Action not permitted
Modal body text goes here.
cve-2010-5312
Vulnerability from cvelistv5
Published
2014-11-24 00:00
Modified
2024-08-07 04:17
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:17:10.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2015:0442", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0442.html" }, { "name": "DSA-3249", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3249" }, { "name": "[oss-security] 20141114 Re: old CVE assignments for JQuery 1.10.0", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/616" }, { "name": "71106", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71106" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "RHSA-2015:1462", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1462.html" }, { "tags": [ "x_transferred" ], "url": "http://bugs.jqueryui.com/ticket/6016" }, { "name": "jqueryui-cve20105312-xss(98696)", "tags": [ "vdb-entry", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98696" }, { "name": "[oss-security] 20141114 old CVE assignments for JQuery 1.10.0", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/613" }, { "tags": [ "x_transferred" ], "url": "https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3" }, { "name": "1037035", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037035" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190416-0007/" }, { "name": "[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "tags": [ "x_transferred" ], "url": "https://www.drupal.org/sa-core-2022-002" }, { "name": "[debian-lts-announce] 20220119 [SECURITY] [DLA-2889-1] drupal7 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html" }, { "name": "FEDORA-2022-9d655503ea", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/" }, { "name": "FEDORA-2022-bf18450366", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-03T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2015:0442", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0442.html" }, { "name": "DSA-3249", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2015/dsa-3249" }, { "name": "[oss-security] 20141114 Re: old CVE assignments for JQuery 1.10.0", "tags": [ "mailing-list" ], "url": "http://seclists.org/oss-sec/2014/q4/616" }, { "name": "71106", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/71106" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "RHSA-2015:1462", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1462.html" }, { "url": "http://bugs.jqueryui.com/ticket/6016" }, { "name": "jqueryui-cve20105312-xss(98696)", "tags": [ "vdb-entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98696" }, { "name": "[oss-security] 20141114 old CVE assignments for JQuery 1.10.0", "tags": [ "mailing-list" ], "url": "http://seclists.org/oss-sec/2014/q4/613" }, { "url": "https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3" }, { "name": "1037035", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1037035" }, { "url": "https://security.netapp.com/advisory/ntap-20190416-0007/" }, { "name": "[drill-dev] 20191017 Dependencies used by Drill contain known vulnerabilities", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-dev] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "name": "[drill-issues] 20191021 [jira] [Created] (DRILL-7416) Updates required to dependencies to resolve potential security vulnerabilities", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "url": "https://www.drupal.org/sa-core-2022-002" }, { "name": "[debian-lts-announce] 20220119 [SECURITY] [DLA-2889-1] drupal7 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html" }, { "name": "FEDORA-2022-9d655503ea", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/" }, { "name": "FEDORA-2022-bf18450366", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-5312", "datePublished": "2014-11-24T00:00:00", "dateReserved": "2014-11-14T00:00:00", "dateUpdated": "2024-08-07T04:17:10.323Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-5312\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-11-24T16:59:00.087\",\"lastModified\":\"2023-06-21T18:26:36.380\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de XSS en jquery.ui.dialog.js en el widget Dialog en jQuery UI anterior a 1.10.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de la opci\u00f3n del t\u00edtulo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jqueryui:jquery_ui:*:*:*:*:*:jquery:*:*\",\"versionEndExcluding\":\"1.10.0\",\"matchCriteriaId\":\"92023DA6-EAD6-4690-850D-9DB11CFAB33B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDFB1169-41A0-4A86-8E4F-FDA9730B1E94\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:drill:1.16.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"235DC57F-22B8-4219-9499-7D005D90A654\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0\",\"versionEndExcluding\":\"7.86\",\"matchCriteriaId\":\"013FAABA-8CDD-46AD-B321-9908634C880A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://bugs.jqueryui.com/ticket/6016\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0442.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1462.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2014/q4/613\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2014/q4/616\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3249\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/71106\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037035\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/98696\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190416-0007/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.drupal.org/sa-core-2022-002\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-wcm2-9c89-wmfm
Vulnerability from github
Published
2017-10-24 18:33
Modified
2023-02-09 19:24
Severity ?
Summary
Cross-site Scripting in jquery-ui
Details
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "jquery-ui" }, "ranges": [ { "events": [ { "introduced": "1.7.0" }, { "fixed": "1.10.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.webjars.npm:jquery-ui" }, "ranges": [ { "events": [ { "introduced": "1.7.0" }, { "fixed": "1.10.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "jQuery.UI.Combined" }, "ranges": [ { "events": [ { "introduced": "1.7.0" }, { "fixed": "1.10.0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "RubyGems", "name": "jquery-ui-rails" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "4.0.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2010-5312" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2020-06-16T22:00:08Z", "nvd_published_at": "2014-11-24T16:59:00Z", "severity": "MODERATE" }, "details": "Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.", "id": "GHSA-wcm2-9c89-wmfm", "modified": "2023-02-09T19:24:11Z", "published": "2017-10-24T18:33:38Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5312" }, { "type": "WEB", "url": "https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3" }, { "type": "WEB", "url": "https://www.drupal.org/sa-core-2022-002" }, { "type": "WEB", "url": "https://web.archive.org/web/20170316161850/http://www.securitytracker.com/id/1037035" }, { "type": "WEB", "url": "https://web.archive.org/web/20150316023043/http://www.securityfocus.com/bid/71106" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190416-0007" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "type": "WEB", "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2010-5312.yml" }, { "type": "PACKAGE", "url": "https://github.com/jquery/jquery-ui" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98696" }, { "type": "WEB", "url": "http://bugs.jqueryui.com/ticket/6016" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-0442.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1462.html" }, { "type": "WEB", "url": "http://seclists.org/oss-sec/2014/q4/613" }, { "type": "WEB", "url": "http://seclists.org/oss-sec/2014/q4/616" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3249" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ], "summary": "Cross-site Scripting in jquery-ui" }
rhsa-2015_1462
Vulnerability from csaf_redhat
Published
2015-07-21 10:14
Modified
2024-11-22 08:26
Summary
Red Hat Security Advisory: ipa security and bug fix update
Notes
Topic
Updated ipa packages that fix two security issues and several bugs are now
available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Red Hat Identity Management (IdM) is a centralized authentication, identity
management, and authorization solution for both traditional and cloud-based
enterprise environments.
Details
Two cross-site scripting (XSS) flaws were found in jQuery, which impacted
the Identity Management web administrative interface, and could allow an
authenticated user to inject arbitrary HTML or web script into the
interface. (CVE-2010-5312, CVE-2012-6662)
Note: The IdM version provided by this update no longer uses jQuery.
Bug fixes:
* The ipa-server-install, ipa-replica-install, and ipa-client-install
utilities are not supported on machines running in FIPS-140 mode.
Previously, IdM did not warn users about this. Now, IdM does not allow
running the utilities in FIPS-140 mode, and displays an explanatory
message. (BZ#1131571)
* If an Active Directory (AD) server was specified or discovered
automatically when running the ipa-client-install utility, the utility
produced a traceback instead of informing the user that an IdM server is
expected in this situation. Now, ipa-client-install detects the AD server
and fails with an explanatory message. (BZ#1132261)
* When IdM servers were configured to require the TLS protocol version 1.1
(TLSv1.1) or later in the httpd server, the ipa utility failed. With this
update, running ipa works as expected with TLSv1.1 or later. (BZ#1154687)
* In certain high-load environments, the Kerberos authentication step of
the IdM client installer can fail. Previously, the entire client
installation failed in this situation. This update modifies
ipa-client-install to prefer the TCP protocol over the UDP protocol and to
retry the authentication attempt in case of failure. (BZ#1161722)
* If ipa-client-install updated or created the /etc/nsswitch.conf file, the
sudo utility could terminate unexpectedly with a segmentation fault. Now,
ipa-client-install puts a new line character at the end of nsswitch.conf if
it modifies the last line of the file, fixing this bug. (BZ#1185207)
* The ipa-client-automount utility failed with the "UNWILLING_TO_PERFORM"
LDAP error when the nsslapd-minssf Red Hat Directory Server configuration
parameter was set to "1". This update modifies ipa-client-automount to use
encrypted connection for LDAP searches by default, and the utility now
finishes successfully even with nsslapd-minssf specified. (BZ#1191040)
* If installing an IdM server failed after the Certificate Authority (CA)
installation, the "ipa-server-install --uninstall" command did not perform
a proper cleanup. After the user issued "ipa-server-install --uninstall"
and then attempted to install the server again, the installation failed.
Now, "ipa-server-install --uninstall" removes the CA-related files in the
described situation, and ipa-server-install no longer fails with the
mentioned error message. (BZ#1198160)
* Running ipa-client-install added the "sss" entry to the sudoers line in
nsswitch.conf even if "sss" was already configured and the entry was
present in the file. Duplicate "sss" then caused sudo to become
unresponsive. Now, ipa-client-install no longer adds "sss" if it is already
present in nsswitch.conf. (BZ#1198339)
* After running ipa-client-install, it was not possible to log in using SSH
under certain circumstances. Now, ipa-client-install no longer corrupts the
sshd_config file, and the sshd service can start as expected, and logging
in using SSH works in the described situation. (BZ#1201454)
* An incorrect definition of the dc attribute in the
/usr/share/ipa/05rfc2247.ldif file caused bogus error messages to be
returned during migration. The attribute has been fixed, but the bug
persists if the copy-schema-to-ca.py script was run on Red Hat Enterprise
Linux 6.6 prior to running it on Red Hat Enterprise Linux 6.7. To work
around this problem, manually copy /usr/share/ipa/schema/05rfc2247.ldif to
/etc/dirsrv/slapd-PKI-IPA/schema/ and restart IdM. (BZ#1220788)
All ipa users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ipa packages that fix two security issues and several bugs are now\navailable for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.\n\nRed Hat Identity Management (IdM) is a centralized authentication, identity\nmanagement, and authorization solution for both traditional and cloud-based\nenterprise environments.", "title": "Topic" }, { "category": "general", "text": "Two cross-site scripting (XSS) flaws were found in jQuery, which impacted\nthe Identity Management web administrative interface, and could allow an\nauthenticated user to inject arbitrary HTML or web script into the\ninterface. (CVE-2010-5312, CVE-2012-6662)\n\nNote: The IdM version provided by this update no longer uses jQuery.\n\nBug fixes:\n\n* The ipa-server-install, ipa-replica-install, and ipa-client-install\nutilities are not supported on machines running in FIPS-140 mode.\nPreviously, IdM did not warn users about this. Now, IdM does not allow\nrunning the utilities in FIPS-140 mode, and displays an explanatory\nmessage. (BZ#1131571)\n\n* If an Active Directory (AD) server was specified or discovered\nautomatically when running the ipa-client-install utility, the utility\nproduced a traceback instead of informing the user that an IdM server is\nexpected in this situation. Now, ipa-client-install detects the AD server\nand fails with an explanatory message. (BZ#1132261)\n\n* When IdM servers were configured to require the TLS protocol version 1.1\n(TLSv1.1) or later in the httpd server, the ipa utility failed. With this\nupdate, running ipa works as expected with TLSv1.1 or later. (BZ#1154687)\n\n* In certain high-load environments, the Kerberos authentication step of\nthe IdM client installer can fail. Previously, the entire client\ninstallation failed in this situation. This update modifies\nipa-client-install to prefer the TCP protocol over the UDP protocol and to\nretry the authentication attempt in case of failure. (BZ#1161722)\n\n* If ipa-client-install updated or created the /etc/nsswitch.conf file, the\nsudo utility could terminate unexpectedly with a segmentation fault. Now,\nipa-client-install puts a new line character at the end of nsswitch.conf if\nit modifies the last line of the file, fixing this bug. (BZ#1185207)\n\n* The ipa-client-automount utility failed with the \"UNWILLING_TO_PERFORM\"\nLDAP error when the nsslapd-minssf Red Hat Directory Server configuration\nparameter was set to \"1\". This update modifies ipa-client-automount to use\nencrypted connection for LDAP searches by default, and the utility now\nfinishes successfully even with nsslapd-minssf specified. (BZ#1191040)\n\n* If installing an IdM server failed after the Certificate Authority (CA)\ninstallation, the \"ipa-server-install --uninstall\" command did not perform\na proper cleanup. After the user issued \"ipa-server-install --uninstall\"\nand then attempted to install the server again, the installation failed.\nNow, \"ipa-server-install --uninstall\" removes the CA-related files in the\ndescribed situation, and ipa-server-install no longer fails with the\nmentioned error message. (BZ#1198160)\n\n* Running ipa-client-install added the \"sss\" entry to the sudoers line in\nnsswitch.conf even if \"sss\" was already configured and the entry was\npresent in the file. Duplicate \"sss\" then caused sudo to become\nunresponsive. Now, ipa-client-install no longer adds \"sss\" if it is already\npresent in nsswitch.conf. (BZ#1198339)\n\n* After running ipa-client-install, it was not possible to log in using SSH\nunder certain circumstances. Now, ipa-client-install no longer corrupts the\nsshd_config file, and the sshd service can start as expected, and logging\nin using SSH works in the described situation. (BZ#1201454)\n\n* An incorrect definition of the dc attribute in the\n/usr/share/ipa/05rfc2247.ldif file caused bogus error messages to be\nreturned during migration. The attribute has been fixed, but the bug\npersists if the copy-schema-to-ca.py script was run on Red Hat Enterprise\nLinux 6.6 prior to running it on Red Hat Enterprise Linux 6.7. To work\naround this problem, manually copy /usr/share/ipa/schema/05rfc2247.ldif to\n/etc/dirsrv/slapd-PKI-IPA/schema/ and restart IdM. (BZ#1220788)\n\nAll ipa users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1462", "url": "https://access.redhat.com/errata/RHSA-2015:1462" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1132261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1132261" }, { "category": "external", "summary": "1146870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146870" }, { "category": "external", "summary": "1154687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1154687" }, { "category": "external", "summary": "1166041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166041" }, { "category": "external", "summary": "1166064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166064" }, { "category": "external", "summary": "1185207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185207" }, { "category": "external", "summary": "1198339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198339" }, { "category": "external", "summary": "1201454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201454" }, { "category": "external", "summary": "1205660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205660" }, { "category": "external", "summary": "1207649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207649" }, { "category": "external", "summary": "1220788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220788" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1462.json" } ], "title": "Red Hat Security Advisory: ipa security and bug fix update", "tracking": { "current_release_date": "2024-11-22T08:26:56+00:00", "generator": { "date": "2024-11-22T08:26:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1462", "initial_release_date": "2015-07-21T10:14:51+00:00", "revision_history": [ { "date": "2015-07-21T10:14:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-07-21T10:14:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:26:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ipa-debuginfo-0:3.0.0-47.el6.i686", "product": { "name": "ipa-debuginfo-0:3.0.0-47.el6.i686", "product_id": "ipa-debuginfo-0:3.0.0-47.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-debuginfo@3.0.0-47.el6?arch=i686" } } }, { "category": "product_version", "name": "ipa-admintools-0:3.0.0-47.el6.i686", "product": { "name": "ipa-admintools-0:3.0.0-47.el6.i686", "product_id": "ipa-admintools-0:3.0.0-47.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-admintools@3.0.0-47.el6?arch=i686" } } }, { "category": "product_version", "name": "ipa-server-trust-ad-0:3.0.0-47.el6.i686", "product": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.i686", "product_id": "ipa-server-trust-ad-0:3.0.0-47.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-server-trust-ad@3.0.0-47.el6?arch=i686" } } }, { "category": "product_version", "name": "ipa-client-0:3.0.0-47.el6.i686", "product": { "name": "ipa-client-0:3.0.0-47.el6.i686", "product_id": "ipa-client-0:3.0.0-47.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-client@3.0.0-47.el6?arch=i686" } } }, { "category": "product_version", "name": "ipa-python-0:3.0.0-47.el6.i686", "product": { "name": "ipa-python-0:3.0.0-47.el6.i686", "product_id": "ipa-python-0:3.0.0-47.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-python@3.0.0-47.el6?arch=i686" } } }, { "category": "product_version", "name": "ipa-server-0:3.0.0-47.el6.i686", "product": { "name": "ipa-server-0:3.0.0-47.el6.i686", "product_id": "ipa-server-0:3.0.0-47.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-server@3.0.0-47.el6?arch=i686" } } }, { "category": "product_version", "name": "ipa-server-selinux-0:3.0.0-47.el6.i686", "product": { "name": "ipa-server-selinux-0:3.0.0-47.el6.i686", "product_id": "ipa-server-selinux-0:3.0.0-47.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-server-selinux@3.0.0-47.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "product": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "product_id": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-server-trust-ad@3.0.0-47.el6?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-admintools-0:3.0.0-47.el6.x86_64", "product": { "name": "ipa-admintools-0:3.0.0-47.el6.x86_64", "product_id": "ipa-admintools-0:3.0.0-47.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-admintools@3.0.0-47.el6?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-python-0:3.0.0-47.el6.x86_64", "product": { "name": "ipa-python-0:3.0.0-47.el6.x86_64", "product_id": "ipa-python-0:3.0.0-47.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-python@3.0.0-47.el6?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-server-0:3.0.0-47.el6.x86_64", "product": { "name": "ipa-server-0:3.0.0-47.el6.x86_64", "product_id": "ipa-server-0:3.0.0-47.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-server@3.0.0-47.el6?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-debuginfo-0:3.0.0-47.el6.x86_64", "product": { "name": "ipa-debuginfo-0:3.0.0-47.el6.x86_64", "product_id": "ipa-debuginfo-0:3.0.0-47.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-debuginfo@3.0.0-47.el6?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-server-selinux-0:3.0.0-47.el6.x86_64", "product": { "name": "ipa-server-selinux-0:3.0.0-47.el6.x86_64", "product_id": "ipa-server-selinux-0:3.0.0-47.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-server-selinux@3.0.0-47.el6?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-client-0:3.0.0-47.el6.x86_64", "product": { "name": "ipa-client-0:3.0.0-47.el6.x86_64", "product_id": "ipa-client-0:3.0.0-47.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-client@3.0.0-47.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ipa-0:3.0.0-47.el6.src", "product": { "name": "ipa-0:3.0.0-47.el6.src", "product_id": "ipa-0:3.0.0-47.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa@3.0.0-47.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ipa-python-0:3.0.0-47.el6.ppc64", "product": { "name": "ipa-python-0:3.0.0-47.el6.ppc64", "product_id": "ipa-python-0:3.0.0-47.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-python@3.0.0-47.el6?arch=ppc64" } } }, { "category": "product_version", "name": "ipa-client-0:3.0.0-47.el6.ppc64", "product": { "name": "ipa-client-0:3.0.0-47.el6.ppc64", "product_id": "ipa-client-0:3.0.0-47.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-client@3.0.0-47.el6?arch=ppc64" } } }, { "category": "product_version", "name": "ipa-debuginfo-0:3.0.0-47.el6.ppc64", "product": { "name": "ipa-debuginfo-0:3.0.0-47.el6.ppc64", "product_id": "ipa-debuginfo-0:3.0.0-47.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-debuginfo@3.0.0-47.el6?arch=ppc64" } } }, { "category": "product_version", "name": "ipa-admintools-0:3.0.0-47.el6.ppc64", "product": { "name": "ipa-admintools-0:3.0.0-47.el6.ppc64", "product_id": "ipa-admintools-0:3.0.0-47.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-admintools@3.0.0-47.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ipa-client-0:3.0.0-47.el6.s390x", "product": { "name": "ipa-client-0:3.0.0-47.el6.s390x", "product_id": "ipa-client-0:3.0.0-47.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-client@3.0.0-47.el6?arch=s390x" } } }, { "category": "product_version", "name": "ipa-debuginfo-0:3.0.0-47.el6.s390x", "product": { "name": "ipa-debuginfo-0:3.0.0-47.el6.s390x", "product_id": "ipa-debuginfo-0:3.0.0-47.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-debuginfo@3.0.0-47.el6?arch=s390x" } } }, { "category": "product_version", "name": "ipa-admintools-0:3.0.0-47.el6.s390x", "product": { "name": "ipa-admintools-0:3.0.0-47.el6.s390x", "product_id": "ipa-admintools-0:3.0.0-47.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-admintools@3.0.0-47.el6?arch=s390x" } } }, { "category": "product_version", "name": "ipa-python-0:3.0.0-47.el6.s390x", "product": { "name": "ipa-python-0:3.0.0-47.el6.s390x", "product_id": "ipa-python-0:3.0.0-47.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-python@3.0.0-47.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ipa-0:3.0.0-47.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-0:3.0.0-47.el6.src" }, "product_reference": "ipa-0:3.0.0-47.el6.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-admintools-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-admintools-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-admintools-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-admintools-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-client-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-client-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-client-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-client-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-client-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-client-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-python-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-python-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-python-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-python-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-python-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-python-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-server-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-server-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:3.0.0-47.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-0:3.0.0-47.el6.src" }, "product_reference": "ipa-0:3.0.0-47.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-admintools-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-admintools-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-admintools-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-admintools-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-client-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-client-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-client-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-client-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-client-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-client-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-debuginfo-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-debuginfo-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-debuginfo-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-debuginfo-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-python-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-python-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-python-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-python-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-python-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-python-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-server-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-server-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-server-selinux-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-server-selinux-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:3.0.0-47.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-0:3.0.0-47.el6.src" }, "product_reference": "ipa-0:3.0.0-47.el6.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-client-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-client-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-python-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-python-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:3.0.0-47.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-0:3.0.0-47.el6.src" }, "product_reference": "ipa-0:3.0.0-47.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-client-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-client-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-client-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-client-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-client-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-client-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-python-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-python-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-python-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-python-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-python-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-python-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-server-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-server-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:3.0.0-47.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-0:3.0.0-47.el6.src" }, "product_reference": "ipa-0:3.0.0-47.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-admintools-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-admintools-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-admintools-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-admintools-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-client-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-client-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-client-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-client-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-client-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-client-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-debuginfo-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-debuginfo-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-debuginfo-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-debuginfo-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-python-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-python-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-python-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-python-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-python-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-python-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-server-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-server-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-server-selinux-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-server-selinux-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:3.0.0-47.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-0:3.0.0-47.el6.src" }, "product_reference": "ipa-0:3.0.0-47.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-admintools-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-admintools-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-admintools-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-admintools-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-admintools-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-client-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-client-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-client-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-client-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-client-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-client-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-client-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-debuginfo-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-python-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-python-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-python-0:3.0.0-47.el6.ppc64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-python-0:3.0.0-47.el6.s390x" }, "product_reference": "ipa-python-0:3.0.0-47.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-python-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-python-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-server-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-server-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-selinux-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-selinux-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.i686" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" }, "product_reference": "ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-5312", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1166041" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery-ui: XSS vulnerability in jQuery.ui.dialog title option", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:ipa-0:3.0.0-47.el6.src", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-client-0:3.0.0-47.el6.i686", "6Client-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-client-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-python-0:3.0.0-47.el6.i686", "6Client-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-python-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Client:ipa-0:3.0.0-47.el6.src", "6Client:ipa-admintools-0:3.0.0-47.el6.i686", "6Client:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client:ipa-client-0:3.0.0-47.el6.i686", "6Client:ipa-client-0:3.0.0-47.el6.ppc64", "6Client:ipa-client-0:3.0.0-47.el6.s390x", "6Client:ipa-client-0:3.0.0-47.el6.x86_64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client:ipa-python-0:3.0.0-47.el6.i686", "6Client:ipa-python-0:3.0.0-47.el6.ppc64", "6Client:ipa-python-0:3.0.0-47.el6.s390x", "6Client:ipa-python-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-0:3.0.0-47.el6.i686", "6Client:ipa-server-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-0:3.0.0-47.el6.src", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-0:3.0.0-47.el6.src", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Server:ipa-0:3.0.0-47.el6.src", "6Server:ipa-admintools-0:3.0.0-47.el6.i686", "6Server:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Server:ipa-admintools-0:3.0.0-47.el6.s390x", "6Server:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Server:ipa-client-0:3.0.0-47.el6.i686", "6Server:ipa-client-0:3.0.0-47.el6.ppc64", "6Server:ipa-client-0:3.0.0-47.el6.s390x", "6Server:ipa-client-0:3.0.0-47.el6.x86_64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Server:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Server:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Server:ipa-python-0:3.0.0-47.el6.i686", "6Server:ipa-python-0:3.0.0-47.el6.ppc64", "6Server:ipa-python-0:3.0.0-47.el6.s390x", "6Server:ipa-python-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-0:3.0.0-47.el6.i686", "6Server:ipa-server-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Server:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-0:3.0.0-47.el6.src", "6Workstation:ipa-admintools-0:3.0.0-47.el6.i686", "6Workstation:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-admintools-0:3.0.0-47.el6.s390x", "6Workstation:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-client-0:3.0.0-47.el6.i686", "6Workstation:ipa-client-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-client-0:3.0.0-47.el6.s390x", "6Workstation:ipa-client-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-python-0:3.0.0-47.el6.i686", "6Workstation:ipa-python-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-python-0:3.0.0-47.el6.s390x", "6Workstation:ipa-python-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-5312" }, { "category": "external", "summary": "RHBZ#1166041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166041" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-5312", "url": "https://www.cve.org/CVERecord?id=CVE-2010-5312" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-5312", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5312" } ], "release_date": "2010-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-21T10:14:51+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:ipa-0:3.0.0-47.el6.src", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-client-0:3.0.0-47.el6.i686", "6Client-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-client-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-python-0:3.0.0-47.el6.i686", "6Client-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-python-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Client:ipa-0:3.0.0-47.el6.src", "6Client:ipa-admintools-0:3.0.0-47.el6.i686", "6Client:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client:ipa-client-0:3.0.0-47.el6.i686", "6Client:ipa-client-0:3.0.0-47.el6.ppc64", "6Client:ipa-client-0:3.0.0-47.el6.s390x", "6Client:ipa-client-0:3.0.0-47.el6.x86_64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client:ipa-python-0:3.0.0-47.el6.i686", "6Client:ipa-python-0:3.0.0-47.el6.ppc64", "6Client:ipa-python-0:3.0.0-47.el6.s390x", "6Client:ipa-python-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-0:3.0.0-47.el6.i686", "6Client:ipa-server-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-0:3.0.0-47.el6.src", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-0:3.0.0-47.el6.src", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Server:ipa-0:3.0.0-47.el6.src", "6Server:ipa-admintools-0:3.0.0-47.el6.i686", "6Server:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Server:ipa-admintools-0:3.0.0-47.el6.s390x", "6Server:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Server:ipa-client-0:3.0.0-47.el6.i686", "6Server:ipa-client-0:3.0.0-47.el6.ppc64", "6Server:ipa-client-0:3.0.0-47.el6.s390x", "6Server:ipa-client-0:3.0.0-47.el6.x86_64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Server:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Server:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Server:ipa-python-0:3.0.0-47.el6.i686", "6Server:ipa-python-0:3.0.0-47.el6.ppc64", "6Server:ipa-python-0:3.0.0-47.el6.s390x", "6Server:ipa-python-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-0:3.0.0-47.el6.i686", "6Server:ipa-server-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Server:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-0:3.0.0-47.el6.src", "6Workstation:ipa-admintools-0:3.0.0-47.el6.i686", "6Workstation:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-admintools-0:3.0.0-47.el6.s390x", "6Workstation:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-client-0:3.0.0-47.el6.i686", "6Workstation:ipa-client-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-client-0:3.0.0-47.el6.s390x", "6Workstation:ipa-client-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-python-0:3.0.0-47.el6.i686", "6Workstation:ipa-python-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-python-0:3.0.0-47.el6.s390x", "6Workstation:ipa-python-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1462" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:ipa-0:3.0.0-47.el6.src", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-client-0:3.0.0-47.el6.i686", "6Client-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-client-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-python-0:3.0.0-47.el6.i686", "6Client-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-python-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Client:ipa-0:3.0.0-47.el6.src", "6Client:ipa-admintools-0:3.0.0-47.el6.i686", "6Client:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client:ipa-client-0:3.0.0-47.el6.i686", "6Client:ipa-client-0:3.0.0-47.el6.ppc64", "6Client:ipa-client-0:3.0.0-47.el6.s390x", "6Client:ipa-client-0:3.0.0-47.el6.x86_64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client:ipa-python-0:3.0.0-47.el6.i686", "6Client:ipa-python-0:3.0.0-47.el6.ppc64", "6Client:ipa-python-0:3.0.0-47.el6.s390x", "6Client:ipa-python-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-0:3.0.0-47.el6.i686", "6Client:ipa-server-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-0:3.0.0-47.el6.src", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-0:3.0.0-47.el6.src", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Server:ipa-0:3.0.0-47.el6.src", "6Server:ipa-admintools-0:3.0.0-47.el6.i686", "6Server:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Server:ipa-admintools-0:3.0.0-47.el6.s390x", "6Server:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Server:ipa-client-0:3.0.0-47.el6.i686", "6Server:ipa-client-0:3.0.0-47.el6.ppc64", "6Server:ipa-client-0:3.0.0-47.el6.s390x", "6Server:ipa-client-0:3.0.0-47.el6.x86_64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Server:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Server:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Server:ipa-python-0:3.0.0-47.el6.i686", "6Server:ipa-python-0:3.0.0-47.el6.ppc64", "6Server:ipa-python-0:3.0.0-47.el6.s390x", "6Server:ipa-python-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-0:3.0.0-47.el6.i686", "6Server:ipa-server-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Server:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-0:3.0.0-47.el6.src", "6Workstation:ipa-admintools-0:3.0.0-47.el6.i686", "6Workstation:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-admintools-0:3.0.0-47.el6.s390x", "6Workstation:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-client-0:3.0.0-47.el6.i686", "6Workstation:ipa-client-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-client-0:3.0.0-47.el6.s390x", "6Workstation:ipa-client-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-python-0:3.0.0-47.el6.i686", "6Workstation:ipa-python-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-python-0:3.0.0-47.el6.s390x", "6Workstation:ipa-python-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery-ui: XSS vulnerability in jQuery.ui.dialog title option" }, { "cve": "CVE-2012-6662", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1166064" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery-ui: XSS vulnerability in default content in Tooltip widget", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:ipa-0:3.0.0-47.el6.src", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-client-0:3.0.0-47.el6.i686", "6Client-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-client-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-python-0:3.0.0-47.el6.i686", "6Client-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-python-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Client:ipa-0:3.0.0-47.el6.src", "6Client:ipa-admintools-0:3.0.0-47.el6.i686", "6Client:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client:ipa-client-0:3.0.0-47.el6.i686", "6Client:ipa-client-0:3.0.0-47.el6.ppc64", "6Client:ipa-client-0:3.0.0-47.el6.s390x", "6Client:ipa-client-0:3.0.0-47.el6.x86_64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client:ipa-python-0:3.0.0-47.el6.i686", "6Client:ipa-python-0:3.0.0-47.el6.ppc64", "6Client:ipa-python-0:3.0.0-47.el6.s390x", "6Client:ipa-python-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-0:3.0.0-47.el6.i686", "6Client:ipa-server-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-0:3.0.0-47.el6.src", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-0:3.0.0-47.el6.src", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Server:ipa-0:3.0.0-47.el6.src", "6Server:ipa-admintools-0:3.0.0-47.el6.i686", "6Server:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Server:ipa-admintools-0:3.0.0-47.el6.s390x", "6Server:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Server:ipa-client-0:3.0.0-47.el6.i686", "6Server:ipa-client-0:3.0.0-47.el6.ppc64", "6Server:ipa-client-0:3.0.0-47.el6.s390x", "6Server:ipa-client-0:3.0.0-47.el6.x86_64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Server:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Server:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Server:ipa-python-0:3.0.0-47.el6.i686", "6Server:ipa-python-0:3.0.0-47.el6.ppc64", "6Server:ipa-python-0:3.0.0-47.el6.s390x", "6Server:ipa-python-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-0:3.0.0-47.el6.i686", "6Server:ipa-server-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Server:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-0:3.0.0-47.el6.src", "6Workstation:ipa-admintools-0:3.0.0-47.el6.i686", "6Workstation:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-admintools-0:3.0.0-47.el6.s390x", "6Workstation:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-client-0:3.0.0-47.el6.i686", "6Workstation:ipa-client-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-client-0:3.0.0-47.el6.s390x", "6Workstation:ipa-client-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-python-0:3.0.0-47.el6.i686", "6Workstation:ipa-python-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-python-0:3.0.0-47.el6.s390x", "6Workstation:ipa-python-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6662" }, { "category": "external", "summary": "RHBZ#1166064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166064" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6662", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6662" } ], "release_date": "2012-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-21T10:14:51+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:ipa-0:3.0.0-47.el6.src", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-client-0:3.0.0-47.el6.i686", "6Client-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-client-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-python-0:3.0.0-47.el6.i686", "6Client-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-python-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Client:ipa-0:3.0.0-47.el6.src", "6Client:ipa-admintools-0:3.0.0-47.el6.i686", "6Client:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client:ipa-client-0:3.0.0-47.el6.i686", "6Client:ipa-client-0:3.0.0-47.el6.ppc64", "6Client:ipa-client-0:3.0.0-47.el6.s390x", "6Client:ipa-client-0:3.0.0-47.el6.x86_64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client:ipa-python-0:3.0.0-47.el6.i686", "6Client:ipa-python-0:3.0.0-47.el6.ppc64", "6Client:ipa-python-0:3.0.0-47.el6.s390x", "6Client:ipa-python-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-0:3.0.0-47.el6.i686", "6Client:ipa-server-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-0:3.0.0-47.el6.src", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-0:3.0.0-47.el6.src", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Server:ipa-0:3.0.0-47.el6.src", "6Server:ipa-admintools-0:3.0.0-47.el6.i686", "6Server:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Server:ipa-admintools-0:3.0.0-47.el6.s390x", "6Server:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Server:ipa-client-0:3.0.0-47.el6.i686", "6Server:ipa-client-0:3.0.0-47.el6.ppc64", "6Server:ipa-client-0:3.0.0-47.el6.s390x", "6Server:ipa-client-0:3.0.0-47.el6.x86_64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Server:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Server:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Server:ipa-python-0:3.0.0-47.el6.i686", "6Server:ipa-python-0:3.0.0-47.el6.ppc64", "6Server:ipa-python-0:3.0.0-47.el6.s390x", "6Server:ipa-python-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-0:3.0.0-47.el6.i686", "6Server:ipa-server-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Server:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-0:3.0.0-47.el6.src", "6Workstation:ipa-admintools-0:3.0.0-47.el6.i686", "6Workstation:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-admintools-0:3.0.0-47.el6.s390x", "6Workstation:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-client-0:3.0.0-47.el6.i686", "6Workstation:ipa-client-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-client-0:3.0.0-47.el6.s390x", "6Workstation:ipa-client-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-python-0:3.0.0-47.el6.i686", "6Workstation:ipa-python-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-python-0:3.0.0-47.el6.s390x", "6Workstation:ipa-python-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1462" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:ipa-0:3.0.0-47.el6.src", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-client-0:3.0.0-47.el6.i686", "6Client-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-client-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-python-0:3.0.0-47.el6.i686", "6Client-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6Client-optional:ipa-python-0:3.0.0-47.el6.s390x", "6Client-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Client:ipa-0:3.0.0-47.el6.src", "6Client:ipa-admintools-0:3.0.0-47.el6.i686", "6Client:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Client:ipa-admintools-0:3.0.0-47.el6.s390x", "6Client:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Client:ipa-client-0:3.0.0-47.el6.i686", "6Client:ipa-client-0:3.0.0-47.el6.ppc64", "6Client:ipa-client-0:3.0.0-47.el6.s390x", "6Client:ipa-client-0:3.0.0-47.el6.x86_64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Client:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Client:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Client:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Client:ipa-python-0:3.0.0-47.el6.i686", "6Client:ipa-python-0:3.0.0-47.el6.ppc64", "6Client:ipa-python-0:3.0.0-47.el6.s390x", "6Client:ipa-python-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-0:3.0.0-47.el6.i686", "6Client:ipa-server-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Client:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Client:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-0:3.0.0-47.el6.src", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode-optional:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode-optional:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-0:3.0.0-47.el6.src", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-admintools-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-client-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-client-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-client-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-python-0:3.0.0-47.el6.ppc64", "6ComputeNode:ipa-python-0:3.0.0-47.el6.s390x", "6ComputeNode:ipa-python-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6ComputeNode:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Server:ipa-0:3.0.0-47.el6.src", "6Server:ipa-admintools-0:3.0.0-47.el6.i686", "6Server:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Server:ipa-admintools-0:3.0.0-47.el6.s390x", "6Server:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Server:ipa-client-0:3.0.0-47.el6.i686", "6Server:ipa-client-0:3.0.0-47.el6.ppc64", "6Server:ipa-client-0:3.0.0-47.el6.s390x", "6Server:ipa-client-0:3.0.0-47.el6.x86_64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Server:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Server:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Server:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Server:ipa-python-0:3.0.0-47.el6.i686", "6Server:ipa-python-0:3.0.0-47.el6.ppc64", "6Server:ipa-python-0:3.0.0-47.el6.s390x", "6Server:ipa-python-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-0:3.0.0-47.el6.i686", "6Server:ipa-server-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Server:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Server:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-0:3.0.0-47.el6.src", "6Workstation:ipa-admintools-0:3.0.0-47.el6.i686", "6Workstation:ipa-admintools-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-admintools-0:3.0.0-47.el6.s390x", "6Workstation:ipa-admintools-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-client-0:3.0.0-47.el6.i686", "6Workstation:ipa-client-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-client-0:3.0.0-47.el6.s390x", "6Workstation:ipa-client-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.i686", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.s390x", "6Workstation:ipa-debuginfo-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-python-0:3.0.0-47.el6.i686", "6Workstation:ipa-python-0:3.0.0-47.el6.ppc64", "6Workstation:ipa-python-0:3.0.0-47.el6.s390x", "6Workstation:ipa-python-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-selinux-0:3.0.0-47.el6.x86_64", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.i686", "6Workstation:ipa-server-trust-ad-0:3.0.0-47.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery-ui: XSS vulnerability in default content in Tooltip widget" } ] }
rhsa-2015_0442
Vulnerability from csaf_redhat
Published
2015-03-05 09:50
Modified
2024-11-22 08:27
Summary
Red Hat Security Advisory: ipa security, bug fix, and enhancement update
Notes
Topic
Updated ipa packages that fix two security issues, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Two cross-site scripting (XSS) flaws were found in jQuery, which impacted the Identity Management web administrative interface, and could allow an authenticated user to inject arbitrary HTML or web script into the interface. (CVE-2010-5312, CVE-2012-6662)
Note: The IdM version provided by this update no longer uses jQuery.
This update adds several enhancements that are described in more detail in the Red Hat Enterprise Linux 7.1 Release Notes, linked to in the References section, including:
* Added the "ipa-cacert-manage" command, which renews the Certification Authority (CA) file. (BZ#886645)
* Added the ID Views feature. (BZ#891984)
* IdM now supports using one-time password (OTP) authentication and allows gradual migration from proprietary OTP solutions to the IdM OTP solution. (BZ#919228)
* Added the "ipa-backup" and "ipa-restore" commands to allow manual backups. (BZ#951581)
* Added a solution for regulating access permissions to specific sections of the IdM server. (BZ#976382)
This update also fixes several bugs, including:
* Previously, when IdM servers were configured to require the Transport Layer Security protocol version 1.1 (TLSv1.1) or later in the httpd server, the "ipa" command-line utility failed. With this update, running "ipa" works as expected with TLSv1.1 or later. (BZ#1156466)
In addition, this update adds multiple enhancements, including:
* The "ipa-getkeytab" utility can now optionally fetch existing keytabs from the KDC. Previously, retrieving an existing keytab was not supported, as the only option was to generate a new key. (BZ#1007367)
* You can now create and manage a "." root zone on IdM servers. DNS queries sent to the IdM DNS server use this configured zone instead of the public zone. (BZ#1056202)
* The IdM server web UI has been updated and is now based on the Patternfly framework, offering better responsiveness. (BZ#1108212)
* A new user attribute now enables provisioning systems to add custom tags for user objects. The tags can be used for automember rules or for additional local interpretation. (BZ#1108229)
* This update adds a new DNS zone type to ensure that forward and master zones are better separated. As a result, the IdM DNS interface complies with the forward zone semantics in BIND. (BZ#1114013)
* This update adds a set of Apache modules that external applications can use to achieve tighter interaction with IdM beyond simple authentication. (BZ#1107555)
* IdM supports configuring automember rules for automated assignment of users or hosts in respective groups according to their characteristics, such as the "userClass" or "departmentNumber" attributes. Previously, the rules could be applied only to new entries. This update allows applying the rules also to existing users or hosts. (BZ#1108226)
* The extdom plug-in translates Security Identifiers (SIDs) of Active Directory (AD) users and groups to names and POSIX IDs. With this update, extdom returns the full member list for groups and the full list of group memberships for a user, the GECOS field, the home directory, as well as the login shell of a user. Also, an optional list of key-value pairs contains the SID of the requested object if the SID is available. (BZ#1030699)
All ipa users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ipa packages that fix two security issues, several bugs, and add\nvarious enhancements are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.\n\nTwo cross-site scripting (XSS) flaws were found in jQuery, which impacted the Identity Management web administrative interface, and could allow an authenticated user to inject arbitrary HTML or web script into the interface. (CVE-2010-5312, CVE-2012-6662)\n\nNote: The IdM version provided by this update no longer uses jQuery.\n\nThis update adds several enhancements that are described in more detail in the Red Hat Enterprise Linux 7.1 Release Notes, linked to in the References section, including:\n\n* Added the \"ipa-cacert-manage\" command, which renews the Certification Authority (CA) file. (BZ#886645)\n\n* Added the ID Views feature. (BZ#891984)\n\n* IdM now supports using one-time password (OTP) authentication and allows gradual migration from proprietary OTP solutions to the IdM OTP solution. (BZ#919228)\n\n* Added the \"ipa-backup\" and \"ipa-restore\" commands to allow manual backups. (BZ#951581)\n\n* Added a solution for regulating access permissions to specific sections of the IdM server. (BZ#976382)\n\nThis update also fixes several bugs, including:\n\n* Previously, when IdM servers were configured to require the Transport Layer Security protocol version 1.1 (TLSv1.1) or later in the httpd server, the \"ipa\" command-line utility failed. With this update, running \"ipa\" works as expected with TLSv1.1 or later. (BZ#1156466)\n\nIn addition, this update adds multiple enhancements, including:\n\n* The \"ipa-getkeytab\" utility can now optionally fetch existing keytabs from the KDC. Previously, retrieving an existing keytab was not supported, as the only option was to generate a new key. (BZ#1007367)\n\n* You can now create and manage a \".\" root zone on IdM servers. DNS queries sent to the IdM DNS server use this configured zone instead of the public zone. (BZ#1056202)\n\n* The IdM server web UI has been updated and is now based on the Patternfly framework, offering better responsiveness. (BZ#1108212)\n\n* A new user attribute now enables provisioning systems to add custom tags for user objects. The tags can be used for automember rules or for additional local interpretation. (BZ#1108229)\n\n* This update adds a new DNS zone type to ensure that forward and master zones are better separated. As a result, the IdM DNS interface complies with the forward zone semantics in BIND. (BZ#1114013)\n\n* This update adds a set of Apache modules that external applications can use to achieve tighter interaction with IdM beyond simple authentication. (BZ#1107555)\n\n* IdM supports configuring automember rules for automated assignment of users or hosts in respective groups according to their characteristics, such as the \"userClass\" or \"departmentNumber\" attributes. Previously, the rules could be applied only to new entries. This update allows applying the rules also to existing users or hosts. (BZ#1108226)\n\n* The extdom plug-in translates Security Identifiers (SIDs) of Active Directory (AD) users and groups to names and POSIX IDs. With this update, extdom returns the full member list for groups and the full list of group memberships for a user, the GECOS field, the home directory, as well as the login shell of a user. Also, an optional list of key-value pairs contains the SID of the requested object if the SID is available. (BZ#1030699)\n\nAll ipa users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0442", "url": "https://access.redhat.com/errata/RHSA-2015:0442" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.1_Release_Notes/index.html", "url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.1_Release_Notes/index.html" }, { "category": "external", "summary": "711693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711693" }, { "category": "external", "summary": "788645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788645" }, { "category": "external", "summary": "815828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815828" }, { "category": "external", "summary": "817909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817909" }, { "category": "external", "summary": "854335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854335" }, { "category": "external", "summary": "887988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=887988" }, { "category": "external", "summary": "891984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=891984" }, { "category": "external", "summary": "893850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=893850" }, { "category": "external", "summary": "921655", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=921655" }, { "category": "external", "summary": "922749", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=922749" }, { "category": "external", "summary": "924008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=924008" }, { "category": "external", "summary": "924395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=924395" }, { "category": "external", "summary": "951581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=951581" }, { "category": "external", "summary": "970618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=970618" }, { "category": "external", "summary": "971061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=971061" }, { "category": "external", "summary": "975456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975456" }, { "category": "external", "summary": "985234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=985234" }, { "category": "external", "summary": "1027712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027712" }, { "category": "external", "summary": "1027713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027713" }, { "category": "external", "summary": "1030699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1030699" }, { "category": "external", "summary": "1031111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1031111" }, { "category": "external", "summary": "1033357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033357" }, { "category": "external", "summary": "1035286", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035286" }, { "category": "external", "summary": "1048934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048934" }, { "category": "external", "summary": "1048956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1048956" }, { "category": "external", "summary": "1056202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056202" }, { "category": "external", "summary": "1058780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1058780" }, { "category": "external", "summary": "1060349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1060349" }, { "category": "external", "summary": "1061772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1061772" }, { "category": "external", "summary": "1072502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1072502" }, { "category": "external", "summary": "1075129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1075129" }, { "category": "external", "summary": "1077734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077734" }, { "category": "external", "summary": "1080209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1080209" }, { "category": "external", "summary": "1080532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1080532" }, { "category": "external", "summary": "1081626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081626" }, { "category": "external", "summary": "1084609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1084609" }, { "category": "external", "summary": "1099811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1099811" }, { "category": "external", "summary": "1107555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1107555" }, { "category": "external", "summary": "1108195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108195" }, { "category": "external", "summary": "1108201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108201" }, { "category": "external", "summary": "1108202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108202" }, { "category": "external", "summary": "1108203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108203" }, { "category": "external", "summary": "1108204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108204" }, { "category": "external", "summary": "1108205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108205" }, { "category": "external", "summary": "1108206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108206" }, { "category": "external", "summary": "1108207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108207" }, { "category": "external", "summary": "1108208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108208" }, { "category": "external", "summary": "1108212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108212" }, { "category": "external", "summary": "1108213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108213" }, { "category": "external", "summary": "1108214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108214" }, { "category": "external", "summary": "1108215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108215" }, { "category": "external", "summary": "1108216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108216" }, { "category": "external", "summary": "1108220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108220" }, { "category": "external", "summary": "1108222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108222" }, { "category": "external", "summary": "1108224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108224" }, { "category": "external", "summary": "1108225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108225" }, { "category": "external", "summary": "1108226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108226" }, { "category": "external", "summary": "1108228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108228" }, { "category": "external", "summary": "1108229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108229" }, { "category": "external", "summary": "1108230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108230" }, { "category": "external", "summary": "1108231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108231" }, { "category": "external", "summary": "1108232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108232" }, { "category": "external", "summary": "1108233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108233" }, { "category": "external", "summary": "1108234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108234" }, { "category": "external", "summary": "1108235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108235" }, { "category": "external", "summary": "1108236", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108236" }, { "category": "external", "summary": "1108237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108237" }, { "category": "external", "summary": "1109726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1109726" }, { "category": "external", "summary": "1112603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112603" }, { "category": "external", "summary": "1112605", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112605" }, { "category": "external", "summary": "1112691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1112691" }, { "category": "external", "summary": "1113918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113918" }, { "category": "external", "summary": "1113919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113919" }, { "category": "external", "summary": "1113920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1113920" }, { "category": "external", "summary": "1114013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1114013" }, { "category": "external", "summary": "1115048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115048" }, { "category": "external", "summary": "1115616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1115616" }, { "category": "external", "summary": "1126989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1126989" }, { "category": "external", "summary": "1128380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1128380" }, { "category": "external", "summary": "1129558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129558" }, { "category": "external", "summary": "1129730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129730" }, { "category": "external", "summary": "1131049", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1131049" }, { "category": "external", "summary": "1131187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1131187" }, { "category": "external", "summary": "1131877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1131877" }, { "category": "external", "summary": "1133966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1133966" }, { "category": "external", "summary": "1138773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138773" }, { "category": "external", "summary": "1138775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138775" }, { "category": "external", "summary": "1138777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138777" }, { "category": "external", "summary": "1138791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138791" }, { "category": "external", "summary": "1138792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138792" }, { "category": "external", "summary": "1138795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138795" }, { "category": "external", "summary": "1138798", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138798" }, { "category": "external", "summary": "1138803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1138803" }, { "category": "external", "summary": "1142088", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142088" }, { "category": "external", "summary": "1142789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142789" }, { "category": "external", "summary": "1147679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147679" }, { "category": "external", "summary": "1149124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149124" }, { "category": "external", "summary": "1156466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1156466" }, { "category": "external", "summary": "1159011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159011" }, { "category": "external", "summary": "1159330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159330" }, { "category": "external", "summary": "1159816", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159816" }, { "category": "external", "summary": "1160756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1160756" }, { "category": "external", "summary": "1160758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1160758" }, { "category": "external", "summary": "1161128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161128" }, { "category": "external", "summary": "1161129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161129" }, { "category": "external", "summary": "1161131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161131" }, { "category": "external", "summary": "1162340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162340" }, { "category": "external", "summary": "1163498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163498" }, { "category": "external", "summary": "1163849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163849" }, { "category": "external", "summary": "1164859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164859" }, { "category": "external", "summary": "1164896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164896" }, { "category": "external", "summary": "1166041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166041" }, { "category": "external", "summary": "1166064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166064" }, { "category": "external", "summary": "1166641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166641" }, { "category": "external", "summary": "1166931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166931" }, { "category": "external", "summary": "1167196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167196" }, { "category": "external", "summary": "1167270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167270" }, { "category": "external", "summary": "1167964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167964" }, { "category": "external", "summary": "1168214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168214" }, { "category": "external", "summary": "1168376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168376" }, { "category": "external", "summary": "1168916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168916" }, { "category": "external", "summary": "1169591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169591" }, { "category": "external", "summary": "1169867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169867" }, { "category": "external", "summary": "1170003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170003" }, { "category": "external", "summary": "1170695", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170695" }, { "category": "external", "summary": "1171089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171089" }, { "category": "external", "summary": "1172578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172578" }, { "category": "external", "summary": "1172598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172598" }, { "category": "external", "summary": "1173207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173207" }, { "category": "external", "summary": "1175277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175277" }, { "category": "external", "summary": "1175287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175287" }, { "category": "external", "summary": "1175326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175326" }, { "category": "external", "summary": "1175384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175384" }, { "category": "external", "summary": "1176034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176034" }, { "category": "external", "summary": "1176995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176995" }, { "category": "external", "summary": "1177133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177133" }, { "category": "external", "summary": "1178128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178128" }, { "category": "external", "summary": "1181010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181010" }, { "category": "external", "summary": "1181093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181093" }, { "category": "external", "summary": "1181767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181767" }, { "category": "external", "summary": "1183279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183279" }, { "category": "external", "summary": "1184149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184149" }, { "category": "external", "summary": "1185410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185410" }, { "category": "external", "summary": "1186396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186396" }, { "category": "external", "summary": "1186398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186398" }, { "category": "external", "summary": "1187342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187342" }, { "category": "external", "summary": "1187540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187540" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0442.json" } ], "title": "Red Hat Security Advisory: ipa security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T08:27:01+00:00", "generator": { "date": "2024-11-22T08:27:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:0442", "initial_release_date": "2015-03-05T09:50:39+00:00", "revision_history": [ { "date": "2015-03-05T09:50:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-03-05T09:50:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:27:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ipa-debuginfo-0:4.1.0-18.el7.x86_64", "product": { "name": "ipa-debuginfo-0:4.1.0-18.el7.x86_64", "product_id": "ipa-debuginfo-0:4.1.0-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-debuginfo@4.1.0-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "product": { "name": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "product_id": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-server-trust-ad@4.1.0-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-admintools-0:4.1.0-18.el7.x86_64", "product": { "name": "ipa-admintools-0:4.1.0-18.el7.x86_64", "product_id": "ipa-admintools-0:4.1.0-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-admintools@4.1.0-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-server-0:4.1.0-18.el7.x86_64", "product": { "name": "ipa-server-0:4.1.0-18.el7.x86_64", "product_id": "ipa-server-0:4.1.0-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-server@4.1.0-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-client-0:4.1.0-18.el7.x86_64", "product": { "name": "ipa-client-0:4.1.0-18.el7.x86_64", "product_id": "ipa-client-0:4.1.0-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-client@4.1.0-18.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ipa-python-0:4.1.0-18.el7.x86_64", "product": { "name": "ipa-python-0:4.1.0-18.el7.x86_64", "product_id": "ipa-python-0:4.1.0-18.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-python@4.1.0-18.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ipa-debuginfo-0:4.1.0-18.el7.ppc64", "product": { "name": "ipa-debuginfo-0:4.1.0-18.el7.ppc64", "product_id": "ipa-debuginfo-0:4.1.0-18.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-debuginfo@4.1.0-18.el7?arch=ppc64" } } }, { "category": "product_version", "name": "ipa-admintools-0:4.1.0-18.el7.ppc64", "product": { "name": "ipa-admintools-0:4.1.0-18.el7.ppc64", "product_id": "ipa-admintools-0:4.1.0-18.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-admintools@4.1.0-18.el7?arch=ppc64" } } }, { "category": "product_version", "name": "ipa-client-0:4.1.0-18.el7.ppc64", "product": { "name": "ipa-client-0:4.1.0-18.el7.ppc64", "product_id": "ipa-client-0:4.1.0-18.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-client@4.1.0-18.el7?arch=ppc64" } } }, { "category": "product_version", "name": "ipa-python-0:4.1.0-18.el7.ppc64", "product": { "name": "ipa-python-0:4.1.0-18.el7.ppc64", "product_id": "ipa-python-0:4.1.0-18.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-python@4.1.0-18.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ipa-debuginfo-0:4.1.0-18.el7.s390x", "product": { "name": "ipa-debuginfo-0:4.1.0-18.el7.s390x", "product_id": "ipa-debuginfo-0:4.1.0-18.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-debuginfo@4.1.0-18.el7?arch=s390x" } } }, { "category": "product_version", "name": "ipa-admintools-0:4.1.0-18.el7.s390x", "product": { "name": "ipa-admintools-0:4.1.0-18.el7.s390x", "product_id": "ipa-admintools-0:4.1.0-18.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-admintools@4.1.0-18.el7?arch=s390x" } } }, { "category": "product_version", "name": "ipa-client-0:4.1.0-18.el7.s390x", "product": { "name": "ipa-client-0:4.1.0-18.el7.s390x", "product_id": "ipa-client-0:4.1.0-18.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-client@4.1.0-18.el7?arch=s390x" } } }, { "category": "product_version", "name": "ipa-python-0:4.1.0-18.el7.s390x", "product": { "name": "ipa-python-0:4.1.0-18.el7.s390x", "product_id": "ipa-python-0:4.1.0-18.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa-python@4.1.0-18.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ipa-0:4.1.0-18.el7.src", "product": { "name": "ipa-0:4.1.0-18.el7.src", "product_id": "ipa-0:4.1.0-18.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ipa@4.1.0-18.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ipa-0:4.1.0-18.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-0:4.1.0-18.el7.src" }, "product_reference": "ipa-0:4.1.0-18.el7.src", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-admintools-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-admintools-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-admintools-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-client-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-client-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-client-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-client-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-python-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-python-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-python-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-python-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-server-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:4.1.0-18.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-0:4.1.0-18.el7.src" }, "product_reference": "ipa-0:4.1.0-18.el7.src", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-admintools-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-admintools-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-admintools-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-client-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-client-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-client-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-client-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-debuginfo-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-debuginfo-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-debuginfo-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-python-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-python-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-python-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-python-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-server-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:4.1.0-18.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-0:4.1.0-18.el7.src" }, "product_reference": "ipa-0:4.1.0-18.el7.src", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-client-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-python-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-server-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:4.1.0-18.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-0:4.1.0-18.el7.src" }, "product_reference": "ipa-0:4.1.0-18.el7.src", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-client-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-client-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-client-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-client-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-python-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-python-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-python-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-python-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-server-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:4.1.0-18.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-0:4.1.0-18.el7.src" }, "product_reference": "ipa-0:4.1.0-18.el7.src", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-admintools-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-admintools-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-admintools-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-client-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-client-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-client-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-client-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-python-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-python-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-python-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-python-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-server-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:4.1.0-18.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-0:4.1.0-18.el7.src" }, "product_reference": "ipa-0:4.1.0-18.el7.src", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-admintools-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-admintools-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-admintools-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-client-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-client-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-client-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-client-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-debuginfo-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-debuginfo-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-debuginfo-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-python-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-python-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-python-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-python-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-server-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-0:4.1.0-18.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-0:4.1.0-18.el7.src" }, "product_reference": "ipa-0:4.1.0-18.el7.src", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-admintools-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-admintools-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-admintools-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-admintools-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-admintools-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-client-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-client-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-client-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-client-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-client-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-client-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-debuginfo-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-debuginfo-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-python-0:4.1.0-18.el7.ppc64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-python-0:4.1.0-18.el7.s390x" }, "product_reference": "ipa-python-0:4.1.0-18.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-python-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-python-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-python-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-server-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" }, "product_reference": "ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "relates_to_product_reference": "7Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-5312", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1166041" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery-ui: XSS vulnerability in jQuery.ui.dialog title option", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional:ipa-0:4.1.0-18.el7.src", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Client:ipa-0:4.1.0-18.el7.src", "7Client:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client:ipa-client-0:4.1.0-18.el7.ppc64", "7Client:ipa-client-0:4.1.0-18.el7.s390x", "7Client:ipa-client-0:4.1.0-18.el7.x86_64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client:ipa-python-0:4.1.0-18.el7.ppc64", "7Client:ipa-python-0:4.1.0-18.el7.s390x", "7Client:ipa-python-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-0:4.1.0-18.el7.src", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-0:4.1.0-18.el7.src", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-0:4.1.0-18.el7.src", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server:ipa-0:4.1.0-18.el7.src", "7Server:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server:ipa-client-0:4.1.0-18.el7.ppc64", "7Server:ipa-client-0:4.1.0-18.el7.s390x", "7Server:ipa-client-0:4.1.0-18.el7.x86_64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server:ipa-python-0:4.1.0-18.el7.ppc64", "7Server:ipa-python-0:4.1.0-18.el7.s390x", "7Server:ipa-python-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-0:4.1.0-18.el7.src", "7Workstation:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-admintools-0:4.1.0-18.el7.s390x", "7Workstation:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-client-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-client-0:4.1.0-18.el7.s390x", "7Workstation:ipa-client-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-python-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-python-0:4.1.0-18.el7.s390x", "7Workstation:ipa-python-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-5312" }, { "category": "external", "summary": "RHBZ#1166041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166041" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-5312", "url": "https://www.cve.org/CVERecord?id=CVE-2010-5312" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-5312", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5312" } ], "release_date": "2010-09-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-03-05T09:50:39+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional:ipa-0:4.1.0-18.el7.src", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Client:ipa-0:4.1.0-18.el7.src", "7Client:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client:ipa-client-0:4.1.0-18.el7.ppc64", "7Client:ipa-client-0:4.1.0-18.el7.s390x", "7Client:ipa-client-0:4.1.0-18.el7.x86_64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client:ipa-python-0:4.1.0-18.el7.ppc64", "7Client:ipa-python-0:4.1.0-18.el7.s390x", "7Client:ipa-python-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-0:4.1.0-18.el7.src", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-0:4.1.0-18.el7.src", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-0:4.1.0-18.el7.src", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server:ipa-0:4.1.0-18.el7.src", "7Server:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server:ipa-client-0:4.1.0-18.el7.ppc64", "7Server:ipa-client-0:4.1.0-18.el7.s390x", "7Server:ipa-client-0:4.1.0-18.el7.x86_64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server:ipa-python-0:4.1.0-18.el7.ppc64", "7Server:ipa-python-0:4.1.0-18.el7.s390x", "7Server:ipa-python-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-0:4.1.0-18.el7.src", "7Workstation:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-admintools-0:4.1.0-18.el7.s390x", "7Workstation:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-client-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-client-0:4.1.0-18.el7.s390x", "7Workstation:ipa-client-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-python-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-python-0:4.1.0-18.el7.s390x", "7Workstation:ipa-python-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0442" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Client-optional:ipa-0:4.1.0-18.el7.src", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Client:ipa-0:4.1.0-18.el7.src", "7Client:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client:ipa-client-0:4.1.0-18.el7.ppc64", "7Client:ipa-client-0:4.1.0-18.el7.s390x", "7Client:ipa-client-0:4.1.0-18.el7.x86_64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client:ipa-python-0:4.1.0-18.el7.ppc64", "7Client:ipa-python-0:4.1.0-18.el7.s390x", "7Client:ipa-python-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-0:4.1.0-18.el7.src", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-0:4.1.0-18.el7.src", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-0:4.1.0-18.el7.src", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server:ipa-0:4.1.0-18.el7.src", "7Server:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server:ipa-client-0:4.1.0-18.el7.ppc64", "7Server:ipa-client-0:4.1.0-18.el7.s390x", "7Server:ipa-client-0:4.1.0-18.el7.x86_64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server:ipa-python-0:4.1.0-18.el7.ppc64", "7Server:ipa-python-0:4.1.0-18.el7.s390x", "7Server:ipa-python-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-0:4.1.0-18.el7.src", "7Workstation:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-admintools-0:4.1.0-18.el7.s390x", "7Workstation:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-client-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-client-0:4.1.0-18.el7.s390x", "7Workstation:ipa-client-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-python-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-python-0:4.1.0-18.el7.s390x", "7Workstation:ipa-python-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery-ui: XSS vulnerability in jQuery.ui.dialog title option" }, { "cve": "CVE-2012-6662", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2014-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1166064" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.", "title": "Vulnerability description" }, { "category": "summary", "text": "jquery-ui: XSS vulnerability in default content in Tooltip widget", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional:ipa-0:4.1.0-18.el7.src", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Client:ipa-0:4.1.0-18.el7.src", "7Client:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client:ipa-client-0:4.1.0-18.el7.ppc64", "7Client:ipa-client-0:4.1.0-18.el7.s390x", "7Client:ipa-client-0:4.1.0-18.el7.x86_64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client:ipa-python-0:4.1.0-18.el7.ppc64", "7Client:ipa-python-0:4.1.0-18.el7.s390x", "7Client:ipa-python-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-0:4.1.0-18.el7.src", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-0:4.1.0-18.el7.src", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-0:4.1.0-18.el7.src", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server:ipa-0:4.1.0-18.el7.src", "7Server:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server:ipa-client-0:4.1.0-18.el7.ppc64", "7Server:ipa-client-0:4.1.0-18.el7.s390x", "7Server:ipa-client-0:4.1.0-18.el7.x86_64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server:ipa-python-0:4.1.0-18.el7.ppc64", "7Server:ipa-python-0:4.1.0-18.el7.s390x", "7Server:ipa-python-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-0:4.1.0-18.el7.src", "7Workstation:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-admintools-0:4.1.0-18.el7.s390x", "7Workstation:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-client-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-client-0:4.1.0-18.el7.s390x", "7Workstation:ipa-client-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-python-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-python-0:4.1.0-18.el7.s390x", "7Workstation:ipa-python-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6662" }, { "category": "external", "summary": "RHBZ#1166064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166064" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6662", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6662" } ], "release_date": "2012-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-03-05T09:50:39+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional:ipa-0:4.1.0-18.el7.src", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Client:ipa-0:4.1.0-18.el7.src", "7Client:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client:ipa-client-0:4.1.0-18.el7.ppc64", "7Client:ipa-client-0:4.1.0-18.el7.s390x", "7Client:ipa-client-0:4.1.0-18.el7.x86_64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client:ipa-python-0:4.1.0-18.el7.ppc64", "7Client:ipa-python-0:4.1.0-18.el7.s390x", "7Client:ipa-python-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-0:4.1.0-18.el7.src", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-0:4.1.0-18.el7.src", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-0:4.1.0-18.el7.src", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server:ipa-0:4.1.0-18.el7.src", "7Server:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server:ipa-client-0:4.1.0-18.el7.ppc64", "7Server:ipa-client-0:4.1.0-18.el7.s390x", "7Server:ipa-client-0:4.1.0-18.el7.x86_64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server:ipa-python-0:4.1.0-18.el7.ppc64", "7Server:ipa-python-0:4.1.0-18.el7.s390x", "7Server:ipa-python-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-0:4.1.0-18.el7.src", "7Workstation:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-admintools-0:4.1.0-18.el7.s390x", "7Workstation:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-client-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-client-0:4.1.0-18.el7.s390x", "7Workstation:ipa-client-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-python-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-python-0:4.1.0-18.el7.s390x", "7Workstation:ipa-python-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0442" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Client-optional:ipa-0:4.1.0-18.el7.src", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Client-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Client-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Client-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Client:ipa-0:4.1.0-18.el7.src", "7Client:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Client:ipa-admintools-0:4.1.0-18.el7.s390x", "7Client:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Client:ipa-client-0:4.1.0-18.el7.ppc64", "7Client:ipa-client-0:4.1.0-18.el7.s390x", "7Client:ipa-client-0:4.1.0-18.el7.x86_64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Client:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Client:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Client:ipa-python-0:4.1.0-18.el7.ppc64", "7Client:ipa-python-0:4.1.0-18.el7.s390x", "7Client:ipa-python-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-0:4.1.0-18.el7.x86_64", "7Client:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-0:4.1.0-18.el7.src", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-0:4.1.0-18.el7.src", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-admintools-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-client-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-client-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.ppc64", "7ComputeNode:ipa-python-0:4.1.0-18.el7.s390x", "7ComputeNode:ipa-python-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-0:4.1.0-18.el7.x86_64", "7ComputeNode:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-0:4.1.0-18.el7.src", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-client-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-client-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-client-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-python-0:4.1.0-18.el7.ppc64", "7Server-optional:ipa-python-0:4.1.0-18.el7.s390x", "7Server-optional:ipa-python-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-0:4.1.0-18.el7.x86_64", "7Server-optional:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Server:ipa-0:4.1.0-18.el7.src", "7Server:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Server:ipa-admintools-0:4.1.0-18.el7.s390x", "7Server:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Server:ipa-client-0:4.1.0-18.el7.ppc64", "7Server:ipa-client-0:4.1.0-18.el7.s390x", "7Server:ipa-client-0:4.1.0-18.el7.x86_64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Server:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Server:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Server:ipa-python-0:4.1.0-18.el7.ppc64", "7Server:ipa-python-0:4.1.0-18.el7.s390x", "7Server:ipa-python-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-0:4.1.0-18.el7.x86_64", "7Server:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-0:4.1.0-18.el7.src", "7Workstation:ipa-admintools-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-admintools-0:4.1.0-18.el7.s390x", "7Workstation:ipa-admintools-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-client-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-client-0:4.1.0-18.el7.s390x", "7Workstation:ipa-client-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.s390x", "7Workstation:ipa-debuginfo-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-python-0:4.1.0-18.el7.ppc64", "7Workstation:ipa-python-0:4.1.0-18.el7.s390x", "7Workstation:ipa-python-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-0:4.1.0-18.el7.x86_64", "7Workstation:ipa-server-trust-ad-0:4.1.0-18.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jquery-ui: XSS vulnerability in default content in Tooltip widget" } ] }
gsd-2010-5312
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2010-5312", "description": "Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.", "id": "GSD-2010-5312", "references": [ "https://www.debian.org/security/2015/dsa-3249", "https://access.redhat.com/errata/RHSA-2015:1462", "https://access.redhat.com/errata/RHSA-2015:0442", "https://advisories.mageia.org/CVE-2010-5312.html", "https://linux.oracle.com/cve/CVE-2010-5312.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-5312" ], "details": "Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.", "id": "GSD-2010-5312", "modified": "2023-12-13T01:21:33.390003Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-5312", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "?", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/" }, { "name": "https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html" }, { "name": "https://www.drupal.org/sa-core-2022-002", "refsource": "MISC", "url": "https://www.drupal.org/sa-core-2022-002" }, { "name": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "name": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" }, { "name": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "name": "https://security.netapp.com/advisory/ntap-20190416-0007/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20190416-0007/" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-0442.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-0442.html" }, { "name": "http://www.debian.org/security/2015/dsa-3249", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3249" }, { "name": "http://seclists.org/oss-sec/2014/q4/616", "refsource": "MISC", "url": "http://seclists.org/oss-sec/2014/q4/616" }, { "name": "http://www.securityfocus.com/bid/71106", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/71106" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1462.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1462.html" }, { "name": "http://bugs.jqueryui.com/ticket/6016", "refsource": "MISC", "url": "http://bugs.jqueryui.com/ticket/6016" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98696", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98696" }, { "name": "http://seclists.org/oss-sec/2014/q4/613", "refsource": "MISC", "url": "http://seclists.org/oss-sec/2014/q4/613" }, { "name": "https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3", "refsource": "MISC", "url": "https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3" }, { "name": "http://www.securitytracker.com/id/1037035", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1037035" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=1.7.0 \u003c1.10.0", "affected_versions": "All versions starting from 1.7.0 before 1.10.0", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "cwe_ids": [ "CWE-1035", "CWE-79", "CWE-79", "CWE-937" ], "date": "2022-01-20", "description": "Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.", "fixed_versions": [ "1.10.0" ], "identifier": "CVE-2010-5312", "identifiers": [ "GHSA-wcm2-9c89-wmfm", "CVE-2010-5312" ], "not_impacted": "All versions before 1.7.0, all versions starting from 1.10.0", "package_slug": "npm/jquery-ui", "pubdate": "2017-10-24", "solution": "Upgrade to version 1.10.0 or above.", "title": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2010-5312", "https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3", "https://exchange.xforce.ibmcloud.com/vulnerabilities/98696", "https://github.com/advisories/GHSA-wcm2-9c89-wmfm", "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E", "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E", "https://security.netapp.com/advisory/ntap-20190416-0007/", "http://bugs.jqueryui.com/ticket/6016", "http://rhn.redhat.com/errata/RHSA-2015-0442.html", "http://rhn.redhat.com/errata/RHSA-2015-1462.html", "http://seclists.org/oss-sec/2014/q4/613", "http://seclists.org/oss-sec/2014/q4/616", "http://www.debian.org/security/2015/dsa-3249", "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "http://www.securityfocus.com/bid/71106", "http://www.securitytracker.com/id/1037035", "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E", "https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html", "https://www.drupal.org/sa-core-2022-002" ], "uuid": "f7cdb6ba-8209-44b1-8c28-204ee6b794b1" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:jqueryui:jquery_ui:*:*:*:*:*:jquery:*:*", "cpe_name": [], "versionEndExcluding": "1.10.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:drill:1.16.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.86", "versionStartIncluding": "7.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-5312" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3" }, { "name": "[oss-security] 20141114 Re: old CVE assignments for JQuery 1.10.0", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/616" }, { "name": "http://bugs.jqueryui.com/ticket/6016", "refsource": "CONFIRM", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://bugs.jqueryui.com/ticket/6016" }, { "name": "[oss-security] 20141114 old CVE assignments for JQuery 1.10.0", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/613" }, { "name": "RHSA-2015:0442", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0442.html" }, { "name": "DSA-3249", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3249" }, { "name": "71106", "refsource": "BID", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/71106" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "RHSA-2015:1462", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1462.html" }, { "name": "1037035", "refsource": "SECTRACK", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037035" }, { "name": "jqueryui-cve20105312-xss(98696)", "refsource": "XF", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98696" }, { "name": "https://security.netapp.com/advisory/ntap-20190416-0007/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190416-0007/" }, { "name": "[debian-lts-announce] 20220119 [SECURITY] [DLA-2889-1] drupal7 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html" }, { "name": "https://www.drupal.org/sa-core-2022-002", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.drupal.org/sa-core-2022-002" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/" }, { "name": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442%40%3Cdev.drill.apache.org%3E" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/" }, { "name": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc%40%3Cissues.drill.apache.org%3E" }, { "name": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f%40%3Cdev.drill.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } }, "lastModifiedDate": "2023-06-21T18:26Z", "publishedDate": "2014-11-24T16:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.