tkinter-0:2.6.6-51.el6.s390x", "6Workstation-optional:tkinter-0:2.6.6-51.el6.x86_64", "6Workstation:python-0:2.6.6-51.el6.i686", "6Workstation:python-0:2.6.6-51.el6.ppc64", "6Workstation:python-0:2.6.6-51.el6.s390x", "6Workstation:python-0:2.6.6-51.el6.src", "6Workstation:python-0:2.6.6-51.el6.x86_64", "6Workstation:python-debuginfo-0:2.6.6-51.el6.i686", "6Workstation:python-debuginfo-0:2.6.6-51.el6.ppc64", "6Workstation:python-debuginfo-0:2.6.6-51.el6.s390x", "6Workstation:python-debuginfo-0:2.6.6-51.el6.x86_64", "6Workstation:python-devel-0:2.6.6-51.el6.i686", "6Workstation:python-devel-0:2.6.6-51.el6.ppc64", "6Workstation:python-devel-0:2.6.6-51.el6.s390x", "6Workstation:python-devel-0:2.6.6-51.el6.x86_64", "6Workstation:python-libs-0:2.6.6-51.el6.i686", "6Workstation:python-libs-0:2.6.6-51.el6.ppc64", "6Workstation:python-libs-0:2.6.6-51.el6.s390x", "6Workstation:python-libs-0:2.6.6-51.el6.x86_64", "6Workstation:python-test-0:2.6.6-51.el6.i686", "6Workstation:python-test-0:2.6.6-51.el6.ppc64", "6Workstation:python-test-0:2.6.6-51.el6.s390x", "6Workstation:python-test-0:2.6.6-51.el6.x86_64", "6Workstation:python-tools-0:2.6.6-51.el6.i686", "6Workstation:python-tools-0:2.6.6-51.el6.ppc64", "6Workstation:python-tools-0:2.6.6-51.el6.s390x", "6Workstation:python-tools-0:2.6.6-51.el6.x86_64", "6Workstation:tkinter-0:2.6.6-51.el6.i686", "6Workstation:tkinter-0:2.6.6-51.el6.ppc64", "6Workstation:tkinter-0:2.6.6-51.el6.s390x", "6Workstation:tkinter-0:2.6.6-51.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python: hostname check bypassing vulnerability in SSL module" } ] }
rhsa-2013_1527
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated rhev-hypervisor6 package that fixes multiple security issues and\none bug is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nUpgrade Note: If you upgrade the Red Hat Enterprise Virtualization\nHypervisor through the 3.2 Manager administration portal, the Host may\nappear with the status of \"Install Failed\". If this happens, place the host\ninto maintenance mode, then activate it again to get the host back to an\n\"Up\" state.\n\nA buffer overflow flaw was found in the way QEMU processed the SCSI \"REPORT\nLUNS\" command when more than 256 LUNs were specified for a single SCSI\ntarget. A privileged guest user could use this flaw to corrupt QEMU process\nmemory on the host, which could potentially result in arbitrary code\nexecution on the host with the privileges of the QEMU process.\n(CVE-2013-4344)\n\nMultiple flaws were found in the way Linux kernel handled HID (Human\nInterface Device) reports. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate their\nprivileges on the system. (CVE-2013-2888, CVE-2013-2889, CVE-2013-2892)\n\nA flaw was found in the way the Python SSL module handled X.509 certificate\nfields that contain a NULL byte. An attacker could potentially exploit this\nflaw to conduct man-in-the-middle attacks to spoof SSL servers. Note that\nto exploit this issue, an attacker would need to obtain a carefully crafted\ncertificate signed by an authority that the client trusts. (CVE-2013-4238)\n\nThe default OpenSSH configuration made it easy for remote attackers to\nexhaust unauthorized connection slots and prevent other users from being\nable to log in to a system. This flaw has been addressed by enabling random\nearly connection drops by setting MaxStartups to 10:30:100 by default.\nFor more information, refer to the sshd_config(5) man page. (CVE-2010-5107)\n\nThe CVE-2013-4344 issue was discovered by Asias He of Red Hat.\n\nThis updated package provides updated components that include fixes for\nvarious security issues. These issues have no security impact on Red Hat\nEnterprise Virtualization Hypervisor itself, however. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2012-0786 and CVE-2012-0787 (augeas issues)\n\nCVE-2013-1813 (busybox issue)\n\nCVE-2013-0221, CVE-2013-0222, and CVE-2013-0223 (coreutils issues)\n\nCVE-2012-4453 (dracut issue)\n\nCVE-2013-4332, CVE-2013-0242, and CVE-2013-1914 (glibc issues)\n\nCVE-2013-4387, CVE-2013-0343, CVE-2013-4345, CVE-2013-4591, CVE-2013-4592,\nCVE-2012-6542, CVE-2013-3231, CVE-2013-1929, CVE-2012-6545, CVE-2013-1928,\nCVE-2013-2164, CVE-2013-2234, and CVE-2013-2851 (kernel issues)\n\nCVE-2013-4242 (libgcrypt issue)\n\nCVE-2013-4419 (libguestfs issue)\n\nCVE-2013-1775, CVE-2013-2776, and CVE-2013-2777 (sudo issues)\n\nThis update also fixes the following bug:\n\n* A previous version of the rhev-hypervisor6 package did not contain the\nlatest vhostmd package, which provides a \"metrics communication channel\"\nbetween a host and its hosted virtual machines, allowing limited\nintrospection of host resource usage from within virtual machines. This has\nbeen fixed, and rhev-hypervisor6 now includes the latest vhostmd package.\n(BZ#1026703)\n\nThis update also contains the fixes from the following errata:\n\n* ovirt-node: https://rhn.redhat.com/errata/RHBA-2013-1528.html\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package, which corrects these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1527", "url": "https://access.redhat.com/errata/RHSA-2013:1527" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHBA-2013-1528.html", "url": "https://rhn.redhat.com/errata/RHBA-2013-1528.html" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html" }, { "category": "external", "summary": "908060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908060" }, { "category": "external", "summary": "908707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908707" }, { "category": "external", "summary": "996381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" }, { "category": "external", "summary": "999890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=999890" }, { "category": "external", "summary": "1000429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000429" }, { "category": "external", "summary": "1000451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000451" }, { "category": "external", "summary": "1007330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007330" }, { "category": "external", "summary": "1026703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026703" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1527.json" } ], "title": "Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update", "tracking": { "current_release_date": "2024-11-05T18:14:30+00:00", "generator": { "date": "2024-11-05T18:14:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2013:1527", "initial_release_date": "2013-11-21T04:40:00+00:00", "revision_history": [ { "date": "2013-11-21T04:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-11-21T04:47:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:14:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV Hypervisor for RHEL-6", "product": { "name": "RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::hypervisor" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch", "product": { "name": "rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch", "product_id": "rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20131115.0.3.2.el6_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch as a component of RHEV Hypervisor for RHEL-6", "product_id": "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" }, "product_reference": "rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch", "relates_to_product_reference": "6Server-RHEV-Hypervisor" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-5107", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2013-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "908707" } ], "notes": [ { "category": "description", "text": "The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: Prevent connection slot exhaustion attacks", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-5107" }, { "category": "external", "summary": "RHBZ#908707", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=908707" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-5107", "url": "https://www.cve.org/CVERecord?id=CVE-2010-5107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-5107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5107" } ], "release_date": "2013-02-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-11-21T04:40:00+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1527" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssh: Prevent connection slot exhaustion attacks" }, { "cve": "CVE-2013-2888", "discovery_date": "2013-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1000451" } ], "notes": [ { "category": "description", "text": "Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: HID: memory corruption flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nNote: user would need physical access to the system to exploit this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2888" }, { "category": "external", "summary": "RHBZ#1000451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000451" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2888", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2888" } ], "release_date": "2013-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-11-21T04:40:00+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1527" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: HID: memory corruption flaw" }, { "cve": "CVE-2013-2889", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2013-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "999890" } ], "notes": [ { "category": "description", "text": "drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: HID: zeroplus: heap overflow flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6. Future kernel updates for Red Hat Enterprise Linux 6 may address this issue.\n\nNote: A user would need physical access to the system in order to exploit this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2889" }, { "category": "external", "summary": "RHBZ#999890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=999890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2889", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2889" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2889", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2889" } ], "release_date": "2013-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-11-21T04:40:00+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1527" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: HID: zeroplus: heap overflow flaw" }, { "cve": "CVE-2013-2892", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2013-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1000429" } ], "notes": [ { "category": "description", "text": "drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: HID: pantherlord: heap overflow flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2 may address this issue.\n\nNote: user would need physical access to the system to exploit this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2892" }, { "category": "external", "summary": "RHBZ#1000429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2892", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2892" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2892", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2892" } ], "release_date": "2013-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-11-21T04:40:00+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1527" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: HID: pantherlord: heap overflow flaw" }, { "cve": "CVE-2013-4238", "discovery_date": "2013-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "996381" } ], "notes": [ { "category": "description", "text": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "title": "Vulnerability description" }, { "category": "summary", "text": "python: hostname check bypassing vulnerability in SSL module", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of python as shipped with Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4238" }, { "category": "external", "summary": "RHBZ#996381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4238", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4238" } ], "release_date": "2013-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-11-21T04:40:00+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1527" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python: hostname check bypassing vulnerability in SSL module" }, { "acknowledgments": [ { "names": [ "Asias He" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-4344", "discovery_date": "2013-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1007330" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the SCSI implementation in QEMU, as used in Xen, when a SCSI controller has more than 256 attached devices, allows local users to gain privileges via a small transfer buffer in a REPORT LUNS command.", "title": "Vulnerability description" }, { "category": "summary", "text": "qemu: buffer overflow in scsi_target_emulate_report_luns", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the kvm and xen packages as shipped with Red Hat Enterprise Linux 5.\n\nThis issue does affect the qemu-kvm package as shipped with Red Hat Enterprise Linux 6. Future qemu-kvm updates in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4344" }, { "category": "external", "summary": "RHBZ#1007330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1007330" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4344", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4344" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4344", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4344" } ], "release_date": "2013-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-11-21T04:40:00+00:00", "details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", "product_ids": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1527" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-Hypervisor:rhev-hypervisor6-0:6.5-20131115.0.3.2.el6_5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "qemu: buffer overflow in scsi_target_emulate_report_luns" } ] }
gsd-2013-4238
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2013-4238", "description": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "id": "GSD-2013-4238", "references": [ "https://www.suse.com/security/cve/CVE-2013-4238.html", "https://www.debian.org/security/2014/dsa-2880", "https://access.redhat.com/errata/RHSA-2013:1582", "https://access.redhat.com/errata/RHSA-2013:1527", "https://advisories.mageia.org/CVE-2013-4238.html", "https://alas.aws.amazon.com/cve/html/CVE-2013-4238.html", "https://linux.oracle.com/cve/CVE-2013-4238.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-4238" ], "details": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "id": "GSD-2013-4238", "modified": "2023-12-13T01:22:16.616823Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4238", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" }, { "name": "http://seclists.org/fulldisclosure/2014/Dec/23", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "http://www.securityfocus.com/archive/1/534161/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "http://bugs.python.org/issue18709", "refsource": "MISC", "url": "http://bugs.python.org/issue18709" }, { "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2013-1582.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2013-1582.html" }, { "name": "http://www.debian.org/security/2014/dsa-2880", "refsource": "MISC", "url": "http://www.debian.org/security/2014/dsa-2880" }, { "name": "http://www.ubuntu.com/usn/USN-1982-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-1982-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996381", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:python:python:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.2.2150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.2150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.4:alpha1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.6150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:x64:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.2150:*:*:*:*:*:x64:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.3:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4238" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=996381", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" }, { "name": "http://bugs.python.org/issue18709", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://bugs.python.org/issue18709" }, { "name": "openSUSE-SU-2013:1439", "refsource": "SUSE", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" }, { "name": "openSUSE-SU-2013:1437", "refsource": "SUSE", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" }, { "name": "openSUSE-SU-2013:1440", "refsource": "SUSE", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" }, { "name": "openSUSE-SU-2013:1438", "refsource": "SUSE", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" }, { "name": "openSUSE-SU-2013:1463", "refsource": "SUSE", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" }, { "name": "openSUSE-SU-2013:1462", "refsource": "SUSE", "tags": [ "Vendor Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" }, { "name": "USN-1982-1", "refsource": "UBUNTU", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1982-1" }, { "name": "RHSA-2013:1582", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1582.html" }, { "name": "DSA-2880", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-2880" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "FULLDISC", "tags": [], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "name": "20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "name": "openSUSE-SU-2020:0086", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2019-10-25T11:53Z", "publishedDate": "2013-08-18T02:52Z" } } }
var-201308-0259
Vulnerability from variot
The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. SSL A vulnerability that impersonates a server exists. Python is prone to a security-bypass vulnerability because the application fails to properly validate SSL certificates from the server. An attacker can exploit this issue to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. Summary
VMware vSphere product updates address a Cross Site Scripting issue, a certificate validation issue and security vulnerabilities in third-party libraries. Relevant releases
VMware vCenter Server Appliance 5.1 Prior to Update 3
VMware vCenter Server 5.5 prior to Update 2 VMware vCenter Server 5.1 prior to Update 3 VMware vCenter Server 5.0 prior to Update 3c
VMware ESXi 5.1 without patch ESXi510-201412101-SG
- Problem Description
a. VMware vCSA cross-site scripting vulnerability
VMware vCenter Server Appliance (vCSA) contains a vulnerability
that may allow for Cross Site Scripting. Exploitation of this
vulnerability in vCenter Server requires tricking a user to click
on a malicious link or to open a malicious web page while they are
logged in into vCenter.
VMware would like to thank Tanya Secker of Trustwave SpiderLabs for
reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2014-3797 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCSA 5.5 any Not Affected
vCSA 5.1 any 5.1 Update 3
vCSA 5.0 any Not Affected
b. vCenter Server certificate validation issue
vCenter Server does not properly validate the presented certificate
when establishing a connection to a CIM Server residing on an ESXi
host. This may allow for a Man-in-the-middle attack against the CIM
service.
VMware would like to thank The Google Security Team for reporting
this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2014-8371 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= ==============
vCenter Server 5.5 any 5.5 Update 2
vCenter Server 5.1 any 5.1 Update 3
vCenter Server 5.0 any 5.0 Update 3c
c. Update to ESXi libxml2 package
libxml2 is updated to address multiple security issues.
The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2013-2877 and
CVE-2014-0191 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 any Patch Pending
ESXi 5.1 any ESXi510-201412101-SG
ESXi 5.0 any No patch planned
d. Update to ESXi Curl package
Curl is updated to address multiple security issues.
The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2014-0015 and
CVE-2014-0138 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
========= ======= ======= =================
ESXi 5.5 any Patch Pending
ESXi 5.1 any ESXi510-201412101-SG
ESXi 5.0 any No patch planned
e.
The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2013-1752 and
CVE-2013-4238 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 any Patch Pending
ESXi 5.1 any ESXi510-201412101-SG
ESXi 5.0 any Patch Pending
f. vCenter and Update Manager, Oracle JRE 1.6 Update 81
Oracle has documented the CVE identifiers that are addressed in
JRE 1.6.0 update 81 in the Oracle Java SE Critical Patch Update
Advisory of July 2014. The References section provides a link to
this advisory.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCenter Server 5.5 any not applicable *
vCenter Server 5.1 any 5.1 Update 3
vCenter Server 5.0 any patch pending
vCenter Update Manager 5.5 any not applicable *
vCenter Update Manager 5.1 any 5.1 Update 3
vCenter Update Manager 5.0 any patch pending
* this product uses the Oracle JRE 1.7.0 family
- Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
vCSA 5.1 Update 3, vCenter Server 5.1 Update 3 and Update Manager 5.1 Update 3
Downloads and Documentation: https://www.vmware.com/go/download-vsphere
ESXi 5.1
File: update-from-esxi5.1-5.1_update03.zip.zip md5sum: b3fd3549b59c6c59c04bfd09b08c6edf sha1sum: 02139101fe205894774caac02820f6ea8416fb8b http://kb.vmware.com/kb/2086288 update-from-esxi5.1-5.1_update03 contains ESXi510-201412101-SG
- References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3797 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8371 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238
JRE Oracle Java SE Critical Patch Update Advisory of July 2014
http://www.oracle.com/technetwork/topics/security/cpujul2014- 1972956.html
- Change log
2014-12-04 VMSA-2014-0012 Initial security advisory in conjunction with the release of VMware vCSA 5.1 Update 3, vCenter Server 5.1 Update 3 and ESXi 5.1 Patches released on 2014-12-04. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories http://kb.vmware.com/kb/2078735
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html
Twitter https://twitter.com/VMwareSRC
Copyright 2014 VMware Inc. All rights reserved. Relevant releases/architectures:
RHEV Hypervisor for RHEL-6 - noarch
- The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for the Intel 64 and AMD64 architectures with virtualization extensions.
Upgrade Note: If you upgrade the Red Hat Enterprise Virtualization Hypervisor through the 3.2 Manager administration portal, the Host may appear with the status of "Install Failed". If this happens, place the host into maintenance mode, then activate it again to get the host back to an "Up" state.
A buffer overflow flaw was found in the way QEMU processed the SCSI "REPORT LUNS" command when more than 256 LUNs were specified for a single SCSI target. A privileged guest user could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2013-4344)
Multiple flaws were found in the way Linux kernel handled HID (Human Interface Device) reports. An attacker with physical access to the system could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2013-4238)
The default OpenSSH configuration made it easy for remote attackers to exhaust unauthorized connection slots and prevent other users from being able to log in to a system. This flaw has been addressed by enabling random early connection drops by setting MaxStartups to 10:30:100 by default. For more information, refer to the sshd_config(5) man page. The security fixes included in this update address the following CVE numbers:
CVE-2012-0786 and CVE-2012-0787 (augeas issues)
CVE-2013-1813 (busybox issue)
CVE-2013-0221, CVE-2013-0222, and CVE-2013-0223 (coreutils issues)
CVE-2012-4453 (dracut issue)
CVE-2013-4332, CVE-2013-0242, and CVE-2013-1914 (glibc issues)
CVE-2013-4387, CVE-2013-0343, CVE-2013-4345, CVE-2013-4591, CVE-2013-4592, CVE-2012-6542, CVE-2013-3231, CVE-2013-1929, CVE-2012-6545, CVE-2013-1928, CVE-2013-2164, CVE-2013-2234, and CVE-2013-2851 (kernel issues)
CVE-2013-4242 (libgcrypt issue)
CVE-2013-4419 (libguestfs issue)
CVE-2013-1775, CVE-2013-2776, and CVE-2013-2777 (sudo issues)
This update also fixes the following bug:
- A previous version of the rhev-hypervisor6 package did not contain the latest vhostmd package, which provides a "metrics communication channel" between a host and its hosted virtual machines, allowing limited introspection of host resource usage from within virtual machines. This has been fixed, and rhev-hypervisor6 now includes the latest vhostmd package. Bugs fixed (https://bugzilla.redhat.com/):
908060 - rhev-hypervisor 6.5 release 908707 - CVE-2010-5107 openssh: Prevent connection slot exhaustion attacks 996381 - CVE-2013-4238 python: hostname check bypassing vulnerability in SSL module 999890 - CVE-2013-2889 Kernel: HID: zeroplus: heap overflow flaw 1000429 - CVE-2013-2892 Kernel: HID: pantherlord: heap overflow flaw 1000451 - CVE-2013-2888 Kernel: HID: memory corruption flaw 1007330 - CVE-2013-4344 qemu: buffer overflow in scsi_target_emulate_report_luns 1026703 - Latest vhostmd package is not built in
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: python security, bug fix, and enhancement update Advisory ID: RHSA-2013:1582-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-1582.html Issue date: 2013-11-21 CVE Names: CVE-2013-4238 =====================================================================
- Summary:
Updated python packages that fix one security issue, several bugs, and add one enhancement are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
Python is an interpreted, interactive, object-oriented programming language. Note that to exploit this issue, an attacker would need to obtain a carefully crafted certificate signed by an authority that the client trusts. (CVE-2013-4238)
These updated python packages include numerous bug fixes and one enhancement. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.5 Technical Notes, linked to in the References, for information on the most significant of these changes.
All users of python are advised to upgrade to these updated packages, which fix these issues and add this enhancement.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
521898 - Fix instances of #!/usr/bin/env python in python-tools 841937 - RHEL 6 installation fails when Turkish language is selected 845802 - python prepends UTF-8 BOM syslog messages - causes messages to be treated a EMERG level 893034 - yum traceback with python-2.6.6-29.el6_2.2 and higher + missing /dev/urandom 919163 - python logging problem - when rotating to new log file, logger checks file's stat when the file does not exist 928390 - Python SSLSocket.getpeercert() incorrectly returns an empty Subject Alternative Name from peer certificate. 948025 - SocketServer doesn't handle syscall interruption 958868 - Downstream added "timeout=None" keyword argument causes regression in eventlet 960168 - failed incoming SSL connection stays open 978129 - Please consider to backport patch: issue9374 urlparse should parse query and fragment for arbitrary schemes 996381 - CVE-2013-4238 python: hostname check bypassing vulnerability in SSL module
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/python-2.6.6-51.el6.src.rpm
i386: python-2.6.6-51.el6.i686.rpm python-debuginfo-2.6.6-51.el6.i686.rpm python-libs-2.6.6-51.el6.i686.rpm tkinter-2.6.6-51.el6.i686.rpm
x86_64: python-2.6.6-51.el6.x86_64.rpm python-debuginfo-2.6.6-51.el6.x86_64.rpm python-libs-2.6.6-51.el6.x86_64.rpm tkinter-2.6.6-51.el6.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/python-2.6.6-51.el6.src.rpm
i386: python-debuginfo-2.6.6-51.el6.i686.rpm python-devel-2.6.6-51.el6.i686.rpm python-test-2.6.6-51.el6.i686.rpm python-tools-2.6.6-51.el6.i686.rpm
x86_64: python-debuginfo-2.6.6-51.el6.x86_64.rpm python-devel-2.6.6-51.el6.x86_64.rpm python-test-2.6.6-51.el6.x86_64.rpm python-tools-2.6.6-51.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/python-2.6.6-51.el6.src.rpm
x86_64: python-2.6.6-51.el6.x86_64.rpm python-debuginfo-2.6.6-51.el6.x86_64.rpm python-devel-2.6.6-51.el6.x86_64.rpm python-libs-2.6.6-51.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/python-2.6.6-51.el6.src.rpm
x86_64: python-debuginfo-2.6.6-51.el6.x86_64.rpm python-test-2.6.6-51.el6.x86_64.rpm python-tools-2.6.6-51.el6.x86_64.rpm tkinter-2.6.6-51.el6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/python-2.6.6-51.el6.src.rpm
i386: python-2.6.6-51.el6.i686.rpm python-debuginfo-2.6.6-51.el6.i686.rpm python-devel-2.6.6-51.el6.i686.rpm python-libs-2.6.6-51.el6.i686.rpm tkinter-2.6.6-51.el6.i686.rpm
ppc64: python-2.6.6-51.el6.ppc64.rpm python-debuginfo-2.6.6-51.el6.ppc64.rpm python-devel-2.6.6-51.el6.ppc64.rpm python-libs-2.6.6-51.el6.ppc64.rpm tkinter-2.6.6-51.el6.ppc64.rpm
s390x: python-2.6.6-51.el6.s390x.rpm python-debuginfo-2.6.6-51.el6.s390x.rpm python-devel-2.6.6-51.el6.s390x.rpm python-libs-2.6.6-51.el6.s390x.rpm
x86_64: python-2.6.6-51.el6.x86_64.rpm python-debuginfo-2.6.6-51.el6.x86_64.rpm python-devel-2.6.6-51.el6.x86_64.rpm python-libs-2.6.6-51.el6.x86_64.rpm tkinter-2.6.6-51.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/python-2.6.6-51.el6.src.rpm
i386: python-debuginfo-2.6.6-51.el6.i686.rpm python-test-2.6.6-51.el6.i686.rpm python-tools-2.6.6-51.el6.i686.rpm
ppc64: python-debuginfo-2.6.6-51.el6.ppc64.rpm python-test-2.6.6-51.el6.ppc64.rpm python-tools-2.6.6-51.el6.ppc64.rpm
s390x: python-debuginfo-2.6.6-51.el6.s390x.rpm python-test-2.6.6-51.el6.s390x.rpm python-tools-2.6.6-51.el6.s390x.rpm tkinter-2.6.6-51.el6.s390x.rpm
x86_64: python-debuginfo-2.6.6-51.el6.x86_64.rpm python-test-2.6.6-51.el6.x86_64.rpm python-tools-2.6.6-51.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/python-2.6.6-51.el6.src.rpm
i386: python-2.6.6-51.el6.i686.rpm python-debuginfo-2.6.6-51.el6.i686.rpm python-devel-2.6.6-51.el6.i686.rpm python-libs-2.6.6-51.el6.i686.rpm tkinter-2.6.6-51.el6.i686.rpm
x86_64: python-2.6.6-51.el6.x86_64.rpm python-debuginfo-2.6.6-51.el6.x86_64.rpm python-devel-2.6.6-51.el6.x86_64.rpm python-libs-2.6.6-51.el6.x86_64.rpm tkinter-2.6.6-51.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/python-2.6.6-51.el6.src.rpm
i386: python-debuginfo-2.6.6-51.el6.i686.rpm python-test-2.6.6-51.el6.i686.rpm python-tools-2.6.6-51.el6.i686.rpm
x86_64: python-debuginfo-2.6.6-51.el6.x86_64.rpm python-test-2.6.6-51.el6.x86_64.rpm python-tools-2.6.6-51.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2013-4238.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.5_Technical_Notes/python.html#RHSA-2013-1582
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFSjYqsXlSAg2UNWIIRAuMMAJwM8jw9rPAfeyuTRa3MRzo4uld8KACfQjmk XBl65OiG/woL4p1WaTgJdK0= =MrR1 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ============================================================================ Ubuntu Security Notice USN-1983-1 October 01, 2013
python2.7 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Python. An attacker could exploit this to cause Python to consume resources, resulting in a denial of service. This issue only affected Ubuntu 13.04. (CVE-2013-4238)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.04: python2.7 2.7.4-2ubuntu3.2 python2.7-minimal 2.7.4-2ubuntu3.2
Ubuntu 12.10: python2.7 2.7.3-5ubuntu4.3 python2.7-minimal 2.7.3-5ubuntu4.3
Ubuntu 12.04 LTS: python2.7 2.7.3-0ubuntu3.4 python2.7-minimal 2.7.3-0ubuntu3.4
In general, a standard system update will make all the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201308-0259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "python", "scope": "eq", "trust": 1.6, "vendor": "python", "version": "3.1.1" }, { "model": "python", "scope": "eq", "trust": 1.6, "vendor": "python", "version": "3.1" }, { "model": "python", "scope": "eq", "trust": 1.6, "vendor": "python", "version": "3.1.2" }, { "model": "python", "scope": "eq", "trust": 1.6, "vendor": "python", "version": "2.7.3" }, { "model": "python", "scope": "eq", "trust": 1.6, "vendor": "python", "version": "3.1.2150" }, { "model": "python", "scope": "eq", "trust": 1.6, "vendor": "python", "version": "3.0.1" }, { "model": "python", "scope": "eq", "trust": 1.6, "vendor": "python", "version": "3.1.5" }, { "model": "python", "scope": "eq", "trust": 1.6, "vendor": "python", "version": "3.0" }, { "model": "python", "scope": "eq", "trust": 1.6, "vendor": "python", "version": "3.1.4" }, { "model": "python", "scope": "eq", "trust": 1.6, "vendor": "python", "version": "3.1.3" }, { "model": "esxi", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "5.0" }, { "model": "esxi", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "5.5" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "12.3" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.6.4" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "3.2.3" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.7.1150" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "3.2" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.6.2150" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.6.5" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.6.7" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "11.4" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.7.2" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.6.3" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.6.6" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.6.8" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.6.6150" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "3.2.2150" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.6.1" }, { "model": "opensuse", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "12.2" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.7.1" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "3.3" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.7.2150" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "3.4" }, { "model": "python", "scope": "eq", "trust": 1.0, "vendor": "python", "version": "2.6.2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "10.04" }, { "model": "esxi", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "5.1 esxi510-201412101-sg" }, { "model": "opensuse", "scope": "eq", "trust": 0.8, "vendor": "novell", "version": "12.2" }, { "model": "python", "scope": "eq", "trust": 0.8, "vendor": "python", "version": "2.6 to 3.4" }, { "model": "esxi", "scope": "lt", "trust": 0.8, "vendor": "vmware", "version": "5.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.8, "vendor": "novell", "version": "11.4" }, { "model": "ubuntu", "scope": "eq", "trust": 0.8, "vendor": "canonical", "version": "10.04 lts" }, { "model": "opensuse", "scope": "eq", "trust": 0.8, "vendor": "novell", "version": "12.3" }, { "model": "big-ip wom hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "big-ip apm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "big-ip webaccelerator hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip gtm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "cms", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "17.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.0" }, { "model": "esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "5.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip asm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "solaris", "scope": "ne", "trust": 0.3, "vendor": "oracle", "version": "11.1.12.5.0" }, { "model": "linux enterprise software development kit sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "big-ip edge gateway hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip psm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "software foundation python", "scope": "eq", "trust": 0.3, "vendor": "python", "version": "3.2" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.10" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.10" }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip webaccelerator hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "software foundation python", "scope": "eq", "trust": 0.3, "vendor": "python", "version": "2.7.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.40" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "11.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip link controller hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "linux enterprise server sp3 for vmware", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "13.04" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip ltm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip analytics hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "big-ip edge gateway hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "software foundation python", "scope": "eq", "trust": 0.3, "vendor": "python", "version": "3.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.0" }, { "model": "big-ip psm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip gtm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip apm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip psm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip wom hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip asm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "software foundation python", "scope": "ne", "trust": 0.3, "vendor": "python", "version": "2.7.6" }, { "model": "cms r17", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "software foundation python", "scope": "ne", "trust": 0.3, "vendor": "python", "version": "3.3.3" }, { "model": "big-ip link controller hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip edge gateway hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "big-ip webaccelerator hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.2" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip wom hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip link controller hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip edge gateway hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "big-ip psm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip webaccelerator hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip wom hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip analytics 11.0.0-hf2", "scope": null, "trust": 0.3, "vendor": "f5", "version": null }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip afm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "ip office server edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.1" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "one-x client enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip edge gateway hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip psm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip apm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "aura collaboration environment", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "linux enterprise desktop sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip apm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "big-ip wom hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "aura experience portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "big-ip gtm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "big-ip webaccelerator hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip link controller hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip psm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.3" }, { "model": "software foundation python", "scope": "eq", "trust": 0.3, "vendor": "python", "version": "2.6" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip apm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "libreoffice", "scope": "ne", "trust": 0.3, "vendor": "libreoffice", "version": "4.2.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip psm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "big-ip webaccelerator hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "enterprise virtualization hypervisor for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "60" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "big-ip apm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "libreoffice", "scope": "ne", "trust": 0.3, "vendor": "libreoffice", "version": "4.1.5" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "aura experience portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "esxi esxi510-20141210", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "5.5" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0.00" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "big-ip analytics hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.3" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "big-ip psm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "big-ip gtm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.3" }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip wom hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "big-ip analytics hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "aura utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.00" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip gtm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "9.0" }, { "model": "big-ip psm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1" }, { "model": "big-ip pem hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "software foundation python", "scope": "eq", "trust": 0.3, "vendor": "python", "version": "3.4" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip edge gateway hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.4" }, { "model": "big-ip edge gateway hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.6.0" }, { "model": "software foundation python", "scope": "eq", "trust": 0.3, "vendor": "python", "version": "2.7" }, { "model": "big-ip psm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" } ], "sources": [ { "db": "BID", "id": "61738" }, { "db": "JVNDB", "id": "JVNDB-2013-003780" }, { "db": "CNNVD", "id": "CNNVD-201308-202" }, { "db": "NVD", "id": "CVE-2013-4238" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:python:python:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.2150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.2.2150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.2150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.2:alpha:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.4:alpha1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.6.6150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.1150:*:*:*:*:*:x64:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:2.7.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.1.2150:*:*:*:*:*:x64:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:python:python:3.3:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-4238" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ryan Sleevi of the Google Chrome Security Team", "sources": [ { "db": "BID", "id": "61738" }, { "db": "CNNVD", "id": "CNNVD-201308-202" } ], "trust": 0.9 }, "cve": "CVE-2013-4238", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2013-4238", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-4238", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201308-202", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003780" }, { "db": "CNNVD", "id": "CNNVD-201308-202" }, { "db": "NVD", "id": "CVE-2013-4238" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. SSL A vulnerability that impersonates a server exists. Python is prone to a security-bypass vulnerability because the application fails to properly validate SSL certificates from the server. \nAn attacker can exploit this issue to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. Summary\n\n VMware vSphere product updates address a Cross Site Scripting issue, \n a certificate validation issue and security vulnerabilities in \n third-party libraries. Relevant releases\n\n VMware vCenter Server Appliance 5.1 Prior to Update 3 \n\n VMware vCenter Server 5.5 prior to Update 2\n VMware vCenter Server 5.1 prior to Update 3\n VMware vCenter Server 5.0 prior to Update 3c\n\n VMware ESXi 5.1 without patch ESXi510-201412101-SG\n\n3. Problem Description \n\n a. VMware vCSA cross-site scripting vulnerability\n\n VMware vCenter Server Appliance (vCSA) contains a vulnerability\n that may allow for Cross Site Scripting. Exploitation of this \n vulnerability in vCenter Server requires tricking a user to click\n on a malicious link or to open a malicious web page while they are\n logged in into vCenter. \n\n VMware would like to thank Tanya Secker of Trustwave SpiderLabs for \n reporting this issue to us. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) \n has assigned the name CVE-2014-3797 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product\tRunning Replace with/\n Product Version\ton Apply Patch\n ============= =======\t======= =================\n vCSA 5.5 any Not Affected\n vCSA 5.1 any 5.1 Update 3\n vCSA 5.0 any Not Affected\n\n b. vCenter Server certificate validation issue\n\n vCenter Server does not properly validate the presented certificate \n when establishing a connection to a CIM Server residing on an ESXi \n host. This may allow for a Man-in-the-middle attack against the CIM \n service. \n\n VMware would like to thank The Google Security Team for reporting \n this issue to us. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifier CVE-2014-8371 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= =======\t======= ==============\n vCenter Server 5.5 any 5.5 Update 2\n vCenter Server 5.1 any 5.1 Update 3\n vCenter Server 5.0 any 5.0 Update 3c\n\n c. Update to ESXi libxml2 package\n\n libxml2 is updated to address multiple security issues. \n\n The Common Vulnerabilities and Exposures project \n (cve.mitre.org) has assigned the names CVE-2013-2877 and\n CVE-2014-0191 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n ESXi 5.5 any Patch Pending\n ESXi 5.1 any ESXi510-201412101-SG\n ESXi 5.0 any No patch planned\n\n d. Update to ESXi Curl package\n\n Curl is updated to address multiple security issues. \n\n The Common Vulnerabilities and Exposures project \n (cve.mitre.org) has assigned the names CVE-2014-0015 and \n CVE-2014-0138 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product\tRunning Replace with/\n Product Version\ton Apply Patch\n ========= =======\t======= =================\n ESXi 5.5 any Patch Pending\n ESXi 5.1 any ESXi510-201412101-SG\n ESXi 5.0 any No patch planned\n\n e. \n\n The Common Vulnerabilities and Exposures project \n (cve.mitre.org) has assigned the names CVE-2013-1752 and \n CVE-2013-4238 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is \n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n ESXi 5.5 any Patch Pending\n ESXi 5.1 any ESXi510-201412101-SG\n ESXi 5.0 any Patch Pending\n\n f. vCenter and Update Manager, Oracle JRE 1.6 Update 81\n\n Oracle has documented the CVE identifiers that are addressed in \n JRE 1.6.0 update 81 in the Oracle Java SE Critical Patch Update\n Advisory of July 2014. The References section provides a link to\n this advisory. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======= ======= =================\n vCenter Server 5.5 any not applicable *\n vCenter Server 5.1 any 5.1 Update 3\n vCenter Server 5.0 any patch pending\n vCenter Update Manager 5.5 any not applicable *\n vCenter Update Manager 5.1 any 5.1 Update 3\n vCenter Update Manager 5.0 any patch pending\n\n * this product uses the Oracle JRE 1.7.0 family\n\n4. Solution\n\n Please review the patch/release notes for your product and version \n and verify the checksum of your downloaded file. \n \n vCSA 5.1 Update 3, vCenter Server 5.1 Update 3 and Update Manager 5.1\n Update 3\n ----------------------------\n Downloads and Documentation: \n https://www.vmware.com/go/download-vsphere\n\n ESXi 5.1\n ----------------------------\n File: update-from-esxi5.1-5.1_update03.zip.zip\n md5sum: b3fd3549b59c6c59c04bfd09b08c6edf\n sha1sum: 02139101fe205894774caac02820f6ea8416fb8b\n http://kb.vmware.com/kb/2086288\n update-from-esxi5.1-5.1_update03 contains ESXi510-201412101-SG\n \n5. References\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3797\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8371\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238\n\n JRE \n Oracle Java SE Critical Patch Update Advisory of July 2014\n\n http://www.oracle.com/technetwork/topics/security/cpujul2014-\n1972956.html\n\n- ------------------------------------------------------------------------\n\n6. Change log\n\n 2014-12-04 VMSA-2014-0012\n Initial security advisory in conjunction with the release of VMware\n vCSA 5.1 Update 3, vCenter Server 5.1 Update 3 and ESXi 5.1 Patches \n released on 2014-12-04. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n security-announce at lists.vmware.com\n bugtraq at securityfocus.com\n fulldisclosure at seclists.org\n\n E-mail: security at vmware.com\n PGP key at: http://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n Consolidated list of VMware Security Advisories\n http://kb.vmware.com/kb/2078735\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Support Phases\n https://www.vmware.com/support/policies/lifecycle.html\n \n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2014 VMware Inc. All rights reserved. Relevant releases/architectures:\n\nRHEV Hypervisor for RHEL-6 - noarch\n\n3. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. \n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions. \n\nUpgrade Note: If you upgrade the Red Hat Enterprise Virtualization\nHypervisor through the 3.2 Manager administration portal, the Host may\nappear with the status of \"Install Failed\". If this happens, place the host\ninto maintenance mode, then activate it again to get the host back to an\n\"Up\" state. \n\nA buffer overflow flaw was found in the way QEMU processed the SCSI \"REPORT\nLUNS\" command when more than 256 LUNs were specified for a single SCSI\ntarget. A privileged guest user could use this flaw to corrupt QEMU process\nmemory on the host, which could potentially result in arbitrary code\nexecution on the host with the privileges of the QEMU process. \n(CVE-2013-4344)\n\nMultiple flaws were found in the way Linux kernel handled HID (Human\nInterface Device) reports. An attacker with physical access to the system\ncould use this flaw to crash the system or, potentially, escalate their\nprivileges on the system. (CVE-2013-4238)\n\nThe default OpenSSH configuration made it easy for remote attackers to\nexhaust unauthorized connection slots and prevent other users from being\nable to log in to a system. This flaw has been addressed by enabling random\nearly connection drops by setting MaxStartups to 10:30:100 by default. \nFor more information, refer to the sshd_config(5) man page. The security fixes\nincluded in this update address the following CVE numbers:\n\nCVE-2012-0786 and CVE-2012-0787 (augeas issues)\n\nCVE-2013-1813 (busybox issue)\n\nCVE-2013-0221, CVE-2013-0222, and CVE-2013-0223 (coreutils issues)\n\nCVE-2012-4453 (dracut issue)\n\nCVE-2013-4332, CVE-2013-0242, and CVE-2013-1914 (glibc issues)\n\nCVE-2013-4387, CVE-2013-0343, CVE-2013-4345, CVE-2013-4591, CVE-2013-4592,\nCVE-2012-6542, CVE-2013-3231, CVE-2013-1929, CVE-2012-6545, CVE-2013-1928,\nCVE-2013-2164, CVE-2013-2234, and CVE-2013-2851 (kernel issues)\n\nCVE-2013-4242 (libgcrypt issue)\n\nCVE-2013-4419 (libguestfs issue)\n\nCVE-2013-1775, CVE-2013-2776, and CVE-2013-2777 (sudo issues)\n\nThis update also fixes the following bug:\n\n* A previous version of the rhev-hypervisor6 package did not contain the\nlatest vhostmd package, which provides a \"metrics communication channel\"\nbetween a host and its hosted virtual machines, allowing limited\nintrospection of host resource usage from within virtual machines. This has\nbeen fixed, and rhev-hypervisor6 now includes the latest vhostmd package. Bugs fixed (https://bugzilla.redhat.com/):\n\n908060 - rhev-hypervisor 6.5 release\n908707 - CVE-2010-5107 openssh: Prevent connection slot exhaustion attacks\n996381 - CVE-2013-4238 python: hostname check bypassing vulnerability in SSL module\n999890 - CVE-2013-2889 Kernel: HID: zeroplus: heap overflow flaw\n1000429 - CVE-2013-2892 Kernel: HID: pantherlord: heap overflow flaw\n1000451 - CVE-2013-2888 Kernel: HID: memory corruption flaw\n1007330 - CVE-2013-4344 qemu: buffer overflow in scsi_target_emulate_report_luns\n1026703 - Latest vhostmd package is not built in\n\n6. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: python security, bug fix, and enhancement update\nAdvisory ID: RHSA-2013:1582-02\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2013-1582.html\nIssue date: 2013-11-21\nCVE Names: CVE-2013-4238 \n=====================================================================\n\n1. Summary:\n\nUpdated python packages that fix one security issue, several bugs, and add\none enhancement are now available for Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nPython is an interpreted, interactive, object-oriented programming\nlanguage. Note that\nto exploit this issue, an attacker would need to obtain a carefully crafted\ncertificate signed by an authority that the client trusts. (CVE-2013-4238)\n\nThese updated python packages include numerous bug fixes and one\nenhancement. Space precludes documenting all of these changes in this\nadvisory. Users are directed to the Red Hat Enterprise Linux 6.5 Technical\nNotes, linked to in the References, for information on the most significant\nof these changes. \n\nAll users of python are advised to upgrade to these updated packages, which\nfix these issues and add this enhancement. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n521898 - Fix instances of #!/usr/bin/env python in python-tools\n841937 - RHEL 6 installation fails when Turkish language is selected\n845802 - python prepends UTF-8 BOM syslog messages - causes messages to be treated a EMERG level\n893034 - yum traceback with python-2.6.6-29.el6_2.2 and higher + missing /dev/urandom\n919163 - python logging problem - when rotating to new log file, logger checks file\u0027s stat when the file does not exist\n928390 - Python SSLSocket.getpeercert() incorrectly returns an empty Subject Alternative Name from peer certificate. \n948025 - SocketServer doesn\u0027t handle syscall interruption\n958868 - Downstream added \"timeout=None\" keyword argument causes regression in eventlet\n960168 - failed incoming SSL connection stays open\n978129 - Please consider to backport patch: issue9374 urlparse should parse query and fragment for arbitrary schemes\n996381 - CVE-2013-4238 python: hostname check bypassing vulnerability in SSL module\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/python-2.6.6-51.el6.src.rpm\n\ni386:\npython-2.6.6-51.el6.i686.rpm\npython-debuginfo-2.6.6-51.el6.i686.rpm\npython-libs-2.6.6-51.el6.i686.rpm\ntkinter-2.6.6-51.el6.i686.rpm\n\nx86_64:\npython-2.6.6-51.el6.x86_64.rpm\npython-debuginfo-2.6.6-51.el6.x86_64.rpm\npython-libs-2.6.6-51.el6.x86_64.rpm\ntkinter-2.6.6-51.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/python-2.6.6-51.el6.src.rpm\n\ni386:\npython-debuginfo-2.6.6-51.el6.i686.rpm\npython-devel-2.6.6-51.el6.i686.rpm\npython-test-2.6.6-51.el6.i686.rpm\npython-tools-2.6.6-51.el6.i686.rpm\n\nx86_64:\npython-debuginfo-2.6.6-51.el6.x86_64.rpm\npython-devel-2.6.6-51.el6.x86_64.rpm\npython-test-2.6.6-51.el6.x86_64.rpm\npython-tools-2.6.6-51.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/python-2.6.6-51.el6.src.rpm\n\nx86_64:\npython-2.6.6-51.el6.x86_64.rpm\npython-debuginfo-2.6.6-51.el6.x86_64.rpm\npython-devel-2.6.6-51.el6.x86_64.rpm\npython-libs-2.6.6-51.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/python-2.6.6-51.el6.src.rpm\n\nx86_64:\npython-debuginfo-2.6.6-51.el6.x86_64.rpm\npython-test-2.6.6-51.el6.x86_64.rpm\npython-tools-2.6.6-51.el6.x86_64.rpm\ntkinter-2.6.6-51.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/python-2.6.6-51.el6.src.rpm\n\ni386:\npython-2.6.6-51.el6.i686.rpm\npython-debuginfo-2.6.6-51.el6.i686.rpm\npython-devel-2.6.6-51.el6.i686.rpm\npython-libs-2.6.6-51.el6.i686.rpm\ntkinter-2.6.6-51.el6.i686.rpm\n\nppc64:\npython-2.6.6-51.el6.ppc64.rpm\npython-debuginfo-2.6.6-51.el6.ppc64.rpm\npython-devel-2.6.6-51.el6.ppc64.rpm\npython-libs-2.6.6-51.el6.ppc64.rpm\ntkinter-2.6.6-51.el6.ppc64.rpm\n\ns390x:\npython-2.6.6-51.el6.s390x.rpm\npython-debuginfo-2.6.6-51.el6.s390x.rpm\npython-devel-2.6.6-51.el6.s390x.rpm\npython-libs-2.6.6-51.el6.s390x.rpm\n\nx86_64:\npython-2.6.6-51.el6.x86_64.rpm\npython-debuginfo-2.6.6-51.el6.x86_64.rpm\npython-devel-2.6.6-51.el6.x86_64.rpm\npython-libs-2.6.6-51.el6.x86_64.rpm\ntkinter-2.6.6-51.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/python-2.6.6-51.el6.src.rpm\n\ni386:\npython-debuginfo-2.6.6-51.el6.i686.rpm\npython-test-2.6.6-51.el6.i686.rpm\npython-tools-2.6.6-51.el6.i686.rpm\n\nppc64:\npython-debuginfo-2.6.6-51.el6.ppc64.rpm\npython-test-2.6.6-51.el6.ppc64.rpm\npython-tools-2.6.6-51.el6.ppc64.rpm\n\ns390x:\npython-debuginfo-2.6.6-51.el6.s390x.rpm\npython-test-2.6.6-51.el6.s390x.rpm\npython-tools-2.6.6-51.el6.s390x.rpm\ntkinter-2.6.6-51.el6.s390x.rpm\n\nx86_64:\npython-debuginfo-2.6.6-51.el6.x86_64.rpm\npython-test-2.6.6-51.el6.x86_64.rpm\npython-tools-2.6.6-51.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/python-2.6.6-51.el6.src.rpm\n\ni386:\npython-2.6.6-51.el6.i686.rpm\npython-debuginfo-2.6.6-51.el6.i686.rpm\npython-devel-2.6.6-51.el6.i686.rpm\npython-libs-2.6.6-51.el6.i686.rpm\ntkinter-2.6.6-51.el6.i686.rpm\n\nx86_64:\npython-2.6.6-51.el6.x86_64.rpm\npython-debuginfo-2.6.6-51.el6.x86_64.rpm\npython-devel-2.6.6-51.el6.x86_64.rpm\npython-libs-2.6.6-51.el6.x86_64.rpm\ntkinter-2.6.6-51.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/python-2.6.6-51.el6.src.rpm\n\ni386:\npython-debuginfo-2.6.6-51.el6.i686.rpm\npython-test-2.6.6-51.el6.i686.rpm\npython-tools-2.6.6-51.el6.i686.rpm\n\nx86_64:\npython-debuginfo-2.6.6-51.el6.x86_64.rpm\npython-test-2.6.6-51.el6.x86_64.rpm\npython-tools-2.6.6-51.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2013-4238.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.5_Technical_Notes/python.html#RHSA-2013-1582\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2013 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFSjYqsXlSAg2UNWIIRAuMMAJwM8jw9rPAfeyuTRa3MRzo4uld8KACfQjmk\nXBl65OiG/woL4p1WaTgJdK0=\n=MrR1\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ============================================================================\nUbuntu Security Notice USN-1983-1\nOctober 01, 2013\n\npython2.7 vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 13.04\n- Ubuntu 12.10\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in Python. An attacker could exploit this to\ncause Python to consume resources, resulting in a denial of service. This\nissue only affected Ubuntu 13.04. (CVE-2013-4238)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 13.04:\n python2.7 2.7.4-2ubuntu3.2\n python2.7-minimal 2.7.4-2ubuntu3.2\n\nUbuntu 12.10:\n python2.7 2.7.3-5ubuntu4.3\n python2.7-minimal 2.7.3-5ubuntu4.3\n\nUbuntu 12.04 LTS:\n python2.7 2.7.3-0ubuntu3.4\n python2.7-minimal 2.7.3-0ubuntu3.4\n\nIn general, a standard system update will make all the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2013-4238" }, { "db": "JVNDB", "id": "JVNDB-2013-003780" }, { "db": "BID", "id": "61738" }, { "db": "PACKETSTORM", "id": "123471" }, { "db": "PACKETSTORM", "id": "123473" }, { "db": "PACKETSTORM", "id": "129402" }, { "db": "PACKETSTORM", "id": "124120" }, { "db": "PACKETSTORM", "id": "124136" }, { "db": "PACKETSTORM", "id": "123470" }, { "db": "PACKETSTORM", "id": "123472" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-4238", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2013-003780", "trust": 0.8 }, { "db": "AUSCERT", "id": "ESB-2022.0696", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0296", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201308-202", "trust": 0.6 }, { "db": "BID", "id": "61738", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "123471", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "123473", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129402", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "124120", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "124136", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "123470", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "123472", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "61738" }, { "db": "JVNDB", "id": "JVNDB-2013-003780" }, { "db": "PACKETSTORM", "id": "123471" }, { "db": "PACKETSTORM", "id": "123473" }, { "db": "PACKETSTORM", "id": "129402" }, { "db": "PACKETSTORM", "id": "124120" }, { "db": "PACKETSTORM", "id": "124136" }, { "db": "PACKETSTORM", "id": "123470" }, { "db": "PACKETSTORM", "id": "123472" }, { "db": "CNNVD", "id": "CNNVD-201308-202" }, { "db": "NVD", "id": "CVE-2013-4238" } ] }, "id": "VAR-201308-0259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.44401007833333334 }, "last_update_date": "2024-07-22T22:04:38.466000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "openSUSE-SU-2013:1437", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" }, { "title": "openSUSE-SU-2013:1438", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" }, { "title": "openSUSE-SU-2013:1439", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" }, { "title": "openSUSE-SU-2013:1440", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" }, { "title": "openSUSE-SU-2013:1462", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" }, { "title": "openSUSE-SU-2013:1463", "trust": 0.8, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" }, { "title": "issue18709", "trust": 0.8, "url": "http://bugs.python.org/issue18709" }, { "title": "Bug 996381", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" }, { "title": "RHSA-2013:1582", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2013-1582.html" }, { "title": "CVE-2013-4238 Input Validation vulnerability in Python", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_4238_input_validation" }, { "title": "USN-1982-1", "trust": 0.8, "url": "http://www.ubuntu.com/usn/usn-1982-1/" }, { "title": "VMSA-2014-0012", "trust": 0.8, "url": "http://www.vmware.com/security/advisories/vmsa-2014-0012.html" }, { "title": "Python SSL Repair measures for module security bypass vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=100911" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003780" }, { "db": "CNNVD", "id": "CNNVD-201308-202" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003780" }, { "db": "NVD", "id": "CVE-2013-4238" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2013-1582.html" }, { "trust": 1.7, "url": "http://www.ubuntu.com/usn/usn-1982-1" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "trust": 1.6, "url": "http://bugs.python.org/issue18709" }, { "trust": 1.6, "url": "http://seclists.org/fulldisclosure/2014/dec/23" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" }, { "trust": 1.6, "url": "http://www.debian.org/security/2014/dsa-2880" }, { "trust": 1.6, "url": "http://www.vmware.com/security/advisories/vmsa-2014-0012.html" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" }, { "trust": 1.6, "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" }, { "trust": 1.0, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4238" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4238" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4238" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200234-1.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.0696" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0296/" }, { "trust": 0.3, "url": "http://www.python.org/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2099" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2013-4238.html" }, { "trust": 0.2, "url": "https://access.redhat.com/site/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/python3.2/3.2.3-6ubuntu3.4" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1984-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/python3.2/3.2.3-0ubuntu3.5" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1985-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/python3.3/3.3.0-1ubuntu0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/python3.3/3.3.1-1ubuntu5.2" }, { "trust": 0.1, "url": "https://twitter.com/vmwaresrc" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8371" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2078735" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1752" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0015" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0191" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0138" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1752" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2086288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8371" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2877" }, { "trust": 0.1, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3797" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0138" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-0191" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3797" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/lifecycle.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-2877" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "https://www.vmware.com/go/download-vsphere" }, { "trust": 0.1, "url": "https://access.redhat.com/site/documentation/en-us/red_hat_enterprise_linux" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-4344.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2889" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhba-2013-1528.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-5107.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2888" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2013-1527.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2888.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4344" }, { "trust": 0.1, "url": "https://access.redhat.com/site/documentation/en-us/red_hat_enterprise_linux/6/html/hypervisor_deployment_guide/chap-deployment_guide-upgrading_red_hat_enterprise_virtualization_hypervisors.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2892.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-2892" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-5107" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2013-2889.html" }, { "trust": 0.1, "url": "https://access.redhat.com/site/documentation/en-us/red_hat_enterprise_linux/6/html/6.5_technical_notes/python.html#rhsa-2013-1582" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/python2.6/2.6.5-1ubuntu6.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/python2.7/2.7.3-0ubuntu3.4" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1983-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/python2.7/2.7.4-2ubuntu3.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/python2.7/2.7.3-5ubuntu4.3" } ], "sources": [ { "db": "BID", "id": "61738" }, { "db": "JVNDB", "id": "JVNDB-2013-003780" }, { "db": "PACKETSTORM", "id": "123471" }, { "db": "PACKETSTORM", "id": "123473" }, { "db": "PACKETSTORM", "id": "129402" }, { "db": "PACKETSTORM", "id": "124120" }, { "db": "PACKETSTORM", "id": "124136" }, { "db": "PACKETSTORM", "id": "123470" }, { "db": "PACKETSTORM", "id": "123472" }, { "db": "CNNVD", "id": "CNNVD-201308-202" }, { "db": "NVD", "id": "CVE-2013-4238" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "61738" }, { "db": "JVNDB", "id": "JVNDB-2013-003780" }, { "db": "PACKETSTORM", "id": "123471" }, { "db": "PACKETSTORM", "id": "123473" }, { "db": "PACKETSTORM", "id": "129402" }, { "db": "PACKETSTORM", "id": "124120" }, { "db": "PACKETSTORM", "id": "124136" }, { "db": "PACKETSTORM", "id": "123470" }, { "db": "PACKETSTORM", "id": "123472" }, { "db": "CNNVD", "id": "CNNVD-201308-202" }, { "db": "NVD", "id": "CVE-2013-4238" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-08-12T00:00:00", "db": "BID", "id": "61738" }, { "date": "2013-08-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003780" }, { "date": "2013-10-01T22:33:47", "db": "PACKETSTORM", "id": "123471" }, { "date": "2013-10-01T22:34:24", "db": "PACKETSTORM", "id": "123473" }, { "date": "2014-12-05T15:22:00", "db": "PACKETSTORM", "id": "129402" }, { "date": "2013-11-21T19:31:35", "db": "PACKETSTORM", "id": "124120" }, { "date": "2013-11-21T19:36:50", "db": "PACKETSTORM", "id": "124136" }, { "date": "2013-10-01T22:33:39", "db": "PACKETSTORM", "id": "123470" }, { "date": "2013-10-01T22:33:58", "db": "PACKETSTORM", "id": "123472" }, { "date": "2013-08-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-202" }, { "date": "2013-08-18T02:52:22.943000", "db": "NVD", "id": "CVE-2013-4238" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-05-12T19:47:00", "db": "BID", "id": "61738" }, { "date": "2014-12-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-003780" }, { "date": "2022-02-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-202" }, { "date": "2019-10-25T11:53:59.117000", "db": "NVD", "id": "CVE-2013-4238" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-202" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Python of SSL Module ssl.match_hostname Any in the function SSL Vulnerability impersonating a server", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-003780" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201308-202" } ], "trust": 0.6 } }
ghsa-vp8q-678w-8xq9
Vulnerability from github
The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
{ "affected": [], "aliases": [ "CVE-2013-4238" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-08-18T02:52:00Z", "severity": "MODERATE" }, "details": "The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a \u0027\\0\u0027 character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.", "id": "GHSA-vp8q-678w-8xq9", "modified": "2022-05-13T01:31:01Z", "published": "2022-05-13T01:31:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4238" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=996381" }, { "type": "WEB", "url": "http://bugs.python.org/issue18709" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00027.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00028.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00029.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00042.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00043.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1582.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2880" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/534161/100/0/threaded" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-1982-1" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.