Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2012-5603
Vulnerability from cvelistv5
Published
2013-01-04 22:00
Modified
2024-08-06 21:14
Severity ?
EPSS score ?
Summary
proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users' settings via unspecified vectors related to the "consumer UUID" of a system.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:14:15.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cloudforms-katello-sec-bypass(80549)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "name": "88140", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/88140" }, { "name": "51472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51472" }, { "name": "88142", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/88142" }, { "name": "RHSA-2012:1543", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1543.html" }, { "name": "56819", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56819" }, { "name": "RHSA-2013:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "cloudforms-katello-sec-bypass(80549)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "name": "88140", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/88140" }, { "name": "51472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51472" }, { "name": "88142", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/88142" }, { "name": "RHSA-2012:1543", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1543.html" }, { "name": "56819", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56819" }, { "name": "RHSA-2013:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-5603", "datePublished": "2013-01-04T22:00:00", "dateReserved": "2012-10-24T00:00:00", "dateUpdated": "2024-08-06T21:14:15.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:cloudforms:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.0\", \"matchCriteriaId\": \"72189D15-3318-45CD-B37E-FD53E4422052\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \\\"consumer UUID\\\" of a system.\"}, {\"lang\": \"es\", \"value\": \"proxies_controller.rb en Katello en Red Hat CloudForms anterior a v1.1 no comprueba los permisos de forma adecuada, lo que permite a usuarios remotos autenticados leer certificados de consumidores o cambiar especificaciones de usuarios a trav\\u00e9s de vectores relacionados con el \\\"consumer UUID\\\"de un system.\"}]", "id": "CVE-2012-5603", "lastModified": "2024-11-21T01:44:57.130", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:P/I:P/A:N\", \"baseScore\": 5.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.0, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2013-01-04T22:55:02.383", "references": "[{\"url\": \"http://osvdb.org/88140\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://osvdb.org/88142\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1543.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0544.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/51472\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/56819\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=882129\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/80549\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://osvdb.org/88140\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/88142\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2012-1543.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0544.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/51472\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/56819\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=882129\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/80549\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2012-5603\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-01-04T22:55:02.383\",\"lastModified\":\"2024-11-21T01:44:57.130\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \\\"consumer UUID\\\" of a system.\"},{\"lang\":\"es\",\"value\":\"proxies_controller.rb en Katello en Red Hat CloudForms anterior a v1.1 no comprueba los permisos de forma adecuada, lo que permite a usuarios remotos autenticados leer certificados de consumidores o cambiar especificaciones de usuarios a trav\u00e9s de vectores relacionados con el \\\"consumer UUID\\\"de un system.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:N\",\"baseScore\":5.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:cloudforms:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0\",\"matchCriteriaId\":\"72189D15-3318-45CD-B37E-FD53E4422052\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/88140\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://osvdb.org/88142\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1543.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0544.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/51472\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/56819\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=882129\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/80549\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://osvdb.org/88140\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/88142\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1543.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0544.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/51472\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/56819\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=882129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/80549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2012-5603
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users' settings via unspecified vectors related to the "consumer UUID" of a system.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2012-5603", "description": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system.", "id": "GSD-2012-5603", "references": [ "https://access.redhat.com/errata/RHSA-2013:0544", "https://access.redhat.com/errata/RHSA-2012:1543" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-5603" ], "details": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system.", "id": "GSD-2012-5603", "modified": "2023-12-13T01:20:20.047072Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5603", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2013-0544.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1543.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1543.html" }, { "name": "http://secunia.com/advisories/51472", "refsource": "MISC", "url": "http://secunia.com/advisories/51472" }, { "name": "http://www.securityfocus.com/bid/56819", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/56819" }, { "name": "http://osvdb.org/88140", "refsource": "MISC", "url": "http://osvdb.org/88140" }, { "name": "http://osvdb.org/88142", "refsource": "MISC", "url": "http://osvdb.org/88142" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=882129", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:cloudforms:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-5603" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=882129", "refsource": "MISC", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "name": "56819", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/56819" }, { "name": "RHSA-2012:1543", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1543.html" }, { "name": "88142", "refsource": "OSVDB", "tags": [], "url": "http://osvdb.org/88142" }, { "name": "51472", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51472" }, { "name": "88140", "refsource": "OSVDB", "tags": [], "url": "http://osvdb.org/88140" }, { "name": "RHSA-2013:0544", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "name": "cloudforms-katello-sec-bypass(80549)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-08-29T01:32Z", "publishedDate": "2013-01-04T22:55Z" } } }
RHSA-2012:1543
Vulnerability from csaf_redhat
Published
2012-12-04 19:32
Modified
2024-11-22 05:57
Summary
Red Hat Security Advisory: CloudForms System Engine 1.1 update
Notes
Topic
Updated CloudForms System Engine packages that fix multiple security
issues, several bugs, and add enhancements are now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Red Hat CloudForms is an on-premise hybrid cloud
Infrastructure-as-a-Service (IaaS) product that lets you create and manage
private and public clouds.
This update fixes bugs in and adds enhancements to the System Engine
packages, and upgrades the system to CloudForms 1.1.
This update also fixes the following security issues:
It was discovered that Katello did not properly check user permissions when
handling certain requests. An authenticated remote attacker could use this
flaw to download consumer certificates or change settings of other users'
systems if they knew the target system's UUID. (CVE-2012-5603)
It was discovered that Pulp logged administrative passwords to a world
readable log file. A local attacker could use this flaw to control systems
deployed and managed by CloudForms. (CVE-2012-3538)
It was discovered that the Pulp configuration file pulp.conf was installed
as world readable. A local attacker could use this flaw to view the
administrative password, allowing them to control systems deployed and
managed by CloudForms. (CVE-2012-4574)
It was discovered that grinder used insecure permissions for its cache
directory. A local attacker could use this flaw to access or modify files
in the cache. (CVE-2012-5605)
The CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;
CVE-2012-3538 was discovered by James Laska of Red Hat; CVE-2012-4574 was
discovered by Kurt Seifried of Red Hat; and CVE-2012-5605 was discovered by
James Labocki of Red Hat.
After upgrading to these new packages, follow the instructions in the "4.1.
Upgrading CloudForms System Engine" section of the CloudForms 1.1
Installation Guide:
https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html
To view the full list of changes in this update, view the CloudForms
Technical Notes:
https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html
Users are advised to upgrade to these updated CloudForms System Engine
packages, which resolve these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated CloudForms System Engine packages that fix multiple security\nissues, several bugs, and add enhancements are now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms is an on-premise hybrid cloud\nInfrastructure-as-a-Service (IaaS) product that lets you create and manage\nprivate and public clouds.\n\nThis update fixes bugs in and adds enhancements to the System Engine\npackages, and upgrades the system to CloudForms 1.1.\n\nThis update also fixes the following security issues:\n\nIt was discovered that Katello did not properly check user permissions when\nhandling certain requests. An authenticated remote attacker could use this\nflaw to download consumer certificates or change settings of other users\u0027\nsystems if they knew the target system\u0027s UUID. (CVE-2012-5603)\n\nIt was discovered that Pulp logged administrative passwords to a world\nreadable log file. A local attacker could use this flaw to control systems\ndeployed and managed by CloudForms. (CVE-2012-3538)\n\nIt was discovered that the Pulp configuration file pulp.conf was installed\nas world readable. A local attacker could use this flaw to view the\nadministrative password, allowing them to control systems deployed and\nmanaged by CloudForms. (CVE-2012-4574)\n\nIt was discovered that grinder used insecure permissions for its cache\ndirectory. A local attacker could use this flaw to access or modify files\nin the cache. (CVE-2012-5605)\n\nThe CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;\nCVE-2012-3538 was discovered by James Laska of Red Hat; CVE-2012-4574 was\ndiscovered by Kurt Seifried of Red Hat; and CVE-2012-5605 was discovered by\nJames Labocki of Red Hat.\n\nAfter upgrading to these new packages, follow the instructions in the \"4.1.\nUpgrading CloudForms System Engine\" section of the CloudForms 1.1\nInstallation Guide:\n\nhttps://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html\n\nTo view the full list of changes in this update, view the CloudForms\nTechnical Notes:\n\nhttps://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html\n\nUsers are advised to upgrade to these updated CloudForms System Engine\npackages, which resolve these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1543", "url": "https://access.redhat.com/errata/RHSA-2012:1543" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html", "url": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html", "url": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html" }, { "category": "external", "summary": "746765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746765" }, { "category": "external", "summary": "753128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753128" }, { "category": "external", "summary": "760180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760180" }, { "category": "external", "summary": "766694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=766694" }, { "category": "external", "summary": "769559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769559" }, { "category": "external", "summary": "782954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=782954" }, { "category": "external", "summary": "786176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786176" }, { "category": "external", "summary": "786226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786226" }, { "category": "external", "summary": "787184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=787184" }, { "category": "external", "summary": "787305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=787305" }, { "category": "external", "summary": "789139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789139" }, { "category": "external", "summary": "789535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789535" }, { "category": "external", "summary": "790138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790138" }, { "category": "external", "summary": "790342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790342" }, { "category": "external", "summary": "796047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=796047" }, { "category": "external", "summary": "796972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=796972" }, { "category": "external", "summary": "797299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797299" }, { "category": "external", "summary": "797321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797321" }, { "category": "external", "summary": "797412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797412" }, { "category": "external", "summary": "799538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799538" }, { "category": "external", "summary": "800529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800529" }, { "category": "external", "summary": "801454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801454" }, { "category": "external", "summary": "801580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801580" }, { "category": "external", "summary": "802925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802925" }, { "category": "external", "summary": "803548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803548" }, { "category": "external", "summary": "803702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803702" }, { "category": "external", "summary": "803728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803728" }, { "category": "external", "summary": "803761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803761" }, { "category": "external", "summary": "804127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804127" }, { "category": "external", "summary": "804555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804555" }, { "category": "external", "summary": "804610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804610" }, { "category": "external", "summary": "804685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804685" }, { "category": "external", "summary": "805027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805027" }, { "category": "external", "summary": "805412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805412" }, { "category": "external", "summary": "805627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805627" }, { "category": "external", "summary": "805709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805709" }, { "category": "external", "summary": "805956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805956" }, { "category": "external", "summary": "806076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806076" }, { "category": "external", "summary": "806078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806078" }, { "category": "external", "summary": "806083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806083" }, { "category": "external", "summary": "806353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806353" }, { "category": "external", "summary": "806879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806879" }, { "category": "external", "summary": "806940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806940" }, { "category": "external", "summary": "806969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806969" }, { "category": "external", "summary": "807288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807288" }, { "category": "external", "summary": "807291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807291" }, { "category": "external", "summary": "807468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807468" }, { "category": "external", "summary": "807804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807804" }, { "category": "external", "summary": "808172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=808172" }, { "category": "external", "summary": "808437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=808437" }, { "category": "external", "summary": "809259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=809259" }, { "category": "external", "summary": "810378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810378" }, { "category": "external", "summary": "810945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810945" }, { "category": "external", "summary": "811556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=811556" }, { "category": "external", "summary": "811564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=811564" }, { "category": "external", "summary": "812417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812417" }, { "category": "external", "summary": "813675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=813675" }, { "category": "external", "summary": "815308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815308" }, { "category": "external", "summary": "815802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815802" }, { "category": "external", "summary": "816935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816935" }, { "category": "external", "summary": "817123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817123" }, { "category": "external", "summary": "818204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818204" }, { "category": "external", "summary": "818261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818261" }, { "category": "external", "summary": "818370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818370" }, { "category": "external", "summary": "819593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819593" }, { "category": "external", "summary": "819941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819941" }, { "category": "external", "summary": "820373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820373" }, { "category": "external", "summary": "820385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820385" }, { "category": "external", "summary": "820624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820624" }, { "category": "external", "summary": "820626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820626" }, { "category": "external", "summary": "820630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820630" }, { "category": "external", "summary": "821345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821345" }, { "category": "external", "summary": "821644", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821644" }, { "category": "external", "summary": "821929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821929" }, { "category": "external", "summary": "822119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822119" }, { "category": "external", "summary": "822484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822484" }, { "category": "external", "summary": "823688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823688" }, { "category": "external", "summary": "824069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824069" }, { "category": "external", "summary": "824581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824581" }, { "category": "external", "summary": "826581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826581" }, { "category": "external", "summary": "827087", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=827087" }, { "category": "external", "summary": "827108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=827108" }, { "category": "external", "summary": "828447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828447" }, { "category": "external", "summary": "828533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828533" }, { "category": "external", "summary": "829208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829208" }, { "category": "external", "summary": "829437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829437" }, { "category": "external", "summary": "829794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829794" }, { "category": "external", "summary": "830176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=830176" }, { "category": "external", "summary": "831664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831664" }, { "category": "external", "summary": "834006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834006" }, { "category": "external", "summary": "834013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834013" }, { "category": "external", "summary": "834242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834242" }, { "category": "external", "summary": "834646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834646" }, { "category": "external", "summary": "834697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834697" }, { "category": "external", "summary": "835586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835586" }, { "category": "external", "summary": "835591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835591" }, { "category": "external", "summary": "835875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835875" }, { "category": "external", "summary": "836339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836339" }, { "category": "external", "summary": "836575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836575" }, { "category": "external", "summary": "837000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837000" }, { "category": "external", "summary": "839005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839005" }, { "category": "external", "summary": "840616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840616" }, { "category": "external", "summary": "840624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840624" }, { "category": "external", "summary": "840625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840625" }, { "category": "external", "summary": "841000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841000" }, { "category": "external", "summary": "841289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841289" }, { "category": "external", "summary": "841300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841300" }, { "category": "external", "summary": "841310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841310" }, { "category": "external", "summary": "841686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841686" }, { "category": "external", "summary": "841691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841691" }, { "category": "external", "summary": "841984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841984" }, { "category": "external", "summary": "841998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841998" }, { "category": "external", "summary": "842003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842003" }, { "category": "external", "summary": "842005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842005" }, { "category": "external", "summary": "842010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842010" }, { "category": "external", "summary": "842252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842252" }, { "category": "external", "summary": "842256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842256" }, { "category": "external", "summary": "842271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842271" }, { "category": "external", "summary": "842569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842569" }, { "category": "external", "summary": "842838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842838" }, { "category": "external", "summary": "842858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842858" }, { "category": "external", "summary": "843059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843059" }, { "category": "external", "summary": "843061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843061" }, { "category": "external", "summary": "843064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843064" }, { "category": "external", "summary": "843161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843161" }, { "category": "external", "summary": "843165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843165" }, { "category": "external", "summary": "843462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843462" }, { "category": "external", "summary": "843529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843529" }, { "category": "external", "summary": "843845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843845" }, { "category": "external", "summary": "844414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844414" }, { "category": "external", "summary": "844417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844417" }, { "category": "external", "summary": "844678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844678" }, { "category": "external", "summary": "844796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844796" }, { "category": "external", "summary": "844806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844806" }, { "category": "external", "summary": "845060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845060" }, { "category": "external", "summary": "845096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845096" }, { "category": "external", "summary": "845198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845198" }, { "category": "external", "summary": "845224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845224" }, { "category": "external", "summary": "845576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845576" }, { "category": "external", "summary": "845580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845580" }, { "category": "external", "summary": "845613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845613" }, { "category": "external", "summary": "845668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845668" }, { "category": "external", "summary": "845995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845995" }, { "category": "external", "summary": "846251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846251" }, { "category": "external", "summary": "846482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846482" }, { "category": "external", "summary": "846719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846719" }, { "category": "external", "summary": "847002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847002" }, { "category": "external", "summary": "847115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847115" }, { "category": "external", "summary": "847858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847858" }, { "category": "external", "summary": "848038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848038" }, { "category": "external", "summary": "849224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849224" }, { "category": "external", "summary": "850342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850342" }, { "category": "external", "summary": "850790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850790" }, { "category": "external", "summary": "851080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851080" }, { "category": "external", "summary": "851142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851142" }, { "category": "external", "summary": "851512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851512" }, { "category": "external", "summary": "852006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852006" }, { "category": "external", "summary": "852119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852119" }, { "category": "external", "summary": "852167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852167" }, { "category": "external", "summary": "852199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852199" }, { "category": "external", "summary": "852316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852316" }, { "category": "external", "summary": "852388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852388" }, { "category": "external", "summary": "852791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852791" }, { "category": "external", "summary": "852804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852804" }, { "category": "external", "summary": "853056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853056" }, { "category": "external", "summary": "853229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853229" }, { "category": "external", "summary": "853356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853356" }, { "category": "external", "summary": "853445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853445" }, { "category": "external", "summary": "853995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853995" }, { "category": "external", "summary": "854697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854697" }, { "category": "external", "summary": "855184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855184" }, { "category": "external", "summary": "855267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855267" }, { "category": "external", "summary": "855406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855406" }, { "category": "external", "summary": "856220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856220" }, { "category": "external", "summary": "857078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857078" }, { "category": "external", "summary": "857230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857230" }, { "category": "external", "summary": "857274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857274" }, { "category": "external", "summary": "857499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857499" }, { "category": "external", "summary": "857539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857539" }, { "category": "external", "summary": "857550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857550" }, { "category": "external", "summary": "857574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857574" }, { "category": "external", "summary": "857720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857720" }, { "category": "external", "summary": "857727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857727" }, { "category": "external", "summary": "857842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857842" }, { "category": "external", "summary": "858011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858011" }, { "category": "external", "summary": "858013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858013" }, { "category": "external", "summary": "858038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858038" }, { "category": "external", "summary": "858193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858193" }, { "category": "external", "summary": "858277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858277" }, { "category": "external", "summary": "858358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858358" }, { "category": "external", "summary": "858360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858360" }, { "category": "external", "summary": "858363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858363" }, { "category": "external", "summary": "858661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858661" }, { "category": "external", "summary": "858678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858678" }, { "category": "external", "summary": "858682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858682" }, { "category": "external", "summary": "858706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858706" }, { "category": "external", "summary": "858960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858960" }, { "category": "external", "summary": "859329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859329" }, { "category": "external", "summary": "859407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859407" }, { "category": "external", "summary": "859415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859415" }, { "category": "external", "summary": "859442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859442" }, { "category": "external", "summary": "859604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859604" }, { "category": "external", "summary": "859784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859784" }, { "category": "external", "summary": "859963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859963" }, { "category": "external", "summary": "860251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860251" }, { "category": "external", "summary": "860421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860421" }, { "category": "external", "summary": "860702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860702" }, { "category": "external", "summary": "860709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860709" }, { "category": "external", "summary": "862441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=862441" }, { "category": "external", "summary": "862997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=862997" }, { "category": "external", "summary": "863187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863187" }, { "category": "external", "summary": "863252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863252" }, { "category": "external", "summary": "864216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864216" }, { "category": "external", "summary": "864372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864372" }, { "category": "external", "summary": "864936", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864936" }, { "category": "external", "summary": "864999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864999" }, { "category": "external", "summary": "865528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865528" }, { "category": "external", "summary": "865811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865811" }, { "category": "external", "summary": "869575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869575" }, { "category": "external", "summary": "871086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871086" }, { "category": "external", "summary": "872096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872096" }, { "category": "external", "summary": "872305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872305" }, { "category": "external", "summary": "872487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872487" }, { "category": "external", "summary": "873850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873850" }, { "category": "external", "summary": "874160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874160" }, { "category": "external", "summary": "874185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874185" }, { "category": "external", "summary": "874768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874768" }, { "category": "external", "summary": "882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "882138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882138" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1543.json" } ], "title": "Red Hat Security Advisory: CloudForms System Engine 1.1 update", "tracking": { "current_release_date": "2024-11-22T05:57:26+00:00", "generator": { "date": "2024-11-22T05:57:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1543", "initial_release_date": "2012-12-04T19:32:00+00:00", "revision_history": [ { "date": "2012-12-04T19:32:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-12-04T19:39:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:57:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms System Engine for RHEL 6 Server", "product": { "name": "CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine", "product_identification_helper": { "cpe": "cpe:/a:cloudforms_systemengine:1::el6" } } }, { "category": "product_name", "name": "CloudForms Tools for RHEL 6 Server", "product": { "name": "CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools", "product_identification_helper": { "cpe": "cpe:/a:cloudforms_tools:1::el6" } } }, { "category": "product_name", "name": "CloudForms Tools for RHEL 5 Server", "product": { "name": "CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools", "product_identification_helper": { "cpe": "cpe:/a:cloudforms_tools:1::el5" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6cf.noarch", "product": { "name": "quartz-0:2.1.5-4.el6cf.noarch", "product_id": "quartz-0:2.1.5-4.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el6cf.noarch", "product": { "name": "katello-agent-0:1.1.2-1.el6cf.noarch", "product_id": "katello-agent-0:1.1.2-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "product": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "product_id": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.1.8-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "grinder-0:0.0.150-1.el6cf.noarch", "product": { "name": "grinder-0:0.0.150-1.el6cf.noarch", "product_id": "grinder-0:0.0.150-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/grinder@0.0.150-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el6cf.noarch", "product": { "name": "gofer-0:0.66.1-2.el6cf.noarch", "product_id": "gofer-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "product": { "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "product_id": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-watchdog@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "gofer-package-0:0.66.1-2.el6cf.noarch", "product": { "name": "gofer-package-0:0.66.1-2.el6cf.noarch", "product_id": "gofer-package-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-package@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "python-gofer-0:0.66.1-2.el6cf.noarch", "product": { "name": "python-gofer-0:0.66.1-2.el6cf.noarch", "product_id": "python-gofer-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gofer@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "product": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "product_id": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.11-3.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-devel@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-tomcat6@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-selinux@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-selinux-0:1.1.1-2.el6cf.noarch", "product": { "name": "katello-selinux-0:1.1.1-2.el6cf.noarch", "product_id": "katello-selinux-0:1.1.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.1.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-client-lib@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-common-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-common-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-common-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-common@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-selinux-server@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-consumer@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-admin-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-admin-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-admin-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-admin@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "product": { "name": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "product_id": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-common@1.1.8-12.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-0:1.1.8-12.el6cf.noarch", "product": { "name": "katello-cli-0:1.1.8-12.el6cf.noarch", "product_id": "katello-cli-0:1.1.8-12.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.1.8-12.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "product": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "product_id": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-tests@1.1.5-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-configure-0:1.1.9-12.el6cf.noarch", "product": { "name": "katello-configure-0:1.1.9-12.el6cf.noarch", "product_id": "katello-configure-0:1.1.9-12.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.1.9-12.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "product_id": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-pulp@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-all-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-all-0:1.1.12-22.el6cf.noarch", "product_id": "katello-all-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-all@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-0:1.1.12-22.el6cf.noarch", "product_id": "katello-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-common-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-common-0:1.1.12-22.el6cf.noarch", "product_id": "katello-common-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-common@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "product_id": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-candlepin@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "product_id": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-api-docs@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el5.noarch", "product": { "name": "katello-agent-0:1.1.2-1.el5.noarch", "product_id": "katello-agent-0:1.1.2-1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el5?arch=noarch" } } }, { "category": "product_version", "name": "python-gofer-0:0.66.1-2.el5.noarch", "product": { "name": "python-gofer-0:0.66.1-2.el5.noarch", "product_id": "python-gofer-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gofer@0.66.1-2.el5?arch=noarch" } } }, { "category": "product_version", "name": "gofer-watchdog-0:0.66.1-2.el5.noarch", "product": { "name": "gofer-watchdog-0:0.66.1-2.el5.noarch", "product_id": "gofer-watchdog-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-watchdog@0.66.1-2.el5?arch=noarch" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el5.noarch", "product": { "name": "gofer-0:0.66.1-2.el5.noarch", "product_id": "gofer-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el5?arch=noarch" } } }, { "category": "product_version", "name": "gofer-package-0:0.66.1-2.el5.noarch", "product": { "name": "gofer-package-0:0.66.1-2.el5.noarch", "product_id": "gofer-package-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-package@0.66.1-2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6cf.src", "product": { "name": "quartz-0:2.1.5-4.el6cf.src", "product_id": "quartz-0:2.1.5-4.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el6cf.src", "product": { "name": "katello-agent-0:1.1.2-1.el6cf.src", "product_id": "katello-agent-0:1.1.2-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.1.8-1.el6cf.src", "product": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.src", "product_id": "katello-certs-tools-0:1.1.8-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.1.8-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "grinder-0:0.0.150-1.el6cf.src", "product": { "name": "grinder-0:0.0.150-1.el6cf.src", "product_id": "grinder-0:0.0.150-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grinder@0.0.150-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el6cf.src", "product": { "name": "gofer-0:0.66.1-2.el6cf.src", "product_id": "gofer-0:0.66.1-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "product": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "product_id": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.11-3.el6cf?arch=src" } } }, { "category": "product_version", "name": "candlepin-0:0.7.8.1-1.el6cf.src", "product": { "name": "candlepin-0:0.7.8.1-1.el6cf.src", "product_id": "candlepin-0:0.7.8.1-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.8.1-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-selinux-0:1.1.1-2.el6cf.src", "product": { "name": "katello-selinux-0:1.1.1-2.el6cf.src", "product_id": "katello-selinux-0:1.1.1-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.1.1-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "pulp-0:1.1.14-1.el6cf.src", "product": { "name": "pulp-0:1.1.14-1.el6cf.src", "product_id": "pulp-0:1.1.14-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp@1.1.14-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-cli-0:1.1.8-12.el6cf.src", "product": { "name": "katello-cli-0:1.1.8-12.el6cf.src", "product_id": "katello-cli-0:1.1.8-12.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.1.8-12.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-cli-tests-0:1.1.5-2.el6cf.src", "product": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.src", "product_id": "katello-cli-tests-0:1.1.5-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-tests@1.1.5-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-configure-0:1.1.9-12.el6cf.src", "product": { "name": "katello-configure-0:1.1.9-12.el6cf.src", "product_id": "katello-configure-0:1.1.9-12.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.1.9-12.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-0:1.1.12-22.el6cf.src", "product": { "name": "katello-0:1.1.12-22.el6cf.src", "product_id": "katello-0:1.1.12-22.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello@1.1.12-22.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el5.src", "product": { "name": "katello-agent-0:1.1.2-1.el5.src", "product_id": "katello-agent-0:1.1.2-1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el5?arch=src" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el5.src", "product": { "name": "gofer-0:0.66.1-2.el5.src", "product_id": "gofer-0:0.66.1-2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch" }, "product_reference": "gofer-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el5.src as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-0:0.66.1-2.el5.src" }, "product_reference": "gofer-0:0.66.1-2.el5.src", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-package-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch" }, "product_reference": "gofer-package-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-watchdog-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch" }, "product_reference": "gofer-watchdog-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch" }, "product_reference": "katello-agent-0:1.1.2-1.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el5.src as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src" }, "product_reference": "katello-agent-0:1.1.2-1.el5.src", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "python-gofer-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch" }, "product_reference": "python-gofer-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.src as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src" }, "product_reference": "gofer-0:0.66.1-2.el6cf.src", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-package-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-package-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch" }, "product_reference": "katello-agent-0:1.1.2-1.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el6cf.src as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src" }, "product_reference": "katello-agent-0:1.1.2-1.el6cf.src", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "python-gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "python-gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.8.1-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src" }, "product_reference": "candlepin-0:0.7.8.1-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src" }, "product_reference": "gofer-0:0.66.1-2.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-package-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-package-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "grinder-0:0.0.150-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch" }, "product_reference": "grinder-0:0.0.150-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "grinder-0:0.0.150-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src" }, "product_reference": "grinder-0:0.0.150-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-0:1.1.12-22.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src" }, "product_reference": "katello-0:1.1.12-22.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-all-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-all-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-api-docs-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch" }, "product_reference": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src" }, "product_reference": "katello-certs-tools-0:1.1.8-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.1.8-12.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch" }, "product_reference": "katello-cli-0:1.1.8-12.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.1.8-12.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src" }, "product_reference": "katello-cli-0:1.1.8-12.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-common-0:1.1.8-12.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch" }, "product_reference": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch" }, "product_reference": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src" }, "product_reference": "katello-cli-tests-0:1.1.5-2.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-common-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-common-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.1.9-12.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch" }, "product_reference": "katello-configure-0:1.1.9-12.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.1.9-12.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src" }, "product_reference": "katello-configure-0:1.1.9-12.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.1.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch" }, "product_reference": "katello-selinux-0:1.1.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.1.1-2.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src" }, "product_reference": "katello-selinux-0:1.1.1-2.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-0:1.1.14-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src" }, "product_reference": "pulp-0:1.1.14-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-admin-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-admin-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-client-lib-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-common-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-common-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-consumer-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "python-gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "python-gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch" }, "product_reference": "quartz-0:2.1.5-4.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src" }, "product_reference": "quartz-0:2.1.5-4.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch" }, "product_reference": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" }, "product_reference": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "James Laska" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-3538", "discovery_date": "2012-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "852199" } ], "notes": [ { "category": "description", "text": "Pulp in Red Hat CloudForms before 1.1 logs administrative passwords in a world-readable file, which allows local users to read pulp administrative passwords by reading production.log.", "title": "Vulnerability description" }, { "category": "summary", "text": "katello: pulp admin password logged in plaintext in world-readable katello/production.log", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3538" }, { "category": "external", "summary": "RHBZ#852199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3538", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3538" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "katello: pulp admin password logged in plaintext in world-readable katello/production.log" }, { "acknowledgments": [ { "names": [ "Kurt Seifried" ], "organization": "Red Hat Security Response Team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-4574", "discovery_date": "2012-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "872487" } ], "notes": [ { "category": "description", "text": "Pulp in Red Hat CloudForms before 1.1 uses world-readable permissions for pulp.conf, which allows local users to read the administrative password by reading this file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pulp /etc/pulp/pulp.conf world readable, contains default admin password", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4574" }, { "category": "external", "summary": "RHBZ#872487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872487" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4574", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4574" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4574", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4574" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pulp /etc/pulp/pulp.conf world readable, contains default admin password" }, { "acknowledgments": [ { "names": [ "Lukas Zapletal" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5603", "discovery_date": "2012-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "882129" } ], "notes": [ { "category": "description", "text": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Katello: lack of authorization in proxies_controller.rb", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5603" }, { "category": "external", "summary": "RHBZ#882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5603", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Katello: lack of authorization in proxies_controller.rb" }, { "acknowledgments": [ { "names": [ "James Labocki" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5605", "discovery_date": "2012-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "882138" } ], "notes": [ { "category": "description", "text": "Grinder in Red Hat CloudForms before 1.1 uses world-writable permissions for /var/lib/pulp/cache/grinder/, which allows local users to modify grinder cache files.", "title": "Vulnerability description" }, { "category": "summary", "text": "grinder: /var/lib/pulp/cache/grinder directory is world-writeable", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Update Infrastructure 2.1.3 is now in Production 2 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Update Infrastructure Life Cycle: https://access.redhat.com/support/policy/updates/rhui.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5605" }, { "category": "external", "summary": "RHBZ#882138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882138" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5605", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5605" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grinder: /var/lib/pulp/cache/grinder directory is world-writeable" } ] }
RHSA-2013:0544
Vulnerability from csaf_redhat
Published
2013-02-21 19:04
Modified
2024-11-22 06:14
Summary
Red Hat Security Advisory: Subscription Asset Manager 1.2 update
Notes
Topic
Red Hat Subscription Asset Manager 1.2, which fixes several security
issues, multiple bugs, and adds various enhancements, is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
[Updated 25th February 2013]
This erratum previously failed to include the updated rubygem-rack package.
It also previously incorrectly documented CVE-2012-5604 as being fixed,
however that issue never affected Subscription Asset Manager and is no
longer listed. As well, CVE-2012-6496 was described as being fixed, however
that issue had previously been fixed in RHSA-2013:0154.
Details
Red Hat Subscription Asset Manager acts as a proxy for handling
subscription information and software updates on client machines.
It was discovered that Katello did not properly check user permissions when
handling certain requests. An authenticated remote attacker could use this
flaw to download consumer certificates or change settings of other users'
systems if they knew the target system's UUID. (CVE-2012-5603)
It was found that the
"/usr/share/katello/script/katello-generate-passphrase" utility, which is
run during the installation and configuration process, set world-readable
permissions on the "/etc/katello/secure/passphrase" file. A local attacker
could use this flaw to obtain the passphrase for Katello, giving them
access to information they would otherwise not have access to.
(CVE-2012-5561)
Note: After installing this update, ensure the
"/etc/katello/secure/passphrase" file is owned by the root user and group
and mode 0750 permissions. Sites should also consider re-creating the
Katello passphrase as this issue exposed it to local users.
Three flaws were found in rubygem-rack. A remote attacker could use these
flaws to perform a denial of service attack against applications using
rubygem-rack. (CVE-2012-6109, CVE-2013-0183, CVE-2013-0184)
It was found that ruby_parser from rubygem-ruby_parser created a temporary
file in an insecure way. A local attacker could use this flaw to perform a
symbolic link attack, overwriting arbitrary files accessible to the
application using ruby_parser. (CVE-2013-0162)
The CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;
CVE-2012-5561 was discovered by Aaron Weitekamp of the Red Hat Cloud
Quality Engineering team; and CVE-2013-0162 was discovered by Michael
Scherer of the Red Hat Regional IT team.
These updated Subscription Asset Manager packages include a number of bug
fixes and enhancements. Space precludes documenting all of these changes
in this advisory. Refer to the Red Hat Subscription Asset Manager 1.2
Release Notes for information about these changes:
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html
All users of Red Hat Subscription Asset Manager are advised to upgrade to
these updated packages, which fix these issues and add various
enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Subscription Asset Manager 1.2, which fixes several security\nissues, multiple bugs, and adds various enhancements, is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\n[Updated 25th February 2013]\nThis erratum previously failed to include the updated rubygem-rack package.\nIt also previously incorrectly documented CVE-2012-5604 as being fixed,\nhowever that issue never affected Subscription Asset Manager and is no\nlonger listed. As well, CVE-2012-6496 was described as being fixed, however\nthat issue had previously been fixed in RHSA-2013:0154.", "title": "Topic" }, { "category": "general", "text": "Red Hat Subscription Asset Manager acts as a proxy for handling\nsubscription information and software updates on client machines.\n\nIt was discovered that Katello did not properly check user permissions when\nhandling certain requests. An authenticated remote attacker could use this\nflaw to download consumer certificates or change settings of other users\u0027\nsystems if they knew the target system\u0027s UUID. (CVE-2012-5603)\n\nIt was found that the\n\"/usr/share/katello/script/katello-generate-passphrase\" utility, which is\nrun during the installation and configuration process, set world-readable\npermissions on the \"/etc/katello/secure/passphrase\" file. A local attacker\ncould use this flaw to obtain the passphrase for Katello, giving them\naccess to information they would otherwise not have access to.\n(CVE-2012-5561)\n\nNote: After installing this update, ensure the\n\"/etc/katello/secure/passphrase\" file is owned by the root user and group\nand mode 0750 permissions. Sites should also consider re-creating the\nKatello passphrase as this issue exposed it to local users.\n\nThree flaws were found in rubygem-rack. A remote attacker could use these\nflaws to perform a denial of service attack against applications using\nrubygem-rack. (CVE-2012-6109, CVE-2013-0183, CVE-2013-0184)\n\nIt was found that ruby_parser from rubygem-ruby_parser created a temporary\nfile in an insecure way. A local attacker could use this flaw to perform a\nsymbolic link attack, overwriting arbitrary files accessible to the\napplication using ruby_parser. (CVE-2013-0162)\n\nThe CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;\nCVE-2012-5561 was discovered by Aaron Weitekamp of the Red Hat Cloud\nQuality Engineering team; and CVE-2013-0162 was discovered by Michael\nScherer of the Red Hat Regional IT team.\n\nThese updated Subscription Asset Manager packages include a number of bug\nfixes and enhancements. Space precludes documenting all of these changes\nin this advisory. Refer to the Red Hat Subscription Asset Manager 1.2\nRelease Notes for information about these changes:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html\n\nAll users of Red Hat Subscription Asset Manager are advised to upgrade to\nthese updated packages, which fix these issues and add various\nenhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0544", "url": "https://access.redhat.com/errata/RHSA-2013:0544" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html" }, { "category": "external", "summary": "760564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760564" }, { "category": "external", "summary": "800145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800145" }, { "category": "external", "summary": "809823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=809823" }, { "category": "external", "summary": "813291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=813291" }, { "category": "external", "summary": "817845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817845" }, { "category": "external", "summary": "817946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817946" }, { "category": "external", "summary": "818679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818679" }, { "category": "external", "summary": "818903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818903" }, { "category": "external", "summary": "819002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819002" }, { "category": "external", "summary": "819611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819611" }, { "category": "external", "summary": "822942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822942" }, { "category": "external", "summary": "822943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822943" }, { "category": "external", "summary": "822945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822945" }, { "category": "external", "summary": "826099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826099" }, { "category": "external", "summary": "829474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829474" }, { "category": "external", "summary": "832425", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832425" }, { "category": "external", "summary": "832462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832462" }, { "category": "external", "summary": "840595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840595" }, { "category": "external", "summary": "840600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840600" }, { "category": "external", "summary": "840603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840603" }, { "category": "external", "summary": "840609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840609" }, { "category": "external", "summary": "840792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840792" }, { "category": "external", "summary": "840969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840969" }, { "category": "external", "summary": "841868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841868" }, { "category": "external", "summary": "843625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843625" }, { "category": "external", "summary": "843857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843857" }, { "category": "external", "summary": "843861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843861" }, { "category": "external", "summary": "843904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843904" }, { "category": "external", "summary": "845501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845501" }, { "category": "external", "summary": "845620", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845620" }, { "category": "external", "summary": "847024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847024" }, { "category": "external", "summary": "847117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847117" }, { "category": "external", "summary": "847598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847598" }, { "category": "external", "summary": "850336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850336" }, { "category": "external", "summary": "852508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852508" }, { "category": "external", "summary": "854278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854278" }, { "category": "external", "summary": "854283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854283" }, { "category": "external", "summary": "854985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854985" }, { "category": "external", "summary": "856303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856303" }, { "category": "external", "summary": "856777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856777" }, { "category": "external", "summary": "856795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856795" }, { "category": "external", "summary": "857452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857452" }, { "category": "external", "summary": "859128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859128" }, { "category": "external", "summary": "863461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863461" }, { "category": "external", "summary": "865571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865571" }, { "category": "external", "summary": "866323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866323" }, { "category": "external", "summary": "866972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866972" }, { "category": "external", "summary": "866995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866995" }, { "category": "external", "summary": "868290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868290" }, { "category": "external", "summary": "869380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869380" }, { "category": "external", "summary": "871622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871622" }, { "category": "external", "summary": "872332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872332" }, { "category": "external", "summary": "872334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872334" }, { "category": "external", "summary": "872335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872335" }, { "category": "external", "summary": "872602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872602" }, { "category": "external", "summary": "872687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872687" }, { "category": "external", "summary": "873038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873038" }, { "category": "external", "summary": "873443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873443" }, { "category": "external", "summary": "873803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873803" }, { "category": "external", "summary": "873809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873809" }, { "category": "external", "summary": "874182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874182" }, { "category": "external", "summary": "874280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874280" }, { "category": "external", "summary": "874502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874502" }, { "category": "external", "summary": "874510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874510" }, { "category": "external", "summary": "874583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874583" }, { "category": "external", "summary": "874737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874737" }, { "category": "external", "summary": "874744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874744" }, { "category": "external", "summary": "875101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875101" }, { "category": "external", "summary": "875609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875609" }, { "category": "external", "summary": "875876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875876" }, { "category": "external", "summary": "876869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876869" }, { "category": "external", "summary": "876896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876896" }, { "category": "external", "summary": "876911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876911" }, { "category": "external", "summary": "877317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877317" }, { "category": "external", "summary": "877473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877473" }, { "category": "external", "summary": "877894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877894" }, { "category": "external", "summary": "878191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878191" }, { "category": "external", "summary": "878341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878341" }, { "category": "external", "summary": "878355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878355" }, { "category": "external", "summary": "878370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878370" }, { "category": "external", "summary": "878377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878377" }, { "category": "external", "summary": "878693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878693" }, { "category": "external", "summary": "878750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878750" }, { "category": "external", "summary": "879094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879094" }, { "category": "external", "summary": "879170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879170" }, { "category": "external", "summary": "879245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879245" }, { "category": "external", "summary": "879320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879320" }, { "category": "external", "summary": "880113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880113" }, { "category": "external", "summary": "880116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880116" }, { "category": "external", "summary": "880710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880710" }, { "category": "external", "summary": "880848", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880848" }, { "category": "external", "summary": "880905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880905" }, { "category": "external", "summary": "881616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881616" }, { "category": "external", "summary": "882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "882957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882957" }, { "category": "external", "summary": "885096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=885096" }, { "category": "external", "summary": "886137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=886137" }, { "category": "external", "summary": "886462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=886462" }, { "category": "external", "summary": "890000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890000" }, { "category": "external", "summary": "892639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892639" }, { "category": "external", "summary": "892806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892806" }, { "category": "external", "summary": "895277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "category": "external", "summary": "895282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282" }, { "category": "external", "summary": "895384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895384" }, { "category": "external", "summary": "896550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896550" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0544.json" } ], "title": "Red Hat Security Advisory: Subscription Asset Manager 1.2 update", "tracking": { "current_release_date": "2024-11-22T06:14:27+00:00", "generator": { "date": "2024-11-22T06:14:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:0544", "initial_release_date": "2013-02-21T19:04:00+00:00", "revision_history": [ { "date": "2013-02-21T19:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-25T23:08:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:14:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Subscription Asset Manager for RHEL 6 Server", "product": { "name": "Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12", "product_identification_helper": { "cpe": "cpe:/a:rhel_sam:1.2::el6" } } } ], "category": "product_family", "name": "Red Hat Subscription Asset Manager" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6_3.src", "product": { "name": "quartz-0:2.1.5-4.el6_3.src", "product_id": "quartz-0:2.1.5-4.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "product": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "product_id": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.2.1-1h.el6_3?arch=src" } } }, { "category": "product_version", "name": "elasticsearch-0:0.19.9-5.el6_3.src", "product": { "name": "elasticsearch-0:0.19.9-5.el6_3.src", "product_id": "elasticsearch-0:0.19.9-5.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/elasticsearch@0.19.9-5.el6_3?arch=src" } } }, { "category": "product_version", "name": "lucene3-0:3.6.1-10h.el6_3.src", "product": { "name": "lucene3-0:3.6.1-10h.el6_3.src", "product_id": "lucene3-0:3.6.1-10h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/lucene3@3.6.1-10h.el6_3?arch=src" } } }, { "category": "product_version", "name": "candlepin-0:0.7.23-1.el6_3.src", "product": { "name": "candlepin-0:0.7.23-1.el6_3.src", "product_id": "candlepin-0:0.7.23-1.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.23-1.el6_3?arch=src" } } }, { "category": "product_version", "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "product": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "product_id": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-mime4j@0.6-4_redhat_1.ep6.el6.1?arch=src" } } }, { "category": "product_version", "name": "thumbslug-0:0.0.28-1.el6_3.src", "product": { "name": "thumbslug-0:0.0.28-1.el6_3.src", "product_id": "thumbslug-0:0.0.28-1.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thumbslug@0.0.28-1.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-selinux-0:1.2.1-2h.el6_3.src", "product": { "name": "katello-selinux-0:1.2.1-2h.el6_3.src", "product_id": "katello-selinux-0:1.2.1-2h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.2.1-2h.el6_3?arch=src" } } }, { "category": "product_version", "name": "puppet-0:2.6.17-2.el6cf.src", "product": { "name": "puppet-0:2.6.17-2.el6cf.src", "product_id": "puppet-0:2.6.17-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet@2.6.17-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-mail-0:2.3.0-3.el6cf.src", "product": { "name": "rubygem-mail-0:2.3.0-3.el6cf.src", "product_id": "rubygem-mail-0:2.3.0-3.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mail@2.3.0-3.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-cli-0:1.2.1-12h.el6_3.src", "product": { "name": "katello-cli-0:1.2.1-12h.el6_3.src", "product_id": "katello-cli-0:1.2.1-12h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.2.1-12h.el6_3?arch=src" } } }, { "category": "product_version", "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "product": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "product_id": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ruby_parser@2.0.4-6.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "product": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "product_id": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.12-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "product": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "product_id": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ldap_fluff@0.1.3-1.el6_3?arch=src" } } }, { "category": "product_version", "name": "snappy-java-0:1.0.4-2.el6_3.src", "product": { "name": "snappy-java-0:1.0.4-2.el6_3.src", "product_id": "snappy-java-0:1.0.4-2.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/snappy-java@1.0.4-2.el6_3?arch=src" } } }, { "category": "product_version", "name": "apache-commons-codec-0:1.7-2.el6_3.src", "product": { "name": "apache-commons-codec-0:1.7-2.el6_3.src", "product_id": "apache-commons-codec-0:1.7-2.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-codec@1.7-2.el6_3?arch=src" } } }, { "category": "product_version", "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "product": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "product_id": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar@1.6.5-0.12.git58097d9h.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-configure-0:1.2.3-3h.el6_3.src", "product": { "name": "katello-configure-0:1.2.3-3h.el6_3.src", "product_id": "katello-configure-0:1.2.3-3h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.2.3-3h.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-0:1.2.1-15h.el6_3.src", "product": { "name": "katello-0:1.2.1-15h.el6_3.src", "product_id": "katello-0:1.2.1-15h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello@1.2.1-15h.el6_3?arch=src" } } }, { "category": "product_version", "name": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "product": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "product_id": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activesupport@3.0.10-10.el6cf?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rubygem-rack-1:1.3.0-3.el6cf.src", "product": { "name": "rubygem-rack-1:1.3.0-3.el6cf.src", "product_id": "rubygem-rack-1:1.3.0-3.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack@1.3.0-3.el6cf?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6_3.noarch", "product": { "name": "quartz-0:2.1.5-4.el6_3.noarch", "product_id": "quartz-0:2.1.5-4.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "product": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "product_id": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.2.1-1h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "elasticsearch-0:0.19.9-5.el6_3.noarch", "product": { "name": "elasticsearch-0:0.19.9-5.el6_3.noarch", "product_id": "elasticsearch-0:0.19.9-5.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/elasticsearch@0.19.9-5.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "lucene3-0:3.6.1-10h.el6_3.noarch", "product": { "name": "lucene3-0:3.6.1-10h.el6_3.noarch", "product_id": "lucene3-0:3.6.1-10h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/lucene3@3.6.1-10h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "product": { "name": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "product_id": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/lucene3-contrib@3.6.1-10h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-tomcat6@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-selinux@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-devel@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product": { "name": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_id": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-mime4j-javadoc@0.6-4_redhat_1.ep6.el6.1?arch=noarch" } } }, { "category": "product_version", "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_id": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-mime4j@0.6-4_redhat_1.ep6.el6.1?arch=noarch" } } }, { "category": "product_version", "name": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "product": { "name": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "product_id": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/thumbslug-selinux@0.0.28-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "thumbslug-0:0.0.28-1.el6_3.noarch", "product": { "name": "thumbslug-0:0.0.28-1.el6_3.noarch", "product_id": "thumbslug-0:0.0.28-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/thumbslug@0.0.28-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "product": { "name": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "product_id": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.2.1-2h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "puppet-server-0:2.6.17-2.el6cf.noarch", "product": { "name": "puppet-server-0:2.6.17-2.el6cf.noarch", "product_id": "puppet-server-0:2.6.17-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-server@2.6.17-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "puppet-0:2.6.17-2.el6cf.noarch", "product": { "name": "puppet-0:2.6.17-2.el6cf.noarch", "product_id": "puppet-0:2.6.17-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet@2.6.17-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "product": { "name": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "product_id": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mail-doc@2.3.0-3.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "product": { "name": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "product_id": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mail@2.3.0-3.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-0:1.2.1-12h.el6_3.noarch", "product": { "name": "katello-cli-0:1.2.1-12h.el6_3.noarch", "product_id": "katello-cli-0:1.2.1-12h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.2.1-12h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "product": { "name": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "product_id": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-common@1.2.1-12h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "product": { "name": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "product_id": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ruby_parser-doc@2.0.4-6.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "product": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "product_id": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ruby_parser@2.0.4-6.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "product": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "product_id": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.12-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "product": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "product_id": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ldap_fluff@0.1.3-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-configure-0:1.2.3-3h.el6_3.noarch", "product": { "name": "katello-configure-0:1.2.3-3h.el6_3.noarch", "product_id": "katello-configure-0:1.2.3-3h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.2.3-3h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-common-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-common-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-common-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-common@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-candlepin@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-headpin-all@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-headpin@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "product": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "product_id": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activesupport@3.0.10-10.el6cf?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "product": { "name": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "product_id": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack@1.3.0-3.el6cf?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "product": { "name": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "product_id": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/snappy-java-debuginfo@1.0.4-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "snappy-java-0:1.0.4-2.el6_3.x86_64", "product": { "name": "snappy-java-0:1.0.4-2.el6_3.x86_64", "product_id": "snappy-java-0:1.0.4-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/snappy-java@1.0.4-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "product": { "name": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "product_id": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-codec@1.7-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "product": { "name": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "product_id": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-codec-debuginfo@1.7-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product": { "name": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_id": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar-java@1.6.5-0.12.git58097d9h.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product": { "name": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_id": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar-debuginfo@1.6.5-0.12.git58097d9h.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_id": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar@1.6.5-0.12.git58097d9h.el6_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-codec-0:1.7-2.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src" }, "product_reference": "apache-commons-codec-0:1.7-2.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-codec-0:1.7-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64" }, "product_reference": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64" }, "product_reference": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch" }, "product_reference": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src" }, "product_reference": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch" }, "product_reference": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.23-1.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src" }, "product_reference": "candlepin-0:0.7.23-1.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-devel-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-selinux-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "elasticsearch-0:0.19.9-5.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch" }, "product_reference": "elasticsearch-0:0.19.9-5.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "elasticsearch-0:0.19.9-5.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src" }, "product_reference": "elasticsearch-0:0.19.9-5.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-0:1.2.1-15h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src" }, "product_reference": "katello-0:1.2.1-15h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch" }, "product_reference": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src" }, "product_reference": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.2.1-12h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch" }, "product_reference": "katello-cli-0:1.2.1-12h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.2.1-12h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src" }, "product_reference": "katello-cli-0:1.2.1-12h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-common-0:1.2.1-12h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch" }, "product_reference": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-common-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-common-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.2.3-3h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch" }, "product_reference": "katello-configure-0:1.2.3-3h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.2.3-3h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src" }, "product_reference": "katello-configure-0:1.2.3-3h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-headpin-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.2.1-2h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch" }, "product_reference": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.2.1-2h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src" }, "product_reference": "katello-selinux-0:1.2.1-2h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "lucene3-0:3.6.1-10h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch" }, "product_reference": "lucene3-0:3.6.1-10h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "lucene3-0:3.6.1-10h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src" }, "product_reference": "lucene3-0:3.6.1-10h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch" }, "product_reference": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-0:2.6.17-2.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch" }, "product_reference": "puppet-0:2.6.17-2.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-0:2.6.17-2.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src" }, "product_reference": "puppet-0:2.6.17-2.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-server-0:2.6.17-2.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch" }, "product_reference": "puppet-server-0:2.6.17-2.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch" }, "product_reference": "quartz-0:2.1.5-4.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src" }, "product_reference": "quartz-0:2.1.5-4.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch" }, "product_reference": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src" }, "product_reference": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch" }, "product_reference": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src" }, "product_reference": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch" }, "product_reference": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src" }, "product_reference": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mail-0:2.3.0-3.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch" }, "product_reference": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mail-0:2.3.0-3.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src" }, "product_reference": "rubygem-mail-0:2.3.0-3.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch" }, "product_reference": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-1:1.3.0-3.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch" }, "product_reference": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-1:1.3.0-3.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src" }, "product_reference": "rubygem-rack-1:1.3.0-3.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch" }, "product_reference": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src" }, "product_reference": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch" }, "product_reference": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src" }, "product_reference": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64" }, "product_reference": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64" }, "product_reference": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64" }, "product_reference": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "snappy-java-0:1.0.4-2.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src" }, "product_reference": "snappy-java-0:1.0.4-2.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "snappy-java-0:1.0.4-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64" }, "product_reference": "snappy-java-0:1.0.4-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64" }, "product_reference": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "thumbslug-0:0.0.28-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch" }, "product_reference": "thumbslug-0:0.0.28-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "thumbslug-0:0.0.28-1.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src" }, "product_reference": "thumbslug-0:0.0.28-1.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" }, "product_reference": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aaron Weitekamp" ], "organization": "Red Hat Cloud Quality Engineering team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5561", "discovery_date": "2012-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "879094" } ], "notes": [ { "category": "description", "text": "script/katello-generate-passphrase in Katello 1.1 uses world-readable permissions for /etc/katello/secure/passphrase, which allows local users to obtain the passphrase by reading the file.", "title": "Vulnerability description" }, { "category": "summary", "text": "Katello: /etc/katello/secure/passphrase is world readable", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5561" }, { "category": "external", "summary": "RHBZ#879094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879094" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5561", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5561" } ], "release_date": "2013-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Katello: /etc/katello/secure/passphrase is world readable" }, { "acknowledgments": [ { "names": [ "Lukas Zapletal" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5603", "discovery_date": "2012-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "882129" } ], "notes": [ { "category": "description", "text": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Katello: lack of authorization in proxies_controller.rb", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5603" }, { "category": "external", "summary": "RHBZ#882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5603", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Katello: lack of authorization in proxies_controller.rb" }, { "cve": "CVE-2012-6109", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2013-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "895277" } ], "notes": [ { "category": "description", "text": "lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: parsing Content-Disposition header DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6109" }, { "category": "external", "summary": "RHBZ#895277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6109", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6109" } ], "release_date": "2012-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rack: parsing Content-Disposition header DoS" }, { "acknowledgments": [ { "names": [ "Michael Scherer" ], "organization": "Red Hat Regional IT team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-0162", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2013-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "892806" } ], "notes": [ { "category": "description", "text": "The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser gem 3.1.1 and earlier for Ruby allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-ruby_parser: incorrect temporary file usage", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0162" }, { "category": "external", "summary": "RHBZ#892806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0162", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0162" } ], "release_date": "2013-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "rubygem-ruby_parser: incorrect temporary file usage" }, { "cve": "CVE-2013-0183", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2013-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "895282" } ], "notes": [ { "category": "description", "text": "multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: receiving excessively long lines triggers out-of-memory error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0183" }, { "category": "external", "summary": "RHBZ#895282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0183", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0183" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0183", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0183" } ], "release_date": "2013-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rack: receiving excessively long lines triggers out-of-memory error" }, { "cve": "CVE-2013-0184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2013-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "895384" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to \"symbolized arbitrary strings.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: Rack::Auth:: AbstractRequest DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0184" }, { "category": "external", "summary": "RHBZ#895384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895384" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0184", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0184" } ], "release_date": "2012-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rack: Rack::Auth:: AbstractRequest DoS" } ] }
rhsa-2013:0544
Vulnerability from csaf_redhat
Published
2013-02-21 19:04
Modified
2024-11-22 06:14
Summary
Red Hat Security Advisory: Subscription Asset Manager 1.2 update
Notes
Topic
Red Hat Subscription Asset Manager 1.2, which fixes several security
issues, multiple bugs, and adds various enhancements, is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
[Updated 25th February 2013]
This erratum previously failed to include the updated rubygem-rack package.
It also previously incorrectly documented CVE-2012-5604 as being fixed,
however that issue never affected Subscription Asset Manager and is no
longer listed. As well, CVE-2012-6496 was described as being fixed, however
that issue had previously been fixed in RHSA-2013:0154.
Details
Red Hat Subscription Asset Manager acts as a proxy for handling
subscription information and software updates on client machines.
It was discovered that Katello did not properly check user permissions when
handling certain requests. An authenticated remote attacker could use this
flaw to download consumer certificates or change settings of other users'
systems if they knew the target system's UUID. (CVE-2012-5603)
It was found that the
"/usr/share/katello/script/katello-generate-passphrase" utility, which is
run during the installation and configuration process, set world-readable
permissions on the "/etc/katello/secure/passphrase" file. A local attacker
could use this flaw to obtain the passphrase for Katello, giving them
access to information they would otherwise not have access to.
(CVE-2012-5561)
Note: After installing this update, ensure the
"/etc/katello/secure/passphrase" file is owned by the root user and group
and mode 0750 permissions. Sites should also consider re-creating the
Katello passphrase as this issue exposed it to local users.
Three flaws were found in rubygem-rack. A remote attacker could use these
flaws to perform a denial of service attack against applications using
rubygem-rack. (CVE-2012-6109, CVE-2013-0183, CVE-2013-0184)
It was found that ruby_parser from rubygem-ruby_parser created a temporary
file in an insecure way. A local attacker could use this flaw to perform a
symbolic link attack, overwriting arbitrary files accessible to the
application using ruby_parser. (CVE-2013-0162)
The CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;
CVE-2012-5561 was discovered by Aaron Weitekamp of the Red Hat Cloud
Quality Engineering team; and CVE-2013-0162 was discovered by Michael
Scherer of the Red Hat Regional IT team.
These updated Subscription Asset Manager packages include a number of bug
fixes and enhancements. Space precludes documenting all of these changes
in this advisory. Refer to the Red Hat Subscription Asset Manager 1.2
Release Notes for information about these changes:
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html
All users of Red Hat Subscription Asset Manager are advised to upgrade to
these updated packages, which fix these issues and add various
enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Subscription Asset Manager 1.2, which fixes several security\nissues, multiple bugs, and adds various enhancements, is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\n[Updated 25th February 2013]\nThis erratum previously failed to include the updated rubygem-rack package.\nIt also previously incorrectly documented CVE-2012-5604 as being fixed,\nhowever that issue never affected Subscription Asset Manager and is no\nlonger listed. As well, CVE-2012-6496 was described as being fixed, however\nthat issue had previously been fixed in RHSA-2013:0154.", "title": "Topic" }, { "category": "general", "text": "Red Hat Subscription Asset Manager acts as a proxy for handling\nsubscription information and software updates on client machines.\n\nIt was discovered that Katello did not properly check user permissions when\nhandling certain requests. An authenticated remote attacker could use this\nflaw to download consumer certificates or change settings of other users\u0027\nsystems if they knew the target system\u0027s UUID. (CVE-2012-5603)\n\nIt was found that the\n\"/usr/share/katello/script/katello-generate-passphrase\" utility, which is\nrun during the installation and configuration process, set world-readable\npermissions on the \"/etc/katello/secure/passphrase\" file. A local attacker\ncould use this flaw to obtain the passphrase for Katello, giving them\naccess to information they would otherwise not have access to.\n(CVE-2012-5561)\n\nNote: After installing this update, ensure the\n\"/etc/katello/secure/passphrase\" file is owned by the root user and group\nand mode 0750 permissions. Sites should also consider re-creating the\nKatello passphrase as this issue exposed it to local users.\n\nThree flaws were found in rubygem-rack. A remote attacker could use these\nflaws to perform a denial of service attack against applications using\nrubygem-rack. (CVE-2012-6109, CVE-2013-0183, CVE-2013-0184)\n\nIt was found that ruby_parser from rubygem-ruby_parser created a temporary\nfile in an insecure way. A local attacker could use this flaw to perform a\nsymbolic link attack, overwriting arbitrary files accessible to the\napplication using ruby_parser. (CVE-2013-0162)\n\nThe CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;\nCVE-2012-5561 was discovered by Aaron Weitekamp of the Red Hat Cloud\nQuality Engineering team; and CVE-2013-0162 was discovered by Michael\nScherer of the Red Hat Regional IT team.\n\nThese updated Subscription Asset Manager packages include a number of bug\nfixes and enhancements. Space precludes documenting all of these changes\nin this advisory. Refer to the Red Hat Subscription Asset Manager 1.2\nRelease Notes for information about these changes:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html\n\nAll users of Red Hat Subscription Asset Manager are advised to upgrade to\nthese updated packages, which fix these issues and add various\nenhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0544", "url": "https://access.redhat.com/errata/RHSA-2013:0544" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html" }, { "category": "external", "summary": "760564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760564" }, { "category": "external", "summary": "800145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800145" }, { "category": "external", "summary": "809823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=809823" }, { "category": "external", "summary": "813291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=813291" }, { "category": "external", "summary": "817845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817845" }, { "category": "external", "summary": "817946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817946" }, { "category": "external", "summary": "818679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818679" }, { "category": "external", "summary": "818903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818903" }, { "category": "external", "summary": "819002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819002" }, { "category": "external", "summary": "819611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819611" }, { "category": "external", "summary": "822942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822942" }, { "category": "external", "summary": "822943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822943" }, { "category": "external", "summary": "822945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822945" }, { "category": "external", "summary": "826099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826099" }, { "category": "external", "summary": "829474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829474" }, { "category": "external", "summary": "832425", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832425" }, { "category": "external", "summary": "832462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832462" }, { "category": "external", "summary": "840595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840595" }, { "category": "external", "summary": "840600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840600" }, { "category": "external", "summary": "840603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840603" }, { "category": "external", "summary": "840609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840609" }, { "category": "external", "summary": "840792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840792" }, { "category": "external", "summary": "840969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840969" }, { "category": "external", "summary": "841868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841868" }, { "category": "external", "summary": "843625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843625" }, { "category": "external", "summary": "843857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843857" }, { "category": "external", "summary": "843861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843861" }, { "category": "external", "summary": "843904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843904" }, { "category": "external", "summary": "845501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845501" }, { "category": "external", "summary": "845620", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845620" }, { "category": "external", "summary": "847024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847024" }, { "category": "external", "summary": "847117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847117" }, { "category": "external", "summary": "847598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847598" }, { "category": "external", "summary": "850336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850336" }, { "category": "external", "summary": "852508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852508" }, { "category": "external", "summary": "854278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854278" }, { "category": "external", "summary": "854283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854283" }, { "category": "external", "summary": "854985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854985" }, { "category": "external", "summary": "856303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856303" }, { "category": "external", "summary": "856777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856777" }, { "category": "external", "summary": "856795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856795" }, { "category": "external", "summary": "857452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857452" }, { "category": "external", "summary": "859128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859128" }, { "category": "external", "summary": "863461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863461" }, { "category": "external", "summary": "865571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865571" }, { "category": "external", "summary": "866323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866323" }, { "category": "external", "summary": "866972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866972" }, { "category": "external", "summary": "866995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866995" }, { "category": "external", "summary": "868290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868290" }, { "category": "external", "summary": "869380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869380" }, { "category": "external", "summary": "871622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871622" }, { "category": "external", "summary": "872332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872332" }, { "category": "external", "summary": "872334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872334" }, { "category": "external", "summary": "872335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872335" }, { "category": "external", "summary": "872602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872602" }, { "category": "external", "summary": "872687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872687" }, { "category": "external", "summary": "873038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873038" }, { "category": "external", "summary": "873443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873443" }, { "category": "external", "summary": "873803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873803" }, { "category": "external", "summary": "873809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873809" }, { "category": "external", "summary": "874182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874182" }, { "category": "external", "summary": "874280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874280" }, { "category": "external", "summary": "874502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874502" }, { "category": "external", "summary": "874510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874510" }, { "category": "external", "summary": "874583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874583" }, { "category": "external", "summary": "874737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874737" }, { "category": "external", "summary": "874744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874744" }, { "category": "external", "summary": "875101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875101" }, { "category": "external", "summary": "875609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875609" }, { "category": "external", "summary": "875876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875876" }, { "category": "external", "summary": "876869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876869" }, { "category": "external", "summary": "876896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876896" }, { "category": "external", "summary": "876911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876911" }, { "category": "external", "summary": "877317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877317" }, { "category": "external", "summary": "877473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877473" }, { "category": "external", "summary": "877894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877894" }, { "category": "external", "summary": "878191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878191" }, { "category": "external", "summary": "878341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878341" }, { "category": "external", "summary": "878355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878355" }, { "category": "external", "summary": "878370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878370" }, { "category": "external", "summary": "878377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878377" }, { "category": "external", "summary": "878693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878693" }, { "category": "external", "summary": "878750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878750" }, { "category": "external", "summary": "879094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879094" }, { "category": "external", "summary": "879170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879170" }, { "category": "external", "summary": "879245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879245" }, { "category": "external", "summary": "879320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879320" }, { "category": "external", "summary": "880113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880113" }, { "category": "external", "summary": "880116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880116" }, { "category": "external", "summary": "880710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880710" }, { "category": "external", "summary": "880848", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880848" }, { "category": "external", "summary": "880905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880905" }, { "category": "external", "summary": "881616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881616" }, { "category": "external", "summary": "882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "882957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882957" }, { "category": "external", "summary": "885096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=885096" }, { "category": "external", "summary": "886137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=886137" }, { "category": "external", "summary": "886462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=886462" }, { "category": "external", "summary": "890000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890000" }, { "category": "external", "summary": "892639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892639" }, { "category": "external", "summary": "892806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892806" }, { "category": "external", "summary": "895277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "category": "external", "summary": "895282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282" }, { "category": "external", "summary": "895384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895384" }, { "category": "external", "summary": "896550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896550" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0544.json" } ], "title": "Red Hat Security Advisory: Subscription Asset Manager 1.2 update", "tracking": { "current_release_date": "2024-11-22T06:14:27+00:00", "generator": { "date": "2024-11-22T06:14:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:0544", "initial_release_date": "2013-02-21T19:04:00+00:00", "revision_history": [ { "date": "2013-02-21T19:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-25T23:08:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:14:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Subscription Asset Manager for RHEL 6 Server", "product": { "name": "Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12", "product_identification_helper": { "cpe": "cpe:/a:rhel_sam:1.2::el6" } } } ], "category": "product_family", "name": "Red Hat Subscription Asset Manager" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6_3.src", "product": { "name": "quartz-0:2.1.5-4.el6_3.src", "product_id": "quartz-0:2.1.5-4.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "product": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "product_id": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.2.1-1h.el6_3?arch=src" } } }, { "category": "product_version", "name": "elasticsearch-0:0.19.9-5.el6_3.src", "product": { "name": "elasticsearch-0:0.19.9-5.el6_3.src", "product_id": "elasticsearch-0:0.19.9-5.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/elasticsearch@0.19.9-5.el6_3?arch=src" } } }, { "category": "product_version", "name": "lucene3-0:3.6.1-10h.el6_3.src", "product": { "name": "lucene3-0:3.6.1-10h.el6_3.src", "product_id": "lucene3-0:3.6.1-10h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/lucene3@3.6.1-10h.el6_3?arch=src" } } }, { "category": "product_version", "name": "candlepin-0:0.7.23-1.el6_3.src", "product": { "name": "candlepin-0:0.7.23-1.el6_3.src", "product_id": "candlepin-0:0.7.23-1.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.23-1.el6_3?arch=src" } } }, { "category": "product_version", "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "product": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "product_id": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-mime4j@0.6-4_redhat_1.ep6.el6.1?arch=src" } } }, { "category": "product_version", "name": "thumbslug-0:0.0.28-1.el6_3.src", "product": { "name": "thumbslug-0:0.0.28-1.el6_3.src", "product_id": "thumbslug-0:0.0.28-1.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thumbslug@0.0.28-1.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-selinux-0:1.2.1-2h.el6_3.src", "product": { "name": "katello-selinux-0:1.2.1-2h.el6_3.src", "product_id": "katello-selinux-0:1.2.1-2h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.2.1-2h.el6_3?arch=src" } } }, { "category": "product_version", "name": "puppet-0:2.6.17-2.el6cf.src", "product": { "name": "puppet-0:2.6.17-2.el6cf.src", "product_id": "puppet-0:2.6.17-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet@2.6.17-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-mail-0:2.3.0-3.el6cf.src", "product": { "name": "rubygem-mail-0:2.3.0-3.el6cf.src", "product_id": "rubygem-mail-0:2.3.0-3.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mail@2.3.0-3.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-cli-0:1.2.1-12h.el6_3.src", "product": { "name": "katello-cli-0:1.2.1-12h.el6_3.src", "product_id": "katello-cli-0:1.2.1-12h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.2.1-12h.el6_3?arch=src" } } }, { "category": "product_version", "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "product": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "product_id": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ruby_parser@2.0.4-6.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "product": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "product_id": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.12-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "product": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "product_id": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ldap_fluff@0.1.3-1.el6_3?arch=src" } } }, { "category": "product_version", "name": "snappy-java-0:1.0.4-2.el6_3.src", "product": { "name": "snappy-java-0:1.0.4-2.el6_3.src", "product_id": "snappy-java-0:1.0.4-2.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/snappy-java@1.0.4-2.el6_3?arch=src" } } }, { "category": "product_version", "name": "apache-commons-codec-0:1.7-2.el6_3.src", "product": { "name": "apache-commons-codec-0:1.7-2.el6_3.src", "product_id": "apache-commons-codec-0:1.7-2.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-codec@1.7-2.el6_3?arch=src" } } }, { "category": "product_version", "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "product": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "product_id": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar@1.6.5-0.12.git58097d9h.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-configure-0:1.2.3-3h.el6_3.src", "product": { "name": "katello-configure-0:1.2.3-3h.el6_3.src", "product_id": "katello-configure-0:1.2.3-3h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.2.3-3h.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-0:1.2.1-15h.el6_3.src", "product": { "name": "katello-0:1.2.1-15h.el6_3.src", "product_id": "katello-0:1.2.1-15h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello@1.2.1-15h.el6_3?arch=src" } } }, { "category": "product_version", "name": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "product": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "product_id": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activesupport@3.0.10-10.el6cf?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rubygem-rack-1:1.3.0-3.el6cf.src", "product": { "name": "rubygem-rack-1:1.3.0-3.el6cf.src", "product_id": "rubygem-rack-1:1.3.0-3.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack@1.3.0-3.el6cf?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6_3.noarch", "product": { "name": "quartz-0:2.1.5-4.el6_3.noarch", "product_id": "quartz-0:2.1.5-4.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "product": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "product_id": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.2.1-1h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "elasticsearch-0:0.19.9-5.el6_3.noarch", "product": { "name": "elasticsearch-0:0.19.9-5.el6_3.noarch", "product_id": "elasticsearch-0:0.19.9-5.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/elasticsearch@0.19.9-5.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "lucene3-0:3.6.1-10h.el6_3.noarch", "product": { "name": "lucene3-0:3.6.1-10h.el6_3.noarch", "product_id": "lucene3-0:3.6.1-10h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/lucene3@3.6.1-10h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "product": { "name": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "product_id": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/lucene3-contrib@3.6.1-10h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-tomcat6@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-selinux@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-devel@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product": { "name": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_id": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-mime4j-javadoc@0.6-4_redhat_1.ep6.el6.1?arch=noarch" } } }, { "category": "product_version", "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_id": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-mime4j@0.6-4_redhat_1.ep6.el6.1?arch=noarch" } } }, { "category": "product_version", "name": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "product": { "name": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "product_id": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/thumbslug-selinux@0.0.28-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "thumbslug-0:0.0.28-1.el6_3.noarch", "product": { "name": "thumbslug-0:0.0.28-1.el6_3.noarch", "product_id": "thumbslug-0:0.0.28-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/thumbslug@0.0.28-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "product": { "name": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "product_id": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.2.1-2h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "puppet-server-0:2.6.17-2.el6cf.noarch", "product": { "name": "puppet-server-0:2.6.17-2.el6cf.noarch", "product_id": "puppet-server-0:2.6.17-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-server@2.6.17-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "puppet-0:2.6.17-2.el6cf.noarch", "product": { "name": "puppet-0:2.6.17-2.el6cf.noarch", "product_id": "puppet-0:2.6.17-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet@2.6.17-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "product": { "name": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "product_id": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mail-doc@2.3.0-3.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "product": { "name": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "product_id": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mail@2.3.0-3.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-0:1.2.1-12h.el6_3.noarch", "product": { "name": "katello-cli-0:1.2.1-12h.el6_3.noarch", "product_id": "katello-cli-0:1.2.1-12h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.2.1-12h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "product": { "name": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "product_id": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-common@1.2.1-12h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "product": { "name": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "product_id": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ruby_parser-doc@2.0.4-6.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "product": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "product_id": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ruby_parser@2.0.4-6.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "product": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "product_id": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.12-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "product": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "product_id": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ldap_fluff@0.1.3-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-configure-0:1.2.3-3h.el6_3.noarch", "product": { "name": "katello-configure-0:1.2.3-3h.el6_3.noarch", "product_id": "katello-configure-0:1.2.3-3h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.2.3-3h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-common-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-common-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-common-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-common@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-candlepin@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-headpin-all@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-headpin@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "product": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "product_id": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activesupport@3.0.10-10.el6cf?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "product": { "name": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "product_id": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack@1.3.0-3.el6cf?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "product": { "name": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "product_id": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/snappy-java-debuginfo@1.0.4-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "snappy-java-0:1.0.4-2.el6_3.x86_64", "product": { "name": "snappy-java-0:1.0.4-2.el6_3.x86_64", "product_id": "snappy-java-0:1.0.4-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/snappy-java@1.0.4-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "product": { "name": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "product_id": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-codec@1.7-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "product": { "name": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "product_id": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-codec-debuginfo@1.7-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product": { "name": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_id": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar-java@1.6.5-0.12.git58097d9h.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product": { "name": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_id": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar-debuginfo@1.6.5-0.12.git58097d9h.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_id": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar@1.6.5-0.12.git58097d9h.el6_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-codec-0:1.7-2.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src" }, "product_reference": "apache-commons-codec-0:1.7-2.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-codec-0:1.7-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64" }, "product_reference": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64" }, "product_reference": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch" }, "product_reference": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src" }, "product_reference": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch" }, "product_reference": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.23-1.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src" }, "product_reference": "candlepin-0:0.7.23-1.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-devel-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-selinux-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "elasticsearch-0:0.19.9-5.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch" }, "product_reference": "elasticsearch-0:0.19.9-5.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "elasticsearch-0:0.19.9-5.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src" }, "product_reference": "elasticsearch-0:0.19.9-5.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-0:1.2.1-15h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src" }, "product_reference": "katello-0:1.2.1-15h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch" }, "product_reference": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src" }, "product_reference": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.2.1-12h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch" }, "product_reference": "katello-cli-0:1.2.1-12h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.2.1-12h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src" }, "product_reference": "katello-cli-0:1.2.1-12h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-common-0:1.2.1-12h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch" }, "product_reference": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-common-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-common-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.2.3-3h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch" }, "product_reference": "katello-configure-0:1.2.3-3h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.2.3-3h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src" }, "product_reference": "katello-configure-0:1.2.3-3h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-headpin-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.2.1-2h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch" }, "product_reference": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.2.1-2h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src" }, "product_reference": "katello-selinux-0:1.2.1-2h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "lucene3-0:3.6.1-10h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch" }, "product_reference": "lucene3-0:3.6.1-10h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "lucene3-0:3.6.1-10h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src" }, "product_reference": "lucene3-0:3.6.1-10h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch" }, "product_reference": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-0:2.6.17-2.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch" }, "product_reference": "puppet-0:2.6.17-2.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-0:2.6.17-2.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src" }, "product_reference": "puppet-0:2.6.17-2.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-server-0:2.6.17-2.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch" }, "product_reference": "puppet-server-0:2.6.17-2.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch" }, "product_reference": "quartz-0:2.1.5-4.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src" }, "product_reference": "quartz-0:2.1.5-4.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch" }, "product_reference": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src" }, "product_reference": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch" }, "product_reference": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src" }, "product_reference": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch" }, "product_reference": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src" }, "product_reference": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mail-0:2.3.0-3.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch" }, "product_reference": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mail-0:2.3.0-3.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src" }, "product_reference": "rubygem-mail-0:2.3.0-3.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch" }, "product_reference": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-1:1.3.0-3.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch" }, "product_reference": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-1:1.3.0-3.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src" }, "product_reference": "rubygem-rack-1:1.3.0-3.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch" }, "product_reference": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src" }, "product_reference": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch" }, "product_reference": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src" }, "product_reference": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64" }, "product_reference": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64" }, "product_reference": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64" }, "product_reference": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "snappy-java-0:1.0.4-2.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src" }, "product_reference": "snappy-java-0:1.0.4-2.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "snappy-java-0:1.0.4-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64" }, "product_reference": "snappy-java-0:1.0.4-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64" }, "product_reference": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "thumbslug-0:0.0.28-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch" }, "product_reference": "thumbslug-0:0.0.28-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "thumbslug-0:0.0.28-1.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src" }, "product_reference": "thumbslug-0:0.0.28-1.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" }, "product_reference": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aaron Weitekamp" ], "organization": "Red Hat Cloud Quality Engineering team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5561", "discovery_date": "2012-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "879094" } ], "notes": [ { "category": "description", "text": "script/katello-generate-passphrase in Katello 1.1 uses world-readable permissions for /etc/katello/secure/passphrase, which allows local users to obtain the passphrase by reading the file.", "title": "Vulnerability description" }, { "category": "summary", "text": "Katello: /etc/katello/secure/passphrase is world readable", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5561" }, { "category": "external", "summary": "RHBZ#879094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879094" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5561", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5561" } ], "release_date": "2013-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Katello: /etc/katello/secure/passphrase is world readable" }, { "acknowledgments": [ { "names": [ "Lukas Zapletal" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5603", "discovery_date": "2012-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "882129" } ], "notes": [ { "category": "description", "text": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Katello: lack of authorization in proxies_controller.rb", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5603" }, { "category": "external", "summary": "RHBZ#882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5603", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Katello: lack of authorization in proxies_controller.rb" }, { "cve": "CVE-2012-6109", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2013-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "895277" } ], "notes": [ { "category": "description", "text": "lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: parsing Content-Disposition header DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6109" }, { "category": "external", "summary": "RHBZ#895277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6109", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6109" } ], "release_date": "2012-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rack: parsing Content-Disposition header DoS" }, { "acknowledgments": [ { "names": [ "Michael Scherer" ], "organization": "Red Hat Regional IT team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-0162", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2013-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "892806" } ], "notes": [ { "category": "description", "text": "The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser gem 3.1.1 and earlier for Ruby allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-ruby_parser: incorrect temporary file usage", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0162" }, { "category": "external", "summary": "RHBZ#892806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0162", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0162" } ], "release_date": "2013-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "rubygem-ruby_parser: incorrect temporary file usage" }, { "cve": "CVE-2013-0183", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2013-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "895282" } ], "notes": [ { "category": "description", "text": "multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: receiving excessively long lines triggers out-of-memory error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0183" }, { "category": "external", "summary": "RHBZ#895282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0183", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0183" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0183", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0183" } ], "release_date": "2013-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rack: receiving excessively long lines triggers out-of-memory error" }, { "cve": "CVE-2013-0184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2013-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "895384" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to \"symbolized arbitrary strings.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: Rack::Auth:: AbstractRequest DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0184" }, { "category": "external", "summary": "RHBZ#895384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895384" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0184", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0184" } ], "release_date": "2012-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rack: Rack::Auth:: AbstractRequest DoS" } ] }
rhsa-2012:1543
Vulnerability from csaf_redhat
Published
2012-12-04 19:32
Modified
2024-11-22 05:57
Summary
Red Hat Security Advisory: CloudForms System Engine 1.1 update
Notes
Topic
Updated CloudForms System Engine packages that fix multiple security
issues, several bugs, and add enhancements are now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Red Hat CloudForms is an on-premise hybrid cloud
Infrastructure-as-a-Service (IaaS) product that lets you create and manage
private and public clouds.
This update fixes bugs in and adds enhancements to the System Engine
packages, and upgrades the system to CloudForms 1.1.
This update also fixes the following security issues:
It was discovered that Katello did not properly check user permissions when
handling certain requests. An authenticated remote attacker could use this
flaw to download consumer certificates or change settings of other users'
systems if they knew the target system's UUID. (CVE-2012-5603)
It was discovered that Pulp logged administrative passwords to a world
readable log file. A local attacker could use this flaw to control systems
deployed and managed by CloudForms. (CVE-2012-3538)
It was discovered that the Pulp configuration file pulp.conf was installed
as world readable. A local attacker could use this flaw to view the
administrative password, allowing them to control systems deployed and
managed by CloudForms. (CVE-2012-4574)
It was discovered that grinder used insecure permissions for its cache
directory. A local attacker could use this flaw to access or modify files
in the cache. (CVE-2012-5605)
The CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;
CVE-2012-3538 was discovered by James Laska of Red Hat; CVE-2012-4574 was
discovered by Kurt Seifried of Red Hat; and CVE-2012-5605 was discovered by
James Labocki of Red Hat.
After upgrading to these new packages, follow the instructions in the "4.1.
Upgrading CloudForms System Engine" section of the CloudForms 1.1
Installation Guide:
https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html
To view the full list of changes in this update, view the CloudForms
Technical Notes:
https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html
Users are advised to upgrade to these updated CloudForms System Engine
packages, which resolve these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated CloudForms System Engine packages that fix multiple security\nissues, several bugs, and add enhancements are now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms is an on-premise hybrid cloud\nInfrastructure-as-a-Service (IaaS) product that lets you create and manage\nprivate and public clouds.\n\nThis update fixes bugs in and adds enhancements to the System Engine\npackages, and upgrades the system to CloudForms 1.1.\n\nThis update also fixes the following security issues:\n\nIt was discovered that Katello did not properly check user permissions when\nhandling certain requests. An authenticated remote attacker could use this\nflaw to download consumer certificates or change settings of other users\u0027\nsystems if they knew the target system\u0027s UUID. (CVE-2012-5603)\n\nIt was discovered that Pulp logged administrative passwords to a world\nreadable log file. A local attacker could use this flaw to control systems\ndeployed and managed by CloudForms. (CVE-2012-3538)\n\nIt was discovered that the Pulp configuration file pulp.conf was installed\nas world readable. A local attacker could use this flaw to view the\nadministrative password, allowing them to control systems deployed and\nmanaged by CloudForms. (CVE-2012-4574)\n\nIt was discovered that grinder used insecure permissions for its cache\ndirectory. A local attacker could use this flaw to access or modify files\nin the cache. (CVE-2012-5605)\n\nThe CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;\nCVE-2012-3538 was discovered by James Laska of Red Hat; CVE-2012-4574 was\ndiscovered by Kurt Seifried of Red Hat; and CVE-2012-5605 was discovered by\nJames Labocki of Red Hat.\n\nAfter upgrading to these new packages, follow the instructions in the \"4.1.\nUpgrading CloudForms System Engine\" section of the CloudForms 1.1\nInstallation Guide:\n\nhttps://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html\n\nTo view the full list of changes in this update, view the CloudForms\nTechnical Notes:\n\nhttps://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html\n\nUsers are advised to upgrade to these updated CloudForms System Engine\npackages, which resolve these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1543", "url": "https://access.redhat.com/errata/RHSA-2012:1543" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html", "url": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html", "url": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html" }, { "category": "external", "summary": "746765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746765" }, { "category": "external", "summary": "753128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753128" }, { "category": "external", "summary": "760180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760180" }, { "category": "external", "summary": "766694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=766694" }, { "category": "external", "summary": "769559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769559" }, { "category": "external", "summary": "782954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=782954" }, { "category": "external", "summary": "786176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786176" }, { "category": "external", "summary": "786226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786226" }, { "category": "external", "summary": "787184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=787184" }, { "category": "external", "summary": "787305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=787305" }, { "category": "external", "summary": "789139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789139" }, { "category": "external", "summary": "789535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789535" }, { "category": "external", "summary": "790138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790138" }, { "category": "external", "summary": "790342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790342" }, { "category": "external", "summary": "796047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=796047" }, { "category": "external", "summary": "796972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=796972" }, { "category": "external", "summary": "797299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797299" }, { "category": "external", "summary": "797321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797321" }, { "category": "external", "summary": "797412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797412" }, { "category": "external", "summary": "799538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799538" }, { "category": "external", "summary": "800529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800529" }, { "category": "external", "summary": "801454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801454" }, { "category": "external", "summary": "801580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801580" }, { "category": "external", "summary": "802925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802925" }, { "category": "external", "summary": "803548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803548" }, { "category": "external", "summary": "803702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803702" }, { "category": "external", "summary": "803728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803728" }, { "category": "external", "summary": "803761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803761" }, { "category": "external", "summary": "804127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804127" }, { "category": "external", "summary": "804555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804555" }, { "category": "external", "summary": "804610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804610" }, { "category": "external", "summary": "804685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804685" }, { "category": "external", "summary": "805027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805027" }, { "category": "external", "summary": "805412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805412" }, { "category": "external", "summary": "805627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805627" }, { "category": "external", "summary": "805709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805709" }, { "category": "external", "summary": "805956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805956" }, { "category": "external", "summary": "806076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806076" }, { "category": "external", "summary": "806078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806078" }, { "category": "external", "summary": "806083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806083" }, { "category": "external", "summary": "806353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806353" }, { "category": "external", "summary": "806879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806879" }, { "category": "external", "summary": "806940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806940" }, { "category": "external", "summary": "806969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806969" }, { "category": "external", "summary": "807288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807288" }, { "category": "external", "summary": "807291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807291" }, { "category": "external", "summary": "807468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807468" }, { "category": "external", "summary": "807804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807804" }, { "category": "external", "summary": "808172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=808172" }, { "category": "external", "summary": "808437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=808437" }, { "category": "external", "summary": "809259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=809259" }, { "category": "external", "summary": "810378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810378" }, { "category": "external", "summary": "810945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810945" }, { "category": "external", "summary": "811556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=811556" }, { "category": "external", "summary": "811564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=811564" }, { "category": "external", "summary": "812417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812417" }, { "category": "external", "summary": "813675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=813675" }, { "category": "external", "summary": "815308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815308" }, { "category": "external", "summary": "815802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815802" }, { "category": "external", "summary": "816935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816935" }, { "category": "external", "summary": "817123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817123" }, { "category": "external", "summary": "818204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818204" }, { "category": "external", "summary": "818261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818261" }, { "category": "external", "summary": "818370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818370" }, { "category": "external", "summary": "819593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819593" }, { "category": "external", "summary": "819941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819941" }, { "category": "external", "summary": "820373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820373" }, { "category": "external", "summary": "820385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820385" }, { "category": "external", "summary": "820624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820624" }, { "category": "external", "summary": "820626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820626" }, { "category": "external", "summary": "820630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820630" }, { "category": "external", "summary": "821345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821345" }, { "category": "external", "summary": "821644", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821644" }, { "category": "external", "summary": "821929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821929" }, { "category": "external", "summary": "822119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822119" }, { "category": "external", "summary": "822484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822484" }, { "category": "external", "summary": "823688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823688" }, { "category": "external", "summary": "824069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824069" }, { "category": "external", "summary": "824581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824581" }, { "category": "external", "summary": "826581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826581" }, { "category": "external", "summary": "827087", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=827087" }, { "category": "external", "summary": "827108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=827108" }, { "category": "external", "summary": "828447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828447" }, { "category": "external", "summary": "828533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828533" }, { "category": "external", "summary": "829208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829208" }, { "category": "external", "summary": "829437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829437" }, { "category": "external", "summary": "829794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829794" }, { "category": "external", "summary": "830176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=830176" }, { "category": "external", "summary": "831664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831664" }, { "category": "external", "summary": "834006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834006" }, { "category": "external", "summary": "834013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834013" }, { "category": "external", "summary": "834242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834242" }, { "category": "external", "summary": "834646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834646" }, { "category": "external", "summary": "834697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834697" }, { "category": "external", "summary": "835586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835586" }, { "category": "external", "summary": "835591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835591" }, { "category": "external", "summary": "835875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835875" }, { "category": "external", "summary": "836339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836339" }, { "category": "external", "summary": "836575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836575" }, { "category": "external", "summary": "837000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837000" }, { "category": "external", "summary": "839005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839005" }, { "category": "external", "summary": "840616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840616" }, { "category": "external", "summary": "840624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840624" }, { "category": "external", "summary": "840625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840625" }, { "category": "external", "summary": "841000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841000" }, { "category": "external", "summary": "841289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841289" }, { "category": "external", "summary": "841300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841300" }, { "category": "external", "summary": "841310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841310" }, { "category": "external", "summary": "841686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841686" }, { "category": "external", "summary": "841691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841691" }, { "category": "external", "summary": "841984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841984" }, { "category": "external", "summary": "841998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841998" }, { "category": "external", "summary": "842003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842003" }, { "category": "external", "summary": "842005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842005" }, { "category": "external", "summary": "842010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842010" }, { "category": "external", "summary": "842252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842252" }, { "category": "external", "summary": "842256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842256" }, { "category": "external", "summary": "842271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842271" }, { "category": "external", "summary": "842569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842569" }, { "category": "external", "summary": "842838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842838" }, { "category": "external", "summary": "842858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842858" }, { "category": "external", "summary": "843059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843059" }, { "category": "external", "summary": "843061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843061" }, { "category": "external", "summary": "843064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843064" }, { "category": "external", "summary": "843161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843161" }, { "category": "external", "summary": "843165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843165" }, { "category": "external", "summary": "843462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843462" }, { "category": "external", "summary": "843529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843529" }, { "category": "external", "summary": "843845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843845" }, { "category": "external", "summary": "844414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844414" }, { "category": "external", "summary": "844417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844417" }, { "category": "external", "summary": "844678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844678" }, { "category": "external", "summary": "844796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844796" }, { "category": "external", "summary": "844806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844806" }, { "category": "external", "summary": "845060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845060" }, { "category": "external", "summary": "845096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845096" }, { "category": "external", "summary": "845198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845198" }, { "category": "external", "summary": "845224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845224" }, { "category": "external", "summary": "845576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845576" }, { "category": "external", "summary": "845580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845580" }, { "category": "external", "summary": "845613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845613" }, { "category": "external", "summary": "845668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845668" }, { "category": "external", "summary": "845995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845995" }, { "category": "external", "summary": "846251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846251" }, { "category": "external", "summary": "846482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846482" }, { "category": "external", "summary": "846719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846719" }, { "category": "external", "summary": "847002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847002" }, { "category": "external", "summary": "847115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847115" }, { "category": "external", "summary": "847858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847858" }, { "category": "external", "summary": "848038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848038" }, { "category": "external", "summary": "849224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849224" }, { "category": "external", "summary": "850342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850342" }, { "category": "external", "summary": "850790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850790" }, { "category": "external", "summary": "851080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851080" }, { "category": "external", "summary": "851142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851142" }, { "category": "external", "summary": "851512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851512" }, { "category": "external", "summary": "852006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852006" }, { "category": "external", "summary": "852119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852119" }, { "category": "external", "summary": "852167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852167" }, { "category": "external", "summary": "852199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852199" }, { "category": "external", "summary": "852316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852316" }, { "category": "external", "summary": "852388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852388" }, { "category": "external", "summary": "852791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852791" }, { "category": "external", "summary": "852804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852804" }, { "category": "external", "summary": "853056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853056" }, { "category": "external", "summary": "853229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853229" }, { "category": "external", "summary": "853356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853356" }, { "category": "external", "summary": "853445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853445" }, { "category": "external", "summary": "853995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853995" }, { "category": "external", "summary": "854697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854697" }, { "category": "external", "summary": "855184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855184" }, { "category": "external", "summary": "855267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855267" }, { "category": "external", "summary": "855406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855406" }, { "category": "external", "summary": "856220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856220" }, { "category": "external", "summary": "857078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857078" }, { "category": "external", "summary": "857230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857230" }, { "category": "external", "summary": "857274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857274" }, { "category": "external", "summary": "857499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857499" }, { "category": "external", "summary": "857539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857539" }, { "category": "external", "summary": "857550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857550" }, { "category": "external", "summary": "857574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857574" }, { "category": "external", "summary": "857720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857720" }, { "category": "external", "summary": "857727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857727" }, { "category": "external", "summary": "857842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857842" }, { "category": "external", "summary": "858011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858011" }, { "category": "external", "summary": "858013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858013" }, { "category": "external", "summary": "858038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858038" }, { "category": "external", "summary": "858193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858193" }, { "category": "external", "summary": "858277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858277" }, { "category": "external", "summary": "858358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858358" }, { "category": "external", "summary": "858360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858360" }, { "category": "external", "summary": "858363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858363" }, { "category": "external", "summary": "858661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858661" }, { "category": "external", "summary": "858678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858678" }, { "category": "external", "summary": "858682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858682" }, { "category": "external", "summary": "858706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858706" }, { "category": "external", "summary": "858960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858960" }, { "category": "external", "summary": "859329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859329" }, { "category": "external", "summary": "859407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859407" }, { "category": "external", "summary": "859415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859415" }, { "category": "external", "summary": "859442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859442" }, { "category": "external", "summary": "859604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859604" }, { "category": "external", "summary": "859784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859784" }, { "category": "external", "summary": "859963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859963" }, { "category": "external", "summary": "860251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860251" }, { "category": "external", "summary": "860421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860421" }, { "category": "external", "summary": "860702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860702" }, { "category": "external", "summary": "860709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860709" }, { "category": "external", "summary": "862441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=862441" }, { "category": "external", "summary": "862997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=862997" }, { "category": "external", "summary": "863187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863187" }, { "category": "external", "summary": "863252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863252" }, { "category": "external", "summary": "864216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864216" }, { "category": "external", "summary": "864372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864372" }, { "category": "external", "summary": "864936", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864936" }, { "category": "external", "summary": "864999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864999" }, { "category": "external", "summary": "865528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865528" }, { "category": "external", "summary": "865811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865811" }, { "category": "external", "summary": "869575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869575" }, { "category": "external", "summary": "871086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871086" }, { "category": "external", "summary": "872096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872096" }, { "category": "external", "summary": "872305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872305" }, { "category": "external", "summary": "872487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872487" }, { "category": "external", "summary": "873850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873850" }, { "category": "external", "summary": "874160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874160" }, { "category": "external", "summary": "874185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874185" }, { "category": "external", "summary": "874768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874768" }, { "category": "external", "summary": "882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "882138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882138" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1543.json" } ], "title": "Red Hat Security Advisory: CloudForms System Engine 1.1 update", "tracking": { "current_release_date": "2024-11-22T05:57:26+00:00", "generator": { "date": "2024-11-22T05:57:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1543", "initial_release_date": "2012-12-04T19:32:00+00:00", "revision_history": [ { "date": "2012-12-04T19:32:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-12-04T19:39:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:57:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms System Engine for RHEL 6 Server", "product": { "name": "CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine", "product_identification_helper": { "cpe": "cpe:/a:cloudforms_systemengine:1::el6" } } }, { "category": "product_name", "name": "CloudForms Tools for RHEL 6 Server", "product": { "name": "CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools", "product_identification_helper": { "cpe": "cpe:/a:cloudforms_tools:1::el6" } } }, { "category": "product_name", "name": "CloudForms Tools for RHEL 5 Server", "product": { "name": "CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools", "product_identification_helper": { "cpe": "cpe:/a:cloudforms_tools:1::el5" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6cf.noarch", "product": { "name": "quartz-0:2.1.5-4.el6cf.noarch", "product_id": "quartz-0:2.1.5-4.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el6cf.noarch", "product": { "name": "katello-agent-0:1.1.2-1.el6cf.noarch", "product_id": "katello-agent-0:1.1.2-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "product": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "product_id": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.1.8-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "grinder-0:0.0.150-1.el6cf.noarch", "product": { "name": "grinder-0:0.0.150-1.el6cf.noarch", "product_id": "grinder-0:0.0.150-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/grinder@0.0.150-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el6cf.noarch", "product": { "name": "gofer-0:0.66.1-2.el6cf.noarch", "product_id": "gofer-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "product": { "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "product_id": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-watchdog@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "gofer-package-0:0.66.1-2.el6cf.noarch", "product": { "name": "gofer-package-0:0.66.1-2.el6cf.noarch", "product_id": "gofer-package-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-package@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "python-gofer-0:0.66.1-2.el6cf.noarch", "product": { "name": "python-gofer-0:0.66.1-2.el6cf.noarch", "product_id": "python-gofer-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gofer@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "product": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "product_id": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.11-3.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-devel@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-tomcat6@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-selinux@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-selinux-0:1.1.1-2.el6cf.noarch", "product": { "name": "katello-selinux-0:1.1.1-2.el6cf.noarch", "product_id": "katello-selinux-0:1.1.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.1.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-client-lib@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-common-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-common-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-common-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-common@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-selinux-server@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-consumer@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-admin-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-admin-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-admin-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-admin@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "product": { "name": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "product_id": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-common@1.1.8-12.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-0:1.1.8-12.el6cf.noarch", "product": { "name": "katello-cli-0:1.1.8-12.el6cf.noarch", "product_id": "katello-cli-0:1.1.8-12.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.1.8-12.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "product": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "product_id": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-tests@1.1.5-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-configure-0:1.1.9-12.el6cf.noarch", "product": { "name": "katello-configure-0:1.1.9-12.el6cf.noarch", "product_id": "katello-configure-0:1.1.9-12.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.1.9-12.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "product_id": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-pulp@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-all-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-all-0:1.1.12-22.el6cf.noarch", "product_id": "katello-all-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-all@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-0:1.1.12-22.el6cf.noarch", "product_id": "katello-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-common-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-common-0:1.1.12-22.el6cf.noarch", "product_id": "katello-common-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-common@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "product_id": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-candlepin@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "product_id": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-api-docs@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el5.noarch", "product": { "name": "katello-agent-0:1.1.2-1.el5.noarch", "product_id": "katello-agent-0:1.1.2-1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el5?arch=noarch" } } }, { "category": "product_version", "name": "python-gofer-0:0.66.1-2.el5.noarch", "product": { "name": "python-gofer-0:0.66.1-2.el5.noarch", "product_id": "python-gofer-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gofer@0.66.1-2.el5?arch=noarch" } } }, { "category": "product_version", "name": "gofer-watchdog-0:0.66.1-2.el5.noarch", "product": { "name": "gofer-watchdog-0:0.66.1-2.el5.noarch", "product_id": "gofer-watchdog-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-watchdog@0.66.1-2.el5?arch=noarch" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el5.noarch", "product": { "name": "gofer-0:0.66.1-2.el5.noarch", "product_id": "gofer-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el5?arch=noarch" } } }, { "category": "product_version", "name": "gofer-package-0:0.66.1-2.el5.noarch", "product": { "name": "gofer-package-0:0.66.1-2.el5.noarch", "product_id": "gofer-package-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-package@0.66.1-2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6cf.src", "product": { "name": "quartz-0:2.1.5-4.el6cf.src", "product_id": "quartz-0:2.1.5-4.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el6cf.src", "product": { "name": "katello-agent-0:1.1.2-1.el6cf.src", "product_id": "katello-agent-0:1.1.2-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.1.8-1.el6cf.src", "product": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.src", "product_id": "katello-certs-tools-0:1.1.8-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.1.8-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "grinder-0:0.0.150-1.el6cf.src", "product": { "name": "grinder-0:0.0.150-1.el6cf.src", "product_id": "grinder-0:0.0.150-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grinder@0.0.150-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el6cf.src", "product": { "name": "gofer-0:0.66.1-2.el6cf.src", "product_id": "gofer-0:0.66.1-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "product": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "product_id": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.11-3.el6cf?arch=src" } } }, { "category": "product_version", "name": "candlepin-0:0.7.8.1-1.el6cf.src", "product": { "name": "candlepin-0:0.7.8.1-1.el6cf.src", "product_id": "candlepin-0:0.7.8.1-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.8.1-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-selinux-0:1.1.1-2.el6cf.src", "product": { "name": "katello-selinux-0:1.1.1-2.el6cf.src", "product_id": "katello-selinux-0:1.1.1-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.1.1-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "pulp-0:1.1.14-1.el6cf.src", "product": { "name": "pulp-0:1.1.14-1.el6cf.src", "product_id": "pulp-0:1.1.14-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp@1.1.14-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-cli-0:1.1.8-12.el6cf.src", "product": { "name": "katello-cli-0:1.1.8-12.el6cf.src", "product_id": "katello-cli-0:1.1.8-12.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.1.8-12.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-cli-tests-0:1.1.5-2.el6cf.src", "product": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.src", "product_id": "katello-cli-tests-0:1.1.5-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-tests@1.1.5-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-configure-0:1.1.9-12.el6cf.src", "product": { "name": "katello-configure-0:1.1.9-12.el6cf.src", "product_id": "katello-configure-0:1.1.9-12.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.1.9-12.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-0:1.1.12-22.el6cf.src", "product": { "name": "katello-0:1.1.12-22.el6cf.src", "product_id": "katello-0:1.1.12-22.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello@1.1.12-22.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el5.src", "product": { "name": "katello-agent-0:1.1.2-1.el5.src", "product_id": "katello-agent-0:1.1.2-1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el5?arch=src" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el5.src", "product": { "name": "gofer-0:0.66.1-2.el5.src", "product_id": "gofer-0:0.66.1-2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch" }, "product_reference": "gofer-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el5.src as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-0:0.66.1-2.el5.src" }, "product_reference": "gofer-0:0.66.1-2.el5.src", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-package-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch" }, "product_reference": "gofer-package-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-watchdog-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch" }, "product_reference": "gofer-watchdog-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch" }, "product_reference": "katello-agent-0:1.1.2-1.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el5.src as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src" }, "product_reference": "katello-agent-0:1.1.2-1.el5.src", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "python-gofer-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch" }, "product_reference": "python-gofer-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.src as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src" }, "product_reference": "gofer-0:0.66.1-2.el6cf.src", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-package-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-package-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch" }, "product_reference": "katello-agent-0:1.1.2-1.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el6cf.src as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src" }, "product_reference": "katello-agent-0:1.1.2-1.el6cf.src", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "python-gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "python-gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.8.1-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src" }, "product_reference": "candlepin-0:0.7.8.1-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src" }, "product_reference": "gofer-0:0.66.1-2.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-package-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-package-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "grinder-0:0.0.150-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch" }, "product_reference": "grinder-0:0.0.150-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "grinder-0:0.0.150-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src" }, "product_reference": "grinder-0:0.0.150-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-0:1.1.12-22.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src" }, "product_reference": "katello-0:1.1.12-22.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-all-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-all-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-api-docs-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch" }, "product_reference": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src" }, "product_reference": "katello-certs-tools-0:1.1.8-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.1.8-12.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch" }, "product_reference": "katello-cli-0:1.1.8-12.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.1.8-12.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src" }, "product_reference": "katello-cli-0:1.1.8-12.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-common-0:1.1.8-12.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch" }, "product_reference": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch" }, "product_reference": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src" }, "product_reference": "katello-cli-tests-0:1.1.5-2.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-common-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-common-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.1.9-12.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch" }, "product_reference": "katello-configure-0:1.1.9-12.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.1.9-12.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src" }, "product_reference": "katello-configure-0:1.1.9-12.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.1.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch" }, "product_reference": "katello-selinux-0:1.1.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.1.1-2.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src" }, "product_reference": "katello-selinux-0:1.1.1-2.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-0:1.1.14-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src" }, "product_reference": "pulp-0:1.1.14-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-admin-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-admin-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-client-lib-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-common-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-common-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-consumer-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "python-gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "python-gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch" }, "product_reference": "quartz-0:2.1.5-4.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src" }, "product_reference": "quartz-0:2.1.5-4.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch" }, "product_reference": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" }, "product_reference": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "James Laska" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-3538", "discovery_date": "2012-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "852199" } ], "notes": [ { "category": "description", "text": "Pulp in Red Hat CloudForms before 1.1 logs administrative passwords in a world-readable file, which allows local users to read pulp administrative passwords by reading production.log.", "title": "Vulnerability description" }, { "category": "summary", "text": "katello: pulp admin password logged in plaintext in world-readable katello/production.log", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3538" }, { "category": "external", "summary": "RHBZ#852199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3538", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3538" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "katello: pulp admin password logged in plaintext in world-readable katello/production.log" }, { "acknowledgments": [ { "names": [ "Kurt Seifried" ], "organization": "Red Hat Security Response Team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-4574", "discovery_date": "2012-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "872487" } ], "notes": [ { "category": "description", "text": "Pulp in Red Hat CloudForms before 1.1 uses world-readable permissions for pulp.conf, which allows local users to read the administrative password by reading this file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pulp /etc/pulp/pulp.conf world readable, contains default admin password", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4574" }, { "category": "external", "summary": "RHBZ#872487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872487" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4574", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4574" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4574", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4574" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pulp /etc/pulp/pulp.conf world readable, contains default admin password" }, { "acknowledgments": [ { "names": [ "Lukas Zapletal" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5603", "discovery_date": "2012-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "882129" } ], "notes": [ { "category": "description", "text": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Katello: lack of authorization in proxies_controller.rb", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5603" }, { "category": "external", "summary": "RHBZ#882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5603", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Katello: lack of authorization in proxies_controller.rb" }, { "acknowledgments": [ { "names": [ "James Labocki" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5605", "discovery_date": "2012-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "882138" } ], "notes": [ { "category": "description", "text": "Grinder in Red Hat CloudForms before 1.1 uses world-writable permissions for /var/lib/pulp/cache/grinder/, which allows local users to modify grinder cache files.", "title": "Vulnerability description" }, { "category": "summary", "text": "grinder: /var/lib/pulp/cache/grinder directory is world-writeable", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Update Infrastructure 2.1.3 is now in Production 2 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Update Infrastructure Life Cycle: https://access.redhat.com/support/policy/updates/rhui.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5605" }, { "category": "external", "summary": "RHBZ#882138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882138" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5605", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5605" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grinder: /var/lib/pulp/cache/grinder directory is world-writeable" } ] }
rhsa-2012_1543
Vulnerability from csaf_redhat
Published
2012-12-04 19:32
Modified
2024-11-22 05:57
Summary
Red Hat Security Advisory: CloudForms System Engine 1.1 update
Notes
Topic
Updated CloudForms System Engine packages that fix multiple security
issues, several bugs, and add enhancements are now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Red Hat CloudForms is an on-premise hybrid cloud
Infrastructure-as-a-Service (IaaS) product that lets you create and manage
private and public clouds.
This update fixes bugs in and adds enhancements to the System Engine
packages, and upgrades the system to CloudForms 1.1.
This update also fixes the following security issues:
It was discovered that Katello did not properly check user permissions when
handling certain requests. An authenticated remote attacker could use this
flaw to download consumer certificates or change settings of other users'
systems if they knew the target system's UUID. (CVE-2012-5603)
It was discovered that Pulp logged administrative passwords to a world
readable log file. A local attacker could use this flaw to control systems
deployed and managed by CloudForms. (CVE-2012-3538)
It was discovered that the Pulp configuration file pulp.conf was installed
as world readable. A local attacker could use this flaw to view the
administrative password, allowing them to control systems deployed and
managed by CloudForms. (CVE-2012-4574)
It was discovered that grinder used insecure permissions for its cache
directory. A local attacker could use this flaw to access or modify files
in the cache. (CVE-2012-5605)
The CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;
CVE-2012-3538 was discovered by James Laska of Red Hat; CVE-2012-4574 was
discovered by Kurt Seifried of Red Hat; and CVE-2012-5605 was discovered by
James Labocki of Red Hat.
After upgrading to these new packages, follow the instructions in the "4.1.
Upgrading CloudForms System Engine" section of the CloudForms 1.1
Installation Guide:
https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html
To view the full list of changes in this update, view the CloudForms
Technical Notes:
https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html
Users are advised to upgrade to these updated CloudForms System Engine
packages, which resolve these issues and add these enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated CloudForms System Engine packages that fix multiple security\nissues, several bugs, and add enhancements are now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat CloudForms is an on-premise hybrid cloud\nInfrastructure-as-a-Service (IaaS) product that lets you create and manage\nprivate and public clouds.\n\nThis update fixes bugs in and adds enhancements to the System Engine\npackages, and upgrades the system to CloudForms 1.1.\n\nThis update also fixes the following security issues:\n\nIt was discovered that Katello did not properly check user permissions when\nhandling certain requests. An authenticated remote attacker could use this\nflaw to download consumer certificates or change settings of other users\u0027\nsystems if they knew the target system\u0027s UUID. (CVE-2012-5603)\n\nIt was discovered that Pulp logged administrative passwords to a world\nreadable log file. A local attacker could use this flaw to control systems\ndeployed and managed by CloudForms. (CVE-2012-3538)\n\nIt was discovered that the Pulp configuration file pulp.conf was installed\nas world readable. A local attacker could use this flaw to view the\nadministrative password, allowing them to control systems deployed and\nmanaged by CloudForms. (CVE-2012-4574)\n\nIt was discovered that grinder used insecure permissions for its cache\ndirectory. A local attacker could use this flaw to access or modify files\nin the cache. (CVE-2012-5605)\n\nThe CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;\nCVE-2012-3538 was discovered by James Laska of Red Hat; CVE-2012-4574 was\ndiscovered by Kurt Seifried of Red Hat; and CVE-2012-5605 was discovered by\nJames Labocki of Red Hat.\n\nAfter upgrading to these new packages, follow the instructions in the \"4.1.\nUpgrading CloudForms System Engine\" section of the CloudForms 1.1\nInstallation Guide:\n\nhttps://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html\n\nTo view the full list of changes in this update, view the CloudForms\nTechnical Notes:\n\nhttps://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html\n\nUsers are advised to upgrade to these updated CloudForms System Engine\npackages, which resolve these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1543", "url": "https://access.redhat.com/errata/RHSA-2012:1543" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html", "url": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Installation_Guide/index.html" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html", "url": "https://access.redhat.com/knowledge/docs/en-US/CloudForms/1.1/html/Technical_Notes/index.html" }, { "category": "external", "summary": "746765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=746765" }, { "category": "external", "summary": "753128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=753128" }, { "category": "external", "summary": "760180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760180" }, { "category": "external", "summary": "766694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=766694" }, { "category": "external", "summary": "769559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769559" }, { "category": "external", "summary": "782954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=782954" }, { "category": "external", "summary": "786176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786176" }, { "category": "external", "summary": "786226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786226" }, { "category": "external", "summary": "787184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=787184" }, { "category": "external", "summary": "787305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=787305" }, { "category": "external", "summary": "789139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789139" }, { "category": "external", "summary": "789535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789535" }, { "category": "external", "summary": "790138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790138" }, { "category": "external", "summary": "790342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790342" }, { "category": "external", "summary": "796047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=796047" }, { "category": "external", "summary": "796972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=796972" }, { "category": "external", "summary": "797299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797299" }, { "category": "external", "summary": "797321", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797321" }, { "category": "external", "summary": "797412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=797412" }, { "category": "external", "summary": "799538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799538" }, { "category": "external", "summary": "800529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800529" }, { "category": "external", "summary": "801454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801454" }, { "category": "external", "summary": "801580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801580" }, { "category": "external", "summary": "802925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802925" }, { "category": "external", "summary": "803548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803548" }, { "category": "external", "summary": "803702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803702" }, { "category": "external", "summary": "803728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803728" }, { "category": "external", "summary": "803761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=803761" }, { "category": "external", "summary": "804127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804127" }, { "category": "external", "summary": "804555", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804555" }, { "category": "external", "summary": "804610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804610" }, { "category": "external", "summary": "804685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804685" }, { "category": "external", "summary": "805027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805027" }, { "category": "external", "summary": "805412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805412" }, { "category": "external", "summary": "805627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805627" }, { "category": "external", "summary": "805709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805709" }, { "category": "external", "summary": "805956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=805956" }, { "category": "external", "summary": "806076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806076" }, { "category": "external", "summary": "806078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806078" }, { "category": "external", "summary": "806083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806083" }, { "category": "external", "summary": "806353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806353" }, { "category": "external", "summary": "806879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806879" }, { "category": "external", "summary": "806940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806940" }, { "category": "external", "summary": "806969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=806969" }, { "category": "external", "summary": "807288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807288" }, { "category": "external", "summary": "807291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807291" }, { "category": "external", "summary": "807468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807468" }, { "category": "external", "summary": "807804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=807804" }, { "category": "external", "summary": "808172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=808172" }, { "category": "external", "summary": "808437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=808437" }, { "category": "external", "summary": "809259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=809259" }, { "category": "external", "summary": "810378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810378" }, { "category": "external", "summary": "810945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=810945" }, { "category": "external", "summary": "811556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=811556" }, { "category": "external", "summary": "811564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=811564" }, { "category": "external", "summary": "812417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=812417" }, { "category": "external", "summary": "813675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=813675" }, { "category": "external", "summary": "815308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815308" }, { "category": "external", "summary": "815802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815802" }, { "category": "external", "summary": "816935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816935" }, { "category": "external", "summary": "817123", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817123" }, { "category": "external", "summary": "818204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818204" }, { "category": "external", "summary": "818261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818261" }, { "category": "external", "summary": "818370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818370" }, { "category": "external", "summary": "819593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819593" }, { "category": "external", "summary": "819941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819941" }, { "category": "external", "summary": "820373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820373" }, { "category": "external", "summary": "820385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820385" }, { "category": "external", "summary": "820624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820624" }, { "category": "external", "summary": "820626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820626" }, { "category": "external", "summary": "820630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=820630" }, { "category": "external", "summary": "821345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821345" }, { "category": "external", "summary": "821644", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821644" }, { "category": "external", "summary": "821929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=821929" }, { "category": "external", "summary": "822119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822119" }, { "category": "external", "summary": "822484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822484" }, { "category": "external", "summary": "823688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823688" }, { "category": "external", "summary": "824069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824069" }, { "category": "external", "summary": "824581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=824581" }, { "category": "external", "summary": "826581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826581" }, { "category": "external", "summary": "827087", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=827087" }, { "category": "external", "summary": "827108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=827108" }, { "category": "external", "summary": "828447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828447" }, { "category": "external", "summary": "828533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=828533" }, { "category": "external", "summary": "829208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829208" }, { "category": "external", "summary": "829437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829437" }, { "category": "external", "summary": "829794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829794" }, { "category": "external", "summary": "830176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=830176" }, { "category": "external", "summary": "831664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831664" }, { "category": "external", "summary": "834006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834006" }, { "category": "external", "summary": "834013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834013" }, { "category": "external", "summary": "834242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834242" }, { "category": "external", "summary": "834646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834646" }, { "category": "external", "summary": "834697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=834697" }, { "category": "external", "summary": "835586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835586" }, { "category": "external", "summary": "835591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835591" }, { "category": "external", "summary": "835875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=835875" }, { "category": "external", "summary": "836339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836339" }, { "category": "external", "summary": "836575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=836575" }, { "category": "external", "summary": "837000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=837000" }, { "category": "external", "summary": "839005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=839005" }, { "category": "external", "summary": "840616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840616" }, { "category": "external", "summary": "840624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840624" }, { "category": "external", "summary": "840625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840625" }, { "category": "external", "summary": "841000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841000" }, { "category": "external", "summary": "841289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841289" }, { "category": "external", "summary": "841300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841300" }, { "category": "external", "summary": "841310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841310" }, { "category": "external", "summary": "841686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841686" }, { "category": "external", "summary": "841691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841691" }, { "category": "external", "summary": "841984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841984" }, { "category": "external", "summary": "841998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841998" }, { "category": "external", "summary": "842003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842003" }, { "category": "external", "summary": "842005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842005" }, { "category": "external", "summary": "842010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842010" }, { "category": "external", "summary": "842252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842252" }, { "category": "external", "summary": "842256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842256" }, { "category": "external", "summary": "842271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842271" }, { "category": "external", "summary": "842569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842569" }, { "category": "external", "summary": "842838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842838" }, { "category": "external", "summary": "842858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842858" }, { "category": "external", "summary": "843059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843059" }, { "category": "external", "summary": "843061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843061" }, { "category": "external", "summary": "843064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843064" }, { "category": "external", "summary": "843161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843161" }, { "category": "external", "summary": "843165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843165" }, { "category": "external", "summary": "843462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843462" }, { "category": "external", "summary": "843529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843529" }, { "category": "external", "summary": "843845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843845" }, { "category": "external", "summary": "844414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844414" }, { "category": "external", "summary": "844417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844417" }, { "category": "external", "summary": "844678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844678" }, { "category": "external", "summary": "844796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844796" }, { "category": "external", "summary": "844806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=844806" }, { "category": "external", "summary": "845060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845060" }, { "category": "external", "summary": "845096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845096" }, { "category": "external", "summary": "845198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845198" }, { "category": "external", "summary": "845224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845224" }, { "category": "external", "summary": "845576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845576" }, { "category": "external", "summary": "845580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845580" }, { "category": "external", "summary": "845613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845613" }, { "category": "external", "summary": "845668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845668" }, { "category": "external", "summary": "845995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845995" }, { "category": "external", "summary": "846251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846251" }, { "category": "external", "summary": "846482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846482" }, { "category": "external", "summary": "846719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=846719" }, { "category": "external", "summary": "847002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847002" }, { "category": "external", "summary": "847115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847115" }, { "category": "external", "summary": "847858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847858" }, { "category": "external", "summary": "848038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848038" }, { "category": "external", "summary": "849224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849224" }, { "category": "external", "summary": "850342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850342" }, { "category": "external", "summary": "850790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850790" }, { "category": "external", "summary": "851080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851080" }, { "category": "external", "summary": "851142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851142" }, { "category": "external", "summary": "851512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851512" }, { "category": "external", "summary": "852006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852006" }, { "category": "external", "summary": "852119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852119" }, { "category": "external", "summary": "852167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852167" }, { "category": "external", "summary": "852199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852199" }, { "category": "external", "summary": "852316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852316" }, { "category": "external", "summary": "852388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852388" }, { "category": "external", "summary": "852791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852791" }, { "category": "external", "summary": "852804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852804" }, { "category": "external", "summary": "853056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853056" }, { "category": "external", "summary": "853229", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853229" }, { "category": "external", "summary": "853356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853356" }, { "category": "external", "summary": "853445", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853445" }, { "category": "external", "summary": "853995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853995" }, { "category": "external", "summary": "854697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854697" }, { "category": "external", "summary": "855184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855184" }, { "category": "external", "summary": "855267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855267" }, { "category": "external", "summary": "855406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855406" }, { "category": "external", "summary": "856220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856220" }, { "category": "external", "summary": "857078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857078" }, { "category": "external", "summary": "857230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857230" }, { "category": "external", "summary": "857274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857274" }, { "category": "external", "summary": "857499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857499" }, { "category": "external", "summary": "857539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857539" }, { "category": "external", "summary": "857550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857550" }, { "category": "external", "summary": "857574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857574" }, { "category": "external", "summary": "857720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857720" }, { "category": "external", "summary": "857727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857727" }, { "category": "external", "summary": "857842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857842" }, { "category": "external", "summary": "858011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858011" }, { "category": "external", "summary": "858013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858013" }, { "category": "external", "summary": "858038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858038" }, { "category": "external", "summary": "858193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858193" }, { "category": "external", "summary": "858277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858277" }, { "category": "external", "summary": "858358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858358" }, { "category": "external", "summary": "858360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858360" }, { "category": "external", "summary": "858363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858363" }, { "category": "external", "summary": "858661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858661" }, { "category": "external", "summary": "858678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858678" }, { "category": "external", "summary": "858682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858682" }, { "category": "external", "summary": "858706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858706" }, { "category": "external", "summary": "858960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=858960" }, { "category": "external", "summary": "859329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859329" }, { "category": "external", "summary": "859407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859407" }, { "category": "external", "summary": "859415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859415" }, { "category": "external", "summary": "859442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859442" }, { "category": "external", "summary": "859604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859604" }, { "category": "external", "summary": "859784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859784" }, { "category": "external", "summary": "859963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859963" }, { "category": "external", "summary": "860251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860251" }, { "category": "external", "summary": "860421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860421" }, { "category": "external", "summary": "860702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860702" }, { "category": "external", "summary": "860709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860709" }, { "category": "external", "summary": "862441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=862441" }, { "category": "external", "summary": "862997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=862997" }, { "category": "external", "summary": "863187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863187" }, { "category": "external", "summary": "863252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863252" }, { "category": "external", "summary": "864216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864216" }, { "category": "external", "summary": "864372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864372" }, { "category": "external", "summary": "864936", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864936" }, { "category": "external", "summary": "864999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=864999" }, { "category": "external", "summary": "865528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865528" }, { "category": "external", "summary": "865811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865811" }, { "category": "external", "summary": "869575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869575" }, { "category": "external", "summary": "871086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871086" }, { "category": "external", "summary": "872096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872096" }, { "category": "external", "summary": "872305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872305" }, { "category": "external", "summary": "872487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872487" }, { "category": "external", "summary": "873850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873850" }, { "category": "external", "summary": "874160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874160" }, { "category": "external", "summary": "874185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874185" }, { "category": "external", "summary": "874768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874768" }, { "category": "external", "summary": "882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "882138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882138" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1543.json" } ], "title": "Red Hat Security Advisory: CloudForms System Engine 1.1 update", "tracking": { "current_release_date": "2024-11-22T05:57:26+00:00", "generator": { "date": "2024-11-22T05:57:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1543", "initial_release_date": "2012-12-04T19:32:00+00:00", "revision_history": [ { "date": "2012-12-04T19:32:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-12-04T19:39:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:57:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CloudForms System Engine for RHEL 6 Server", "product": { "name": "CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine", "product_identification_helper": { "cpe": "cpe:/a:cloudforms_systemengine:1::el6" } } }, { "category": "product_name", "name": "CloudForms Tools for RHEL 6 Server", "product": { "name": "CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools", "product_identification_helper": { "cpe": "cpe:/a:cloudforms_tools:1::el6" } } }, { "category": "product_name", "name": "CloudForms Tools for RHEL 5 Server", "product": { "name": "CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools", "product_identification_helper": { "cpe": "cpe:/a:cloudforms_tools:1::el5" } } } ], "category": "product_family", "name": "Red Hat CloudForms" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6cf.noarch", "product": { "name": "quartz-0:2.1.5-4.el6cf.noarch", "product_id": "quartz-0:2.1.5-4.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el6cf.noarch", "product": { "name": "katello-agent-0:1.1.2-1.el6cf.noarch", "product_id": "katello-agent-0:1.1.2-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "product": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "product_id": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.1.8-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "grinder-0:0.0.150-1.el6cf.noarch", "product": { "name": "grinder-0:0.0.150-1.el6cf.noarch", "product_id": "grinder-0:0.0.150-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/grinder@0.0.150-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el6cf.noarch", "product": { "name": "gofer-0:0.66.1-2.el6cf.noarch", "product_id": "gofer-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "product": { "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "product_id": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-watchdog@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "gofer-package-0:0.66.1-2.el6cf.noarch", "product": { "name": "gofer-package-0:0.66.1-2.el6cf.noarch", "product_id": "gofer-package-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-package@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "python-gofer-0:0.66.1-2.el6cf.noarch", "product": { "name": "python-gofer-0:0.66.1-2.el6cf.noarch", "product_id": "python-gofer-0:0.66.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gofer@0.66.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "product": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "product_id": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.11-3.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-devel@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-tomcat6@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-selinux@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-0:0.7.8.1-1.el6cf.noarch", "product": { "name": "candlepin-0:0.7.8.1-1.el6cf.noarch", "product_id": "candlepin-0:0.7.8.1-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.8.1-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-selinux-0:1.1.1-2.el6cf.noarch", "product": { "name": "katello-selinux-0:1.1.1-2.el6cf.noarch", "product_id": "katello-selinux-0:1.1.1-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.1.1-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-client-lib@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-common-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-common-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-common-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-common@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-selinux-server@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-consumer@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "pulp-admin-0:1.1.14-1.el6cf.noarch", "product": { "name": "pulp-admin-0:1.1.14-1.el6cf.noarch", "product_id": "pulp-admin-0:1.1.14-1.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp-admin@1.1.14-1.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "product": { "name": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "product_id": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-common@1.1.8-12.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-0:1.1.8-12.el6cf.noarch", "product": { "name": "katello-cli-0:1.1.8-12.el6cf.noarch", "product_id": "katello-cli-0:1.1.8-12.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.1.8-12.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "product": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "product_id": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-tests@1.1.5-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-configure-0:1.1.9-12.el6cf.noarch", "product": { "name": "katello-configure-0:1.1.9-12.el6cf.noarch", "product_id": "katello-configure-0:1.1.9-12.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.1.9-12.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "product_id": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-pulp@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-all-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-all-0:1.1.12-22.el6cf.noarch", "product_id": "katello-all-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-all@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-0:1.1.12-22.el6cf.noarch", "product_id": "katello-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-common-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-common-0:1.1.12-22.el6cf.noarch", "product_id": "katello-common-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-common@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "product_id": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-candlepin@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "product": { "name": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "product_id": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-api-docs@1.1.12-22.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el5.noarch", "product": { "name": "katello-agent-0:1.1.2-1.el5.noarch", "product_id": "katello-agent-0:1.1.2-1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el5?arch=noarch" } } }, { "category": "product_version", "name": "python-gofer-0:0.66.1-2.el5.noarch", "product": { "name": "python-gofer-0:0.66.1-2.el5.noarch", "product_id": "python-gofer-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-gofer@0.66.1-2.el5?arch=noarch" } } }, { "category": "product_version", "name": "gofer-watchdog-0:0.66.1-2.el5.noarch", "product": { "name": "gofer-watchdog-0:0.66.1-2.el5.noarch", "product_id": "gofer-watchdog-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-watchdog@0.66.1-2.el5?arch=noarch" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el5.noarch", "product": { "name": "gofer-0:0.66.1-2.el5.noarch", "product_id": "gofer-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el5?arch=noarch" } } }, { "category": "product_version", "name": "gofer-package-0:0.66.1-2.el5.noarch", "product": { "name": "gofer-package-0:0.66.1-2.el5.noarch", "product_id": "gofer-package-0:0.66.1-2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer-package@0.66.1-2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6cf.src", "product": { "name": "quartz-0:2.1.5-4.el6cf.src", "product_id": "quartz-0:2.1.5-4.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el6cf.src", "product": { "name": "katello-agent-0:1.1.2-1.el6cf.src", "product_id": "katello-agent-0:1.1.2-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.1.8-1.el6cf.src", "product": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.src", "product_id": "katello-certs-tools-0:1.1.8-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.1.8-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "grinder-0:0.0.150-1.el6cf.src", "product": { "name": "grinder-0:0.0.150-1.el6cf.src", "product_id": "grinder-0:0.0.150-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/grinder@0.0.150-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el6cf.src", "product": { "name": "gofer-0:0.66.1-2.el6cf.src", "product_id": "gofer-0:0.66.1-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "product": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "product_id": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.11-3.el6cf?arch=src" } } }, { "category": "product_version", "name": "candlepin-0:0.7.8.1-1.el6cf.src", "product": { "name": "candlepin-0:0.7.8.1-1.el6cf.src", "product_id": "candlepin-0:0.7.8.1-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.8.1-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-selinux-0:1.1.1-2.el6cf.src", "product": { "name": "katello-selinux-0:1.1.1-2.el6cf.src", "product_id": "katello-selinux-0:1.1.1-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.1.1-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "pulp-0:1.1.14-1.el6cf.src", "product": { "name": "pulp-0:1.1.14-1.el6cf.src", "product_id": "pulp-0:1.1.14-1.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pulp@1.1.14-1.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-cli-0:1.1.8-12.el6cf.src", "product": { "name": "katello-cli-0:1.1.8-12.el6cf.src", "product_id": "katello-cli-0:1.1.8-12.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.1.8-12.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-cli-tests-0:1.1.5-2.el6cf.src", "product": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.src", "product_id": "katello-cli-tests-0:1.1.5-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-tests@1.1.5-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-configure-0:1.1.9-12.el6cf.src", "product": { "name": "katello-configure-0:1.1.9-12.el6cf.src", "product_id": "katello-configure-0:1.1.9-12.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.1.9-12.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-0:1.1.12-22.el6cf.src", "product": { "name": "katello-0:1.1.12-22.el6cf.src", "product_id": "katello-0:1.1.12-22.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello@1.1.12-22.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-agent-0:1.1.2-1.el5.src", "product": { "name": "katello-agent-0:1.1.2-1.el5.src", "product_id": "katello-agent-0:1.1.2-1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-agent@1.1.2-1.el5?arch=src" } } }, { "category": "product_version", "name": "gofer-0:0.66.1-2.el5.src", "product": { "name": "gofer-0:0.66.1-2.el5.src", "product_id": "gofer-0:0.66.1-2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gofer@0.66.1-2.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch" }, "product_reference": "gofer-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el5.src as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-0:0.66.1-2.el5.src" }, "product_reference": "gofer-0:0.66.1-2.el5.src", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-package-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch" }, "product_reference": "gofer-package-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-watchdog-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch" }, "product_reference": "gofer-watchdog-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch" }, "product_reference": "katello-agent-0:1.1.2-1.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el5.src as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src" }, "product_reference": "katello-agent-0:1.1.2-1.el5.src", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "python-gofer-0:0.66.1-2.el5.noarch as a component of CloudForms Tools for RHEL 5 Server", "product_id": "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch" }, "product_reference": "python-gofer-0:0.66.1-2.el5.noarch", "relates_to_product_reference": "5Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.src as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src" }, "product_reference": "gofer-0:0.66.1-2.el6cf.src", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-package-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-package-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch" }, "product_reference": "katello-agent-0:1.1.2-1.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "katello-agent-0:1.1.2-1.el6cf.src as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src" }, "product_reference": "katello-agent-0:1.1.2-1.el6cf.src", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "python-gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms Tools for RHEL 6 Server", "product_id": "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "python-gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-CloudTools" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.8.1-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src" }, "product_reference": "candlepin-0:0.7.8.1-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch" }, "product_reference": "candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-0:0.66.1-2.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src" }, "product_reference": "gofer-0:0.66.1-2.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-package-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-package-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "gofer-watchdog-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch" }, "product_reference": "gofer-watchdog-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "grinder-0:0.0.150-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch" }, "product_reference": "grinder-0:0.0.150-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "grinder-0:0.0.150-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src" }, "product_reference": "grinder-0:0.0.150-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-0:1.1.12-22.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src" }, "product_reference": "katello-0:1.1.12-22.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-all-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-all-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-api-docs-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-api-docs-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch" }, "product_reference": "katello-certs-tools-0:1.1.8-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.1.8-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src" }, "product_reference": "katello-certs-tools-0:1.1.8-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.1.8-12.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch" }, "product_reference": "katello-cli-0:1.1.8-12.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.1.8-12.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src" }, "product_reference": "katello-cli-0:1.1.8-12.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-common-0:1.1.8-12.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch" }, "product_reference": "katello-cli-common-0:1.1.8-12.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch" }, "product_reference": "katello-cli-tests-0:1.1.5-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-tests-0:1.1.5-2.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src" }, "product_reference": "katello-cli-tests-0:1.1.5-2.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-common-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-common-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.1.9-12.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch" }, "product_reference": "katello-configure-0:1.1.9-12.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.1.9-12.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src" }, "product_reference": "katello-configure-0:1.1.9-12.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch" }, "product_reference": "katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.1.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch" }, "product_reference": "katello-selinux-0:1.1.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.1.1-2.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src" }, "product_reference": "katello-selinux-0:1.1.1-2.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-0:1.1.14-1.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src" }, "product_reference": "pulp-0:1.1.14-1.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-admin-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-admin-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-client-lib-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-client-lib-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-common-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-common-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-consumer-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-consumer-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch" }, "product_reference": "pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "python-gofer-0:0.66.1-2.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch" }, "product_reference": "python-gofer-0:0.66.1-2.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch" }, "product_reference": "quartz-0:2.1.5-4.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src" }, "product_reference": "quartz-0:2.1.5-4.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch" }, "product_reference": "rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "relates_to_product_reference": "6Server-SystemEngine" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src as a component of CloudForms System Engine for RHEL 6 Server", "product_id": "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" }, "product_reference": "rubygem-apipie-rails-0:0.0.11-3.el6cf.src", "relates_to_product_reference": "6Server-SystemEngine" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "James Laska" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-3538", "discovery_date": "2012-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "852199" } ], "notes": [ { "category": "description", "text": "Pulp in Red Hat CloudForms before 1.1 logs administrative passwords in a world-readable file, which allows local users to read pulp administrative passwords by reading production.log.", "title": "Vulnerability description" }, { "category": "summary", "text": "katello: pulp admin password logged in plaintext in world-readable katello/production.log", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3538" }, { "category": "external", "summary": "RHBZ#852199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3538", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3538" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "katello: pulp admin password logged in plaintext in world-readable katello/production.log" }, { "acknowledgments": [ { "names": [ "Kurt Seifried" ], "organization": "Red Hat Security Response Team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-4574", "discovery_date": "2012-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "872487" } ], "notes": [ { "category": "description", "text": "Pulp in Red Hat CloudForms before 1.1 uses world-readable permissions for pulp.conf, which allows local users to read the administrative password by reading this file.", "title": "Vulnerability description" }, { "category": "summary", "text": "pulp /etc/pulp/pulp.conf world readable, contains default admin password", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4574" }, { "category": "external", "summary": "RHBZ#872487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872487" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4574", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4574" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4574", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4574" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "pulp /etc/pulp/pulp.conf world readable, contains default admin password" }, { "acknowledgments": [ { "names": [ "Lukas Zapletal" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5603", "discovery_date": "2012-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "882129" } ], "notes": [ { "category": "description", "text": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Katello: lack of authorization in proxies_controller.rb", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5603" }, { "category": "external", "summary": "RHBZ#882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5603", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Katello: lack of authorization in proxies_controller.rb" }, { "acknowledgments": [ { "names": [ "James Labocki" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5605", "discovery_date": "2012-06-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "882138" } ], "notes": [ { "category": "description", "text": "Grinder in Red Hat CloudForms before 1.1 uses world-writable permissions for /var/lib/pulp/cache/grinder/, which allows local users to modify grinder cache files.", "title": "Vulnerability description" }, { "category": "summary", "text": "grinder: /var/lib/pulp/cache/grinder directory is world-writeable", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Update Infrastructure 2.1.3 is now in Production 2 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Update Infrastructure Life Cycle: https://access.redhat.com/support/policy/updates/rhui.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5605" }, { "category": "external", "summary": "RHBZ#882138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882138" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5605", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5605" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-CloudTools:gofer-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-0:0.66.1-2.el5.src", "5Server-CloudTools:gofer-package-0:0.66.1-2.el5.noarch", "5Server-CloudTools:gofer-watchdog-0:0.66.1-2.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.noarch", "5Server-CloudTools:katello-agent-0:1.1.2-1.el5.src", "5Server-CloudTools:python-gofer-0:0.66.1-2.el5.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-0:0.66.1-2.el6cf.src", "6Server-CloudTools:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.noarch", "6Server-CloudTools:katello-agent-0:1.1.2-1.el6cf.src", "6Server-CloudTools:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-0:0.7.8.1-1.el6cf.src", "6Server-SystemEngine:candlepin-devel-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-selinux-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:candlepin-tomcat6-0:0.7.8.1-1.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-0:0.66.1-2.el6cf.src", "6Server-SystemEngine:gofer-package-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:gofer-watchdog-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.noarch", "6Server-SystemEngine:grinder-0:0.0.150-1.el6cf.src", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-0:1.1.12-22.el6cf.src", "6Server-SystemEngine:katello-all-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-api-docs-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.noarch", "6Server-SystemEngine:katello-certs-tools-0:1.1.8-1.el6cf.src", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-0:1.1.8-12.el6cf.src", "6Server-SystemEngine:katello-cli-common-0:1.1.8-12.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.noarch", "6Server-SystemEngine:katello-cli-tests-0:1.1.5-2.el6cf.src", "6Server-SystemEngine:katello-common-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.noarch", "6Server-SystemEngine:katello-configure-0:1.1.9-12.el6cf.src", "6Server-SystemEngine:katello-glue-candlepin-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-glue-pulp-0:1.1.12-22.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.noarch", "6Server-SystemEngine:katello-selinux-0:1.1.1-2.el6cf.src", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-0:1.1.14-1.el6cf.src", "6Server-SystemEngine:pulp-admin-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-client-lib-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-common-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-consumer-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:pulp-selinux-server-0:1.1.14-1.el6cf.noarch", "6Server-SystemEngine:python-gofer-0:0.66.1-2.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.noarch", "6Server-SystemEngine:quartz-0:2.1.5-4.el6cf.src", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.noarch", "6Server-SystemEngine:rubygem-apipie-rails-0:0.0.11-3.el6cf.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grinder: /var/lib/pulp/cache/grinder directory is world-writeable" } ] }
rhsa-2013_0544
Vulnerability from csaf_redhat
Published
2013-02-21 19:04
Modified
2024-11-22 06:14
Summary
Red Hat Security Advisory: Subscription Asset Manager 1.2 update
Notes
Topic
Red Hat Subscription Asset Manager 1.2, which fixes several security
issues, multiple bugs, and adds various enhancements, is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
[Updated 25th February 2013]
This erratum previously failed to include the updated rubygem-rack package.
It also previously incorrectly documented CVE-2012-5604 as being fixed,
however that issue never affected Subscription Asset Manager and is no
longer listed. As well, CVE-2012-6496 was described as being fixed, however
that issue had previously been fixed in RHSA-2013:0154.
Details
Red Hat Subscription Asset Manager acts as a proxy for handling
subscription information and software updates on client machines.
It was discovered that Katello did not properly check user permissions when
handling certain requests. An authenticated remote attacker could use this
flaw to download consumer certificates or change settings of other users'
systems if they knew the target system's UUID. (CVE-2012-5603)
It was found that the
"/usr/share/katello/script/katello-generate-passphrase" utility, which is
run during the installation and configuration process, set world-readable
permissions on the "/etc/katello/secure/passphrase" file. A local attacker
could use this flaw to obtain the passphrase for Katello, giving them
access to information they would otherwise not have access to.
(CVE-2012-5561)
Note: After installing this update, ensure the
"/etc/katello/secure/passphrase" file is owned by the root user and group
and mode 0750 permissions. Sites should also consider re-creating the
Katello passphrase as this issue exposed it to local users.
Three flaws were found in rubygem-rack. A remote attacker could use these
flaws to perform a denial of service attack against applications using
rubygem-rack. (CVE-2012-6109, CVE-2013-0183, CVE-2013-0184)
It was found that ruby_parser from rubygem-ruby_parser created a temporary
file in an insecure way. A local attacker could use this flaw to perform a
symbolic link attack, overwriting arbitrary files accessible to the
application using ruby_parser. (CVE-2013-0162)
The CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;
CVE-2012-5561 was discovered by Aaron Weitekamp of the Red Hat Cloud
Quality Engineering team; and CVE-2013-0162 was discovered by Michael
Scherer of the Red Hat Regional IT team.
These updated Subscription Asset Manager packages include a number of bug
fixes and enhancements. Space precludes documenting all of these changes
in this advisory. Refer to the Red Hat Subscription Asset Manager 1.2
Release Notes for information about these changes:
https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html
All users of Red Hat Subscription Asset Manager are advised to upgrade to
these updated packages, which fix these issues and add various
enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Subscription Asset Manager 1.2, which fixes several security\nissues, multiple bugs, and adds various enhancements, is now available.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\n[Updated 25th February 2013]\nThis erratum previously failed to include the updated rubygem-rack package.\nIt also previously incorrectly documented CVE-2012-5604 as being fixed,\nhowever that issue never affected Subscription Asset Manager and is no\nlonger listed. As well, CVE-2012-6496 was described as being fixed, however\nthat issue had previously been fixed in RHSA-2013:0154.", "title": "Topic" }, { "category": "general", "text": "Red Hat Subscription Asset Manager acts as a proxy for handling\nsubscription information and software updates on client machines.\n\nIt was discovered that Katello did not properly check user permissions when\nhandling certain requests. An authenticated remote attacker could use this\nflaw to download consumer certificates or change settings of other users\u0027\nsystems if they knew the target system\u0027s UUID. (CVE-2012-5603)\n\nIt was found that the\n\"/usr/share/katello/script/katello-generate-passphrase\" utility, which is\nrun during the installation and configuration process, set world-readable\npermissions on the \"/etc/katello/secure/passphrase\" file. A local attacker\ncould use this flaw to obtain the passphrase for Katello, giving them\naccess to information they would otherwise not have access to.\n(CVE-2012-5561)\n\nNote: After installing this update, ensure the\n\"/etc/katello/secure/passphrase\" file is owned by the root user and group\nand mode 0750 permissions. Sites should also consider re-creating the\nKatello passphrase as this issue exposed it to local users.\n\nThree flaws were found in rubygem-rack. A remote attacker could use these\nflaws to perform a denial of service attack against applications using\nrubygem-rack. (CVE-2012-6109, CVE-2013-0183, CVE-2013-0184)\n\nIt was found that ruby_parser from rubygem-ruby_parser created a temporary\nfile in an insecure way. A local attacker could use this flaw to perform a\nsymbolic link attack, overwriting arbitrary files accessible to the\napplication using ruby_parser. (CVE-2013-0162)\n\nThe CVE-2012-5603 issue was discovered by Lukas Zapletal of Red Hat;\nCVE-2012-5561 was discovered by Aaron Weitekamp of the Red Hat Cloud\nQuality Engineering team; and CVE-2013-0162 was discovered by Michael\nScherer of the Red Hat Regional IT team.\n\nThese updated Subscription Asset Manager packages include a number of bug\nfixes and enhancements. Space precludes documenting all of these changes\nin this advisory. Refer to the Red Hat Subscription Asset Manager 1.2\nRelease Notes for information about these changes:\n\nhttps://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html\n\nAll users of Red Hat Subscription Asset Manager are advised to upgrade to\nthese updated packages, which fix these issues and add various\nenhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0544", "url": "https://access.redhat.com/errata/RHSA-2013:0544" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html", "url": "https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Subscription_Asset_Manager/1.2/html/Release_Notes/index.html" }, { "category": "external", "summary": "760564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=760564" }, { "category": "external", "summary": "800145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=800145" }, { "category": "external", "summary": "809823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=809823" }, { "category": "external", "summary": "813291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=813291" }, { "category": "external", "summary": "817845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817845" }, { "category": "external", "summary": "817946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=817946" }, { "category": "external", "summary": "818679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818679" }, { "category": "external", "summary": "818903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=818903" }, { "category": "external", "summary": "819002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819002" }, { "category": "external", "summary": "819611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=819611" }, { "category": "external", "summary": "822942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822942" }, { "category": "external", "summary": "822943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822943" }, { "category": "external", "summary": "822945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822945" }, { "category": "external", "summary": "826099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=826099" }, { "category": "external", "summary": "829474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829474" }, { "category": "external", "summary": "832425", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832425" }, { "category": "external", "summary": "832462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=832462" }, { "category": "external", "summary": "840595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840595" }, { "category": "external", "summary": "840600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840600" }, { "category": "external", "summary": "840603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840603" }, { "category": "external", "summary": "840609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840609" }, { "category": "external", "summary": "840792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840792" }, { "category": "external", "summary": "840969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840969" }, { "category": "external", "summary": "841868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841868" }, { "category": "external", "summary": "843625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843625" }, { "category": "external", "summary": "843857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843857" }, { "category": "external", "summary": "843861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843861" }, { "category": "external", "summary": "843904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843904" }, { "category": "external", "summary": "845501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845501" }, { "category": "external", "summary": "845620", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845620" }, { "category": "external", "summary": "847024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847024" }, { "category": "external", "summary": "847117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847117" }, { "category": "external", "summary": "847598", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=847598" }, { "category": "external", "summary": "850336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850336" }, { "category": "external", "summary": "852508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=852508" }, { "category": "external", "summary": "854278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854278" }, { "category": "external", "summary": "854283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854283" }, { "category": "external", "summary": "854985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=854985" }, { "category": "external", "summary": "856303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856303" }, { "category": "external", "summary": "856777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856777" }, { "category": "external", "summary": "856795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=856795" }, { "category": "external", "summary": "857452", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=857452" }, { "category": "external", "summary": "859128", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859128" }, { "category": "external", "summary": "863461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863461" }, { "category": "external", "summary": "865571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865571" }, { "category": "external", "summary": "866323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866323" }, { "category": "external", "summary": "866972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866972" }, { "category": "external", "summary": "866995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=866995" }, { "category": "external", "summary": "868290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=868290" }, { "category": "external", "summary": "869380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869380" }, { "category": "external", "summary": "871622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=871622" }, { "category": "external", "summary": "872332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872332" }, { "category": "external", "summary": "872334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872334" }, { "category": "external", "summary": "872335", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872335" }, { "category": "external", "summary": "872602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872602" }, { "category": "external", "summary": "872687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=872687" }, { "category": "external", "summary": "873038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873038" }, { "category": "external", "summary": "873443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873443" }, { "category": "external", "summary": "873803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873803" }, { "category": "external", "summary": "873809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873809" }, { "category": "external", "summary": "874182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874182" }, { "category": "external", "summary": "874280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874280" }, { "category": "external", "summary": "874502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874502" }, { "category": "external", "summary": "874510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874510" }, { "category": "external", "summary": "874583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874583" }, { "category": "external", "summary": "874737", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874737" }, { "category": "external", "summary": "874744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874744" }, { "category": "external", "summary": "875101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875101" }, { "category": "external", "summary": "875609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875609" }, { "category": "external", "summary": "875876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=875876" }, { "category": "external", "summary": "876869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876869" }, { "category": "external", "summary": "876896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876896" }, { "category": "external", "summary": "876911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876911" }, { "category": "external", "summary": "877317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877317" }, { "category": "external", "summary": "877473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877473" }, { "category": "external", "summary": "877894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877894" }, { "category": "external", "summary": "878191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878191" }, { "category": "external", "summary": "878341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878341" }, { "category": "external", "summary": "878355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878355" }, { "category": "external", "summary": "878370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878370" }, { "category": "external", "summary": "878377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878377" }, { "category": "external", "summary": "878693", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878693" }, { "category": "external", "summary": "878750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=878750" }, { "category": "external", "summary": "879094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879094" }, { "category": "external", "summary": "879170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879170" }, { "category": "external", "summary": "879245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879245" }, { "category": "external", "summary": "879320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879320" }, { "category": "external", "summary": "880113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880113" }, { "category": "external", "summary": "880116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880116" }, { "category": "external", "summary": "880710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880710" }, { "category": "external", "summary": "880848", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880848" }, { "category": "external", "summary": "880905", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880905" }, { "category": "external", "summary": "881616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=881616" }, { "category": "external", "summary": "882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "882957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882957" }, { "category": "external", "summary": "885096", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=885096" }, { "category": "external", "summary": "886137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=886137" }, { "category": "external", "summary": "886462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=886462" }, { "category": "external", "summary": "890000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890000" }, { "category": "external", "summary": "892639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892639" }, { "category": "external", "summary": "892806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892806" }, { "category": "external", "summary": "895277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "category": "external", "summary": "895282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282" }, { "category": "external", "summary": "895384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895384" }, { "category": "external", "summary": "896550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896550" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0544.json" } ], "title": "Red Hat Security Advisory: Subscription Asset Manager 1.2 update", "tracking": { "current_release_date": "2024-11-22T06:14:27+00:00", "generator": { "date": "2024-11-22T06:14:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:0544", "initial_release_date": "2013-02-21T19:04:00+00:00", "revision_history": [ { "date": "2013-02-21T19:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-02-25T23:08:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:14:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Subscription Asset Manager for RHEL 6 Server", "product": { "name": "Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12", "product_identification_helper": { "cpe": "cpe:/a:rhel_sam:1.2::el6" } } } ], "category": "product_family", "name": "Red Hat Subscription Asset Manager" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6_3.src", "product": { "name": "quartz-0:2.1.5-4.el6_3.src", "product_id": "quartz-0:2.1.5-4.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "product": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "product_id": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.2.1-1h.el6_3?arch=src" } } }, { "category": "product_version", "name": "elasticsearch-0:0.19.9-5.el6_3.src", "product": { "name": "elasticsearch-0:0.19.9-5.el6_3.src", "product_id": "elasticsearch-0:0.19.9-5.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/elasticsearch@0.19.9-5.el6_3?arch=src" } } }, { "category": "product_version", "name": "lucene3-0:3.6.1-10h.el6_3.src", "product": { "name": "lucene3-0:3.6.1-10h.el6_3.src", "product_id": "lucene3-0:3.6.1-10h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/lucene3@3.6.1-10h.el6_3?arch=src" } } }, { "category": "product_version", "name": "candlepin-0:0.7.23-1.el6_3.src", "product": { "name": "candlepin-0:0.7.23-1.el6_3.src", "product_id": "candlepin-0:0.7.23-1.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.23-1.el6_3?arch=src" } } }, { "category": "product_version", "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "product": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "product_id": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-mime4j@0.6-4_redhat_1.ep6.el6.1?arch=src" } } }, { "category": "product_version", "name": "thumbslug-0:0.0.28-1.el6_3.src", "product": { "name": "thumbslug-0:0.0.28-1.el6_3.src", "product_id": "thumbslug-0:0.0.28-1.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/thumbslug@0.0.28-1.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-selinux-0:1.2.1-2h.el6_3.src", "product": { "name": "katello-selinux-0:1.2.1-2h.el6_3.src", "product_id": "katello-selinux-0:1.2.1-2h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.2.1-2h.el6_3?arch=src" } } }, { "category": "product_version", "name": "puppet-0:2.6.17-2.el6cf.src", "product": { "name": "puppet-0:2.6.17-2.el6cf.src", "product_id": "puppet-0:2.6.17-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet@2.6.17-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-mail-0:2.3.0-3.el6cf.src", "product": { "name": "rubygem-mail-0:2.3.0-3.el6cf.src", "product_id": "rubygem-mail-0:2.3.0-3.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mail@2.3.0-3.el6cf?arch=src" } } }, { "category": "product_version", "name": "katello-cli-0:1.2.1-12h.el6_3.src", "product": { "name": "katello-cli-0:1.2.1-12h.el6_3.src", "product_id": "katello-cli-0:1.2.1-12h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.2.1-12h.el6_3?arch=src" } } }, { "category": "product_version", "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "product": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "product_id": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ruby_parser@2.0.4-6.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "product": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "product_id": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.12-2.el6cf?arch=src" } } }, { "category": "product_version", "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "product": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "product_id": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ldap_fluff@0.1.3-1.el6_3?arch=src" } } }, { "category": "product_version", "name": "snappy-java-0:1.0.4-2.el6_3.src", "product": { "name": "snappy-java-0:1.0.4-2.el6_3.src", "product_id": "snappy-java-0:1.0.4-2.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/snappy-java@1.0.4-2.el6_3?arch=src" } } }, { "category": "product_version", "name": "apache-commons-codec-0:1.7-2.el6_3.src", "product": { "name": "apache-commons-codec-0:1.7-2.el6_3.src", "product_id": "apache-commons-codec-0:1.7-2.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-codec@1.7-2.el6_3?arch=src" } } }, { "category": "product_version", "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "product": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "product_id": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar@1.6.5-0.12.git58097d9h.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-configure-0:1.2.3-3h.el6_3.src", "product": { "name": "katello-configure-0:1.2.3-3h.el6_3.src", "product_id": "katello-configure-0:1.2.3-3h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.2.3-3h.el6_3?arch=src" } } }, { "category": "product_version", "name": "katello-0:1.2.1-15h.el6_3.src", "product": { "name": "katello-0:1.2.1-15h.el6_3.src", "product_id": "katello-0:1.2.1-15h.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello@1.2.1-15h.el6_3?arch=src" } } }, { "category": "product_version", "name": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "product": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "product_id": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activesupport@3.0.10-10.el6cf?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rubygem-rack-1:1.3.0-3.el6cf.src", "product": { "name": "rubygem-rack-1:1.3.0-3.el6cf.src", "product_id": "rubygem-rack-1:1.3.0-3.el6cf.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack@1.3.0-3.el6cf?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "quartz-0:2.1.5-4.el6_3.noarch", "product": { "name": "quartz-0:2.1.5-4.el6_3.noarch", "product_id": "quartz-0:2.1.5-4.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@2.1.5-4.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "product": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "product_id": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-certs-tools@1.2.1-1h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "elasticsearch-0:0.19.9-5.el6_3.noarch", "product": { "name": "elasticsearch-0:0.19.9-5.el6_3.noarch", "product_id": "elasticsearch-0:0.19.9-5.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/elasticsearch@0.19.9-5.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "lucene3-0:3.6.1-10h.el6_3.noarch", "product": { "name": "lucene3-0:3.6.1-10h.el6_3.noarch", "product_id": "lucene3-0:3.6.1-10h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/lucene3@3.6.1-10h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "product": { "name": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "product_id": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/lucene3-contrib@3.6.1-10h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-tomcat6@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-selinux@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "product": { "name": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "product_id": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/candlepin-devel@0.7.23-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product": { "name": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_id": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-mime4j-javadoc@0.6-4_redhat_1.ep6.el6.1?arch=noarch" } } }, { "category": "product_version", "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_id": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-mime4j@0.6-4_redhat_1.ep6.el6.1?arch=noarch" } } }, { "category": "product_version", "name": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "product": { "name": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "product_id": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/thumbslug-selinux@0.0.28-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "thumbslug-0:0.0.28-1.el6_3.noarch", "product": { "name": "thumbslug-0:0.0.28-1.el6_3.noarch", "product_id": "thumbslug-0:0.0.28-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/thumbslug@0.0.28-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "product": { "name": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "product_id": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-selinux@1.2.1-2h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "puppet-server-0:2.6.17-2.el6cf.noarch", "product": { "name": "puppet-server-0:2.6.17-2.el6cf.noarch", "product_id": "puppet-server-0:2.6.17-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet-server@2.6.17-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "puppet-0:2.6.17-2.el6cf.noarch", "product": { "name": "puppet-0:2.6.17-2.el6cf.noarch", "product_id": "puppet-0:2.6.17-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/puppet@2.6.17-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "product": { "name": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "product_id": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mail-doc@2.3.0-3.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "product": { "name": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "product_id": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-mail@2.3.0-3.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-0:1.2.1-12h.el6_3.noarch", "product": { "name": "katello-cli-0:1.2.1-12h.el6_3.noarch", "product_id": "katello-cli-0:1.2.1-12h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli@1.2.1-12h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "product": { "name": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "product_id": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-cli-common@1.2.1-12h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "product": { "name": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "product_id": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ruby_parser-doc@2.0.4-6.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "product": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "product_id": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ruby_parser@2.0.4-6.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "product": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "product_id": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-apipie-rails@0.0.12-2.el6cf?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "product": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "product_id": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-ldap_fluff@0.1.3-1.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-configure-0:1.2.3-3h.el6_3.noarch", "product": { "name": "katello-configure-0:1.2.3-3h.el6_3.noarch", "product_id": "katello-configure-0:1.2.3-3h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-configure@1.2.3-3h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-common-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-common-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-common-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-common@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-glue-candlepin@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-headpin-all@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "product": { "name": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "product_id": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/katello-headpin@1.2.1-15h.el6_3?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "product": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "product_id": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-activesupport@3.0.10-10.el6cf?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "product": { "name": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "product_id": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-rack@1.3.0-3.el6cf?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "product": { "name": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "product_id": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/snappy-java-debuginfo@1.0.4-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "snappy-java-0:1.0.4-2.el6_3.x86_64", "product": { "name": "snappy-java-0:1.0.4-2.el6_3.x86_64", "product_id": "snappy-java-0:1.0.4-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/snappy-java@1.0.4-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "product": { "name": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "product_id": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-codec@1.7-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "product": { "name": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "product_id": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-codec-debuginfo@1.7-2.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product": { "name": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_id": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar-java@1.6.5-0.12.git58097d9h.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product": { "name": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_id": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar-debuginfo@1.6.5-0.12.git58097d9h.el6_3?arch=x86_64" } } }, { "category": "product_version", "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_id": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sigar@1.6.5-0.12.git58097d9h.el6_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-codec-0:1.7-2.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src" }, "product_reference": "apache-commons-codec-0:1.7-2.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-codec-0:1.7-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64" }, "product_reference": "apache-commons-codec-0:1.7-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64" }, "product_reference": "apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch" }, "product_reference": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src" }, "product_reference": "apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch" }, "product_reference": "apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-0:0.7.23-1.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src" }, "product_reference": "candlepin-0:0.7.23-1.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-devel-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-devel-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-selinux-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-selinux-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch" }, "product_reference": "candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "elasticsearch-0:0.19.9-5.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch" }, "product_reference": "elasticsearch-0:0.19.9-5.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "elasticsearch-0:0.19.9-5.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src" }, "product_reference": "elasticsearch-0:0.19.9-5.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-0:1.2.1-15h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src" }, "product_reference": "katello-0:1.2.1-15h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch" }, "product_reference": "katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-certs-tools-0:1.2.1-1h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src" }, "product_reference": "katello-certs-tools-0:1.2.1-1h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.2.1-12h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch" }, "product_reference": "katello-cli-0:1.2.1-12h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-0:1.2.1-12h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src" }, "product_reference": "katello-cli-0:1.2.1-12h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-cli-common-0:1.2.1-12h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch" }, "product_reference": "katello-cli-common-0:1.2.1-12h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-common-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-common-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.2.3-3h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch" }, "product_reference": "katello-configure-0:1.2.3-3h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-configure-0:1.2.3-3h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src" }, "product_reference": "katello-configure-0:1.2.3-3h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-headpin-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-headpin-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch" }, "product_reference": "katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.2.1-2h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch" }, "product_reference": "katello-selinux-0:1.2.1-2h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "katello-selinux-0:1.2.1-2h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src" }, "product_reference": "katello-selinux-0:1.2.1-2h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "lucene3-0:3.6.1-10h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch" }, "product_reference": "lucene3-0:3.6.1-10h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "lucene3-0:3.6.1-10h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src" }, "product_reference": "lucene3-0:3.6.1-10h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch" }, "product_reference": "lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-0:2.6.17-2.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch" }, "product_reference": "puppet-0:2.6.17-2.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-0:2.6.17-2.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src" }, "product_reference": "puppet-0:2.6.17-2.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "puppet-server-0:2.6.17-2.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch" }, "product_reference": "puppet-server-0:2.6.17-2.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch" }, "product_reference": "quartz-0:2.1.5-4.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:2.1.5-4.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src" }, "product_reference": "quartz-0:2.1.5-4.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch" }, "product_reference": "rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-activesupport-1:3.0.10-10.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src" }, "product_reference": "rubygem-activesupport-1:3.0.10-10.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch" }, "product_reference": "rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src" }, "product_reference": "rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch" }, "product_reference": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src" }, "product_reference": "rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mail-0:2.3.0-3.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch" }, "product_reference": "rubygem-mail-0:2.3.0-3.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mail-0:2.3.0-3.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src" }, "product_reference": "rubygem-mail-0:2.3.0-3.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch" }, "product_reference": "rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-1:1.3.0-3.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch" }, "product_reference": "rubygem-rack-1:1.3.0-3.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-rack-1:1.3.0-3.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src" }, "product_reference": "rubygem-rack-1:1.3.0-3.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch" }, "product_reference": "rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src" }, "product_reference": "rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch" }, "product_reference": "rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src" }, "product_reference": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64" }, "product_reference": "sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64" }, "product_reference": "sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64" }, "product_reference": "sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "snappy-java-0:1.0.4-2.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src" }, "product_reference": "snappy-java-0:1.0.4-2.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "snappy-java-0:1.0.4-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64" }, "product_reference": "snappy-java-0:1.0.4-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64 as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64" }, "product_reference": "snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "thumbslug-0:0.0.28-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch" }, "product_reference": "thumbslug-0:0.0.28-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "thumbslug-0:0.0.28-1.el6_3.src as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src" }, "product_reference": "thumbslug-0:0.0.28-1.el6_3.src", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" }, { "category": "default_component_of", "full_product_name": { "name": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch as a component of Red Hat Subscription Asset Manager for RHEL 6 Server", "product_id": "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" }, "product_reference": "thumbslug-selinux-0:0.0.28-1.el6_3.noarch", "relates_to_product_reference": "6Server-SubscriptionAssetManager12" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aaron Weitekamp" ], "organization": "Red Hat Cloud Quality Engineering team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5561", "discovery_date": "2012-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "879094" } ], "notes": [ { "category": "description", "text": "script/katello-generate-passphrase in Katello 1.1 uses world-readable permissions for /etc/katello/secure/passphrase, which allows local users to obtain the passphrase by reading the file.", "title": "Vulnerability description" }, { "category": "summary", "text": "Katello: /etc/katello/secure/passphrase is world readable", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5561" }, { "category": "external", "summary": "RHBZ#879094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879094" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5561", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5561" } ], "release_date": "2013-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Katello: /etc/katello/secure/passphrase is world readable" }, { "acknowledgments": [ { "names": [ "Lukas Zapletal" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-5603", "discovery_date": "2012-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "882129" } ], "notes": [ { "category": "description", "text": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Katello: lack of authorization in proxies_controller.rb", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5603" }, { "category": "external", "summary": "RHBZ#882129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5603", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5603" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603" } ], "release_date": "2012-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Katello: lack of authorization in proxies_controller.rb" }, { "cve": "CVE-2012-6109", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2013-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "895277" } ], "notes": [ { "category": "description", "text": "lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: parsing Content-Disposition header DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6109" }, { "category": "external", "summary": "RHBZ#895277", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895277" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6109", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6109" } ], "release_date": "2012-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rack: parsing Content-Disposition header DoS" }, { "acknowledgments": [ { "names": [ "Michael Scherer" ], "organization": "Red Hat Regional IT team", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2013-0162", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "discovery_date": "2013-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "892806" } ], "notes": [ { "category": "description", "text": "The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser gem 3.1.1 and earlier for Ruby allows local users to overwrite arbitrary files via a symlink attack on a temporary file with a predictable name in /tmp.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-ruby_parser: incorrect temporary file usage", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0162" }, { "category": "external", "summary": "RHBZ#892806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0162", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0162" } ], "release_date": "2013-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "rubygem-ruby_parser: incorrect temporary file usage" }, { "cve": "CVE-2013-0183", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2013-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "895282" } ], "notes": [ { "category": "description", "text": "multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: receiving excessively long lines triggers out-of-memory error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0183" }, { "category": "external", "summary": "RHBZ#895282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895282" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0183", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0183" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0183", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0183" } ], "release_date": "2013-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rack: receiving excessively long lines triggers out-of-memory error" }, { "cve": "CVE-2013-0184", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2013-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "895384" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to \"symbolized arbitrary strings.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "rubygem-rack: Rack::Auth:: AbstractRequest DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0184" }, { "category": "external", "summary": "RHBZ#895384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=895384" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0184", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0184" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0184", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0184" } ], "release_date": "2012-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-02-21T19:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0544" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.src", "6Server-SubscriptionAssetManager12:apache-commons-codec-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-commons-codec-debuginfo-0:1.7-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:apache-mime4j-0:0.6-4_redhat_1.ep6.el6.1.src", "6Server-SubscriptionAssetManager12:apache-mime4j-javadoc-0:0.6-4_redhat_1.ep6.el6.1.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-0:0.7.23-1.el6_3.src", "6Server-SubscriptionAssetManager12:candlepin-devel-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-selinux-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:candlepin-tomcat6-0:0.7.23-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.noarch", "6Server-SubscriptionAssetManager12:elasticsearch-0:0.19.9-5.el6_3.src", "6Server-SubscriptionAssetManager12:katello-0:1.2.1-15h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-certs-tools-0:1.2.1-1h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-cli-0:1.2.1-12h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-cli-common-0:1.2.1-12h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-common-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-configure-0:1.2.3-3h.el6_3.src", "6Server-SubscriptionAssetManager12:katello-glue-candlepin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-headpin-all-0:1.2.1-15h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.noarch", "6Server-SubscriptionAssetManager12:katello-selinux-0:1.2.1-2h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:lucene3-0:3.6.1-10h.el6_3.src", "6Server-SubscriptionAssetManager12:lucene3-contrib-0:3.6.1-10h.el6_3.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:puppet-0:2.6.17-2.el6cf.src", "6Server-SubscriptionAssetManager12:puppet-server-0:2.6.17-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.noarch", "6Server-SubscriptionAssetManager12:quartz-0:2.1.5-4.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-activesupport-1:3.0.10-10.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-apipie-rails-0:0.0.12-2.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:rubygem-ldap_fluff-0:0.1.3-1.el6_3.src", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-mail-0:2.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-mail-doc-0:2.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-rack-1:1.3.0-3.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-0:2.0.4-6.el6cf.src", "6Server-SubscriptionAssetManager12:rubygem-ruby_parser-doc-0:2.0.4-6.el6cf.noarch", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.src", "6Server-SubscriptionAssetManager12:sigar-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-debuginfo-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:sigar-java-0:1.6.5-0.12.git58097d9h.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.src", "6Server-SubscriptionAssetManager12:snappy-java-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:snappy-java-debuginfo-0:1.0.4-2.el6_3.x86_64", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.noarch", "6Server-SubscriptionAssetManager12:thumbslug-0:0.0.28-1.el6_3.src", "6Server-SubscriptionAssetManager12:thumbslug-selinux-0:0.0.28-1.el6_3.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "rubygem-rack: Rack::Auth:: AbstractRequest DoS" } ] }
fkie_cve-2012-5603
Vulnerability from fkie_nvd
Published
2013-01-04 22:55
Modified
2024-11-21 01:44
Severity ?
Summary
proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users' settings via unspecified vectors related to the "consumer UUID" of a system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | cloudforms | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:cloudforms:*:*:*:*:*:*:*:*", "matchCriteriaId": "72189D15-3318-45CD-B37E-FD53E4422052", "versionEndIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system." }, { "lang": "es", "value": "proxies_controller.rb en Katello en Red Hat CloudForms anterior a v1.1 no comprueba los permisos de forma adecuada, lo que permite a usuarios remotos autenticados leer certificados de consumidores o cambiar especificaciones de usuarios a trav\u00e9s de vectores relacionados con el \"consumer UUID\"de un system." } ], "id": "CVE-2012-5603", "lastModified": "2024-11-21T01:44:57.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-01-04T22:55:02.383", "references": [ { "source": "secalert@redhat.com", "url": "http://osvdb.org/88140" }, { "source": "secalert@redhat.com", "url": "http://osvdb.org/88142" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1543.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51472" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/56819" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/88140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/88142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1543.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/56819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-rgp9-vmqv-r74v
Vulnerability from github
Published
2022-05-17 01:39
Modified
2022-05-17 01:39
Details
proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users' settings via unspecified vectors related to the "consumer UUID" of a system.
{ "affected": [], "aliases": [ "CVE-2012-5603" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-01-04T22:55:00Z", "severity": "MODERATE" }, "details": "proxies_controller.rb in Katello in Red Hat CloudForms before 1.1 does not properly check permissions, which allows remote authenticated users to read consumer certificates or change arbitrary users\u0027 settings via unspecified vectors related to the \"consumer UUID\" of a system.", "id": "GHSA-rgp9-vmqv-r74v", "modified": "2022-05-17T01:39:18Z", "published": "2022-05-17T01:39:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5603" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=882129" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80549" }, { "type": "WEB", "url": "http://osvdb.org/88140" }, { "type": "WEB", "url": "http://osvdb.org/88142" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1543.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0544.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/51472" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/56819" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.