Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-4389 (GCVE-0-2013-4389)
Vulnerability from cvelistv5 – Published: 2013-10-17 00:00 – Updated: 2024-08-06 16:45- n/a
| URL | Tags |
|---|---|
| http://www.debian.org/security/2014/dsa-2887 | vendor-advisoryx_refsource_DEBIAN |
| http://lists.opensuse.org/opensuse-updates/2014-0… | vendor-advisoryx_refsource_SUSE |
| https://groups.google.com/forum/message/raw?msg=r… | mailing-listx_refsource_MLIST |
| http://lists.opensuse.org/opensuse-updates/2013-1… | vendor-advisoryx_refsource_SUSE |
| http://lists.opensuse.org/opensuse-updates/2013-1… | vendor-advisoryx_refsource_SUSE |
| http://www.debian.org/security/2014/dsa-2888 | vendor-advisoryx_refsource_DEBIAN |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:45:13.235Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-2887",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"name": "openSUSE-SU-2014:0009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1931",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name": "openSUSE-SU-2013:1928",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "DSA-2888",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2014/dsa-2888"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-10-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-03-28T12:57:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "DSA-2887",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"name": "openSUSE-SU-2014:0009",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1931",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name": "openSUSE-SU-2013:1928",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "DSA-2888",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2014/dsa-2888"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4389",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-2887",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"name": "openSUSE-SU-2014:0009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1931",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name": "openSUSE-SU-2013:1928",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "DSA-2888",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2888"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-4389",
"datePublished": "2013-10-17T00:00:00.000Z",
"dateReserved": "2013-06-12T00:00:00.000Z",
"dateUpdated": "2024-08-06T16:45:13.235Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2013-4389",
"date": "2026-05-18",
"epss": "0.01333",
"percentile": "0.80165"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.0.0\", \"versionEndExcluding\": \"3.2.15\", \"matchCriteriaId\": \"393CE9B0-AD9B-4A51-AC58-CF10BF115251\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D806A17E-B8F9-466D-807D-3F1E77603DC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A10BC294-9196-425F-9FB0-B1625465B47F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidadews de format string en archivos log_subscriber.rb en el componente de suscripci\\u00f3n de log de Action Mailer en Ruby on Rails 3.x anterior a 3.2.15 permite a atacantes remotos causar una denegaci\\u00f3n de servicio a trav\\u00e9s de una direcci\\u00f3n de email manipulada que es manejada de manera inapropiada durante la construcci\\u00f3n de un mensaje de log.\"}]",
"id": "CVE-2013-4389",
"lastModified": "2024-11-21T01:55:28.447",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2013-10-17T00:55:03.320",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-2887\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-2888\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Broken Link\", \"Exploit\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-2887\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-2888\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Exploit\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-134\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2013-4389\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-10-17T00:55:03.320\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidadews de format string en archivos log_subscriber.rb en el componente de suscripci\u00f3n de log de Action Mailer en Ruby on Rails 3.x anterior a 3.2.15 permite a atacantes remotos causar una denegaci\u00f3n de servicio a trav\u00e9s de una direcci\u00f3n de email manipulada que es manejada de manera inapropiada durante la construcci\u00f3n de un mensaje de log.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-134\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.2.15\",\"matchCriteriaId\":\"393CE9B0-AD9B-4A51-AC58-CF10BF115251\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D806A17E-B8F9-466D-807D-3F1E77603DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2887\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2888\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Exploit\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2887\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2888\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Exploit\"]}]}}"
}
}
GHSA-RG5M-3FQP-6PX8
Vulnerability from github – Published: 2017-10-24 18:33 – Updated: 2023-07-04 00:18Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
{
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "actionmailer"
},
"ranges": [
{
"events": [
{
"introduced": "3.0.0"
},
{
"fixed": "3.2.15"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2013-4389"
],
"database_specific": {
"cwe_ids": [
"CWE-134"
],
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:54:42Z",
"nvd_published_at": "2013-10-17T00:55:03Z",
"severity": "MODERATE"
},
"details": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"id": "GHSA-rg5m-3fqp-6px8",
"modified": "2023-07-04T00:18:31Z",
"published": "2017-10-24T18:33:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-rg5m-3fqp-6px8"
},
{
"type": "PACKAGE",
"url": "https://github.com/rails/rails/tree/main/actionmailer"
},
{
"type": "WEB",
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionmailer/CVE-2013-4389.yml"
},
{
"type": "WEB",
"url": "https://web.archive.org/web/20201208175929/https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2014/dsa-2888"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "actionmailer email address processing causes Denial of service"
}
GSD-2013-4389
Vulnerability from gsd - Updated: 2013-10-16 00:00{
"GSD": {
"alias": "CVE-2013-4389",
"description": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"id": "GSD-2013-4389",
"references": [
"https://www.suse.com/security/cve/CVE-2013-4389.html",
"https://www.debian.org/security/2014/dsa-2887",
"https://www.debian.org/security/2014/dsa-2888",
"https://access.redhat.com/errata/RHBA-2015:1100"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "actionmailer",
"purl": "pkg:gem/actionmailer"
}
}
],
"aliases": [
"CVE-2013-4389",
"OSVDB-98629"
],
"details": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"id": "GSD-2013-4389",
"modified": "2013-10-16T00:00:00.000Z",
"published": "2013-10-16T00:00:00.000Z",
"references": [
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": 4.3,
"type": "CVSS_V2"
}
],
"summary": "CVE-2013-4389 rubygem-actionmailer: email address processing DoS"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4389",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-2887",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"name": "openSUSE-SU-2014:0009",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"refsource": "MLIST",
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1931",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name": "openSUSE-SU-2013:1928",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "DSA-2888",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-2888"
}
]
}
},
"github.com/rubysec/ruby-advisory-db": {
"cve": "2013-4389",
"cvss_v2": 4.3,
"date": "2013-10-16",
"description": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"gem": "actionmailer",
"osvdb": 98629,
"patched_versions": [
"\u003e= 3.2.15"
],
"title": "CVE-2013-4389 rubygem-actionmailer: email address processing DoS",
"unaffected_versions": [
"~\u003e 2.3.2"
],
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=3.0.0 \u003c3.2.15",
"affected_versions": "All versions starting from 3.0.0 before 3.2.15",
"credit": "Aaron Neyer",
"cvss_v2": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"cwe_ids": [
"CWE-1035",
"CWE-134",
"CWE-937"
],
"date": "2019-08-08",
"description": "A carefully crafted email address in conjunction with the Action Mailer logger format string could take advantage of a bug in Ruby\u0027s sprintf implementation and possibly lead to a denial of service attack. Impacted Ruby code will look something like this: `\"some string #{user_input}\" % some_number` ",
"fixed_versions": [
"3.2.15"
],
"identifier": "CVE-2013-4389",
"identifiers": [
"CVE-2013-4389"
],
"not_impacted": "4.0.x, 2.3.x",
"package_slug": "gem/actionmailer",
"pubdate": "2013-10-16",
"solution": "Upgrade to 3.2.15.\r\n\r\nIf you aren\u0027t able to upgrade immediately, please check the source link to apply patches.",
"title": "Possible DoS Vulnerability",
"urls": [
"http://seclists.org/oss-sec/2013/q4/118"
],
"uuid": "491cb17f-01de-4133-add2-4c5ae76139dc"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.2.15",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4389"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-134"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[ruby-security-ann] 20131016 Possible DoS Vulnerability in Action Mailer (CVE-2013-4389)",
"refsource": "MLIST",
"tags": [
"Broken Link",
"Exploit"
],
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"name": "openSUSE-SU-2013:1928",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"name": "openSUSE-SU-2013:1931",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"name": "openSUSE-SU-2014:0009",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"name": "DSA-2888",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2888"
},
{
"name": "DSA-2887",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2887"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-05-19T16:52Z",
"publishedDate": "2013-10-17T00:55Z"
}
}
}
RHBA-2015_1100
Vulnerability from csaf_redhat - Published: 2015-06-16 12:28 - Updated: 2024-12-07 03:41Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated cfme packages that fix several bugs, and add various enhancements are now available for Red Hat CloudForms 3.2.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat CloudForms Management Engine delivers the insight, control, and\nautomation needed to address the challenges of managing virtual\nenvironments. CloudForms Management Engine is built on Ruby on Rails, a\nmodel-view-controller (MVC) framework for web application development.\nAction Pack implements the controller and the view components.\n\nThis update also fixes several bugs and adds various enhancements.\nDocumentation for these changes is available in the Release Notes and Technical Notes documents linked to in the References section.\n\nAll cfme users are advised to upgrade to these updated packages, which\ncorrect these issues and add these enhancements.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2015:1100",
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/Red_Hat_CloudForms/3.2/html/Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/Red_Hat_CloudForms/3.2/html/Release_Notes/index.html"
},
{
"category": "external",
"summary": "1146178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146178"
},
{
"category": "external",
"summary": "1160890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1160890"
},
{
"category": "external",
"summary": "1161248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161248"
},
{
"category": "external",
"summary": "1161253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161253"
},
{
"category": "external",
"summary": "1161322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161322"
},
{
"category": "external",
"summary": "1161701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161701"
},
{
"category": "external",
"summary": "1161744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161744"
},
{
"category": "external",
"summary": "1163382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163382"
},
{
"category": "external",
"summary": "1163465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163465"
},
{
"category": "external",
"summary": "1163468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163468"
},
{
"category": "external",
"summary": "1163469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163469"
},
{
"category": "external",
"summary": "1163472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163472"
},
{
"category": "external",
"summary": "1163661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163661"
},
{
"category": "external",
"summary": "1163952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163952"
},
{
"category": "external",
"summary": "1163978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163978"
},
{
"category": "external",
"summary": "1164033",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164033"
},
{
"category": "external",
"summary": "1164386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164386"
},
{
"category": "external",
"summary": "1164764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164764"
},
{
"category": "external",
"summary": "1166187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166187"
},
{
"category": "external",
"summary": "1166198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166198"
},
{
"category": "external",
"summary": "1166303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166303"
},
{
"category": "external",
"summary": "1166328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166328"
},
{
"category": "external",
"summary": "1166861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166861"
},
{
"category": "external",
"summary": "1167110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167110"
},
{
"category": "external",
"summary": "1167308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167308"
},
{
"category": "external",
"summary": "1167410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167410"
},
{
"category": "external",
"summary": "1168337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168337"
},
{
"category": "external",
"summary": "1168345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168345"
},
{
"category": "external",
"summary": "1169351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169351"
},
{
"category": "external",
"summary": "1169502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169502"
},
{
"category": "external",
"summary": "1169930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169930"
},
{
"category": "external",
"summary": "1169937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169937"
},
{
"category": "external",
"summary": "1170319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170319"
},
{
"category": "external",
"summary": "1170358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170358"
},
{
"category": "external",
"summary": "1170813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170813"
},
{
"category": "external",
"summary": "1171167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171167"
},
{
"category": "external",
"summary": "1171286",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171286"
},
{
"category": "external",
"summary": "1171577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171577"
},
{
"category": "external",
"summary": "1171589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171589"
},
{
"category": "external",
"summary": "1171738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171738"
},
{
"category": "external",
"summary": "1171780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171780"
},
{
"category": "external",
"summary": "1172298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172298"
},
{
"category": "external",
"summary": "1173213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173213"
},
{
"category": "external",
"summary": "1173216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173216"
},
{
"category": "external",
"summary": "1173251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173251"
},
{
"category": "external",
"summary": "1173336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173336"
},
{
"category": "external",
"summary": "1173712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173712"
},
{
"category": "external",
"summary": "1174855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174855"
},
{
"category": "external",
"summary": "1174881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174881"
},
{
"category": "external",
"summary": "1176280",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176280"
},
{
"category": "external",
"summary": "1176619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176619"
},
{
"category": "external",
"summary": "1176689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176689"
},
{
"category": "external",
"summary": "1176721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176721"
},
{
"category": "external",
"summary": "1177015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177015"
},
{
"category": "external",
"summary": "1177809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177809"
},
{
"category": "external",
"summary": "1178078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178078"
},
{
"category": "external",
"summary": "1178697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178697"
},
{
"category": "external",
"summary": "1178729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178729"
},
{
"category": "external",
"summary": "1179503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179503"
},
{
"category": "external",
"summary": "1179797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179797"
},
{
"category": "external",
"summary": "1179807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179807"
},
{
"category": "external",
"summary": "1179907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179907"
},
{
"category": "external",
"summary": "1179908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179908"
},
{
"category": "external",
"summary": "1179958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179958"
},
{
"category": "external",
"summary": "1180313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180313"
},
{
"category": "external",
"summary": "1180649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180649"
},
{
"category": "external",
"summary": "1180746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180746"
},
{
"category": "external",
"summary": "1181429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181429"
},
{
"category": "external",
"summary": "1181768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181768"
},
{
"category": "external",
"summary": "1182329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182329"
},
{
"category": "external",
"summary": "1182330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182330"
},
{
"category": "external",
"summary": "1182654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182654"
},
{
"category": "external",
"summary": "1182795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182795"
},
{
"category": "external",
"summary": "1183757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183757"
},
{
"category": "external",
"summary": "1184250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184250"
},
{
"category": "external",
"summary": "1184267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184267"
},
{
"category": "external",
"summary": "1184343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184343"
},
{
"category": "external",
"summary": "1184465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184465"
},
{
"category": "external",
"summary": "1184575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184575"
},
{
"category": "external",
"summary": "1184637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184637"
},
{
"category": "external",
"summary": "1184990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184990"
},
{
"category": "external",
"summary": "1185042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185042"
},
{
"category": "external",
"summary": "1186364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186364"
},
{
"category": "external",
"summary": "1186413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186413"
},
{
"category": "external",
"summary": "1186485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186485"
},
{
"category": "external",
"summary": "1186502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186502"
},
{
"category": "external",
"summary": "1186911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186911"
},
{
"category": "external",
"summary": "1187233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187233"
},
{
"category": "external",
"summary": "1187836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187836"
},
{
"category": "external",
"summary": "1188401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188401"
},
{
"category": "external",
"summary": "1188427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188427"
},
{
"category": "external",
"summary": "1188436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188436"
},
{
"category": "external",
"summary": "1188585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188585"
},
{
"category": "external",
"summary": "1188597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188597"
},
{
"category": "external",
"summary": "1188798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188798"
},
{
"category": "external",
"summary": "1190054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190054"
},
{
"category": "external",
"summary": "1190211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190211"
},
{
"category": "external",
"summary": "1190260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190260"
},
{
"category": "external",
"summary": "1190293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190293"
},
{
"category": "external",
"summary": "1190564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190564"
},
{
"category": "external",
"summary": "1190565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190565"
},
{
"category": "external",
"summary": "1190584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190584"
},
{
"category": "external",
"summary": "1190603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190603"
},
{
"category": "external",
"summary": "1190667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190667"
},
{
"category": "external",
"summary": "1190672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190672"
},
{
"category": "external",
"summary": "1190852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190852"
},
{
"category": "external",
"summary": "1190855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190855"
},
{
"category": "external",
"summary": "1191197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191197"
},
{
"category": "external",
"summary": "1191279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191279"
},
{
"category": "external",
"summary": "1191468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191468"
},
{
"category": "external",
"summary": "1191489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191489"
},
{
"category": "external",
"summary": "1191496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191496"
},
{
"category": "external",
"summary": "1191585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191585"
},
{
"category": "external",
"summary": "1192039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192039"
},
{
"category": "external",
"summary": "1192198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192198"
},
{
"category": "external",
"summary": "1192223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192223"
},
{
"category": "external",
"summary": "1192409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192409"
},
{
"category": "external",
"summary": "1192518",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192518"
},
{
"category": "external",
"summary": "1192562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192562"
},
{
"category": "external",
"summary": "1193183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193183"
},
{
"category": "external",
"summary": "1193522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193522"
},
{
"category": "external",
"summary": "1193615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193615"
},
{
"category": "external",
"summary": "1193847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193847"
},
{
"category": "external",
"summary": "1194223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194223"
},
{
"category": "external",
"summary": "1194242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194242"
},
{
"category": "external",
"summary": "1194319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194319"
},
{
"category": "external",
"summary": "1194479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194479"
},
{
"category": "external",
"summary": "1195407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195407"
},
{
"category": "external",
"summary": "1195754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195754"
},
{
"category": "external",
"summary": "1195832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195832"
},
{
"category": "external",
"summary": "1195877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195877"
},
{
"category": "external",
"summary": "1196369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196369"
},
{
"category": "external",
"summary": "1196384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196384"
},
{
"category": "external",
"summary": "1196851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196851"
},
{
"category": "external",
"summary": "1196852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196852"
},
{
"category": "external",
"summary": "1197067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197067"
},
{
"category": "external",
"summary": "1198111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198111"
},
{
"category": "external",
"summary": "1198594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198594"
},
{
"category": "external",
"summary": "1198735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198735"
},
{
"category": "external",
"summary": "1198814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198814"
},
{
"category": "external",
"summary": "1198867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198867"
},
{
"category": "external",
"summary": "1199240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199240"
},
{
"category": "external",
"summary": "1199915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199915"
},
{
"category": "external",
"summary": "1200424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200424"
},
{
"category": "external",
"summary": "1200601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200601"
},
{
"category": "external",
"summary": "1200757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200757"
},
{
"category": "external",
"summary": "1200783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200783"
},
{
"category": "external",
"summary": "1200854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200854"
},
{
"category": "external",
"summary": "1200925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200925"
},
{
"category": "external",
"summary": "1201092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201092"
},
{
"category": "external",
"summary": "1201093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201093"
},
{
"category": "external",
"summary": "1201097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201097"
},
{
"category": "external",
"summary": "1201132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201132"
},
{
"category": "external",
"summary": "1201137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201137"
},
{
"category": "external",
"summary": "1201140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201140"
},
{
"category": "external",
"summary": "1201378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201378"
},
{
"category": "external",
"summary": "1201383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201383"
},
{
"category": "external",
"summary": "1201531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201531"
},
{
"category": "external",
"summary": "1201684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201684"
},
{
"category": "external",
"summary": "1201716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201716"
},
{
"category": "external",
"summary": "1201720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201720"
},
{
"category": "external",
"summary": "1201751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201751"
},
{
"category": "external",
"summary": "1201771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201771"
},
{
"category": "external",
"summary": "1201883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201883"
},
{
"category": "external",
"summary": "1201920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201920"
},
{
"category": "external",
"summary": "1201932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201932"
},
{
"category": "external",
"summary": "1202195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202195"
},
{
"category": "external",
"summary": "1202216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202216"
},
{
"category": "external",
"summary": "1202229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202229"
},
{
"category": "external",
"summary": "1202394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202394"
},
{
"category": "external",
"summary": "1202412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202412"
},
{
"category": "external",
"summary": "1202415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202415"
},
{
"category": "external",
"summary": "1202427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202427"
},
{
"category": "external",
"summary": "1202465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202465"
},
{
"category": "external",
"summary": "1202478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202478"
},
{
"category": "external",
"summary": "1202491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202491"
},
{
"category": "external",
"summary": "1202543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202543"
},
{
"category": "external",
"summary": "1202648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202648"
},
{
"category": "external",
"summary": "1202655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202655"
},
{
"category": "external",
"summary": "1202660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202660"
},
{
"category": "external",
"summary": "1202681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202681"
},
{
"category": "external",
"summary": "1202816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202816"
},
{
"category": "external",
"summary": "1203003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203003"
},
{
"category": "external",
"summary": "1203168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203168"
},
{
"category": "external",
"summary": "1203184",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203184"
},
{
"category": "external",
"summary": "1203207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203207"
},
{
"category": "external",
"summary": "1203301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203301"
},
{
"category": "external",
"summary": "1203426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203426"
},
{
"category": "external",
"summary": "1203442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203442"
},
{
"category": "external",
"summary": "1203547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203547"
},
{
"category": "external",
"summary": "1203713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203713"
},
{
"category": "external",
"summary": "1204115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204115"
},
{
"category": "external",
"summary": "1204117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204117"
},
{
"category": "external",
"summary": "1204125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204125"
},
{
"category": "external",
"summary": "1204232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204232"
},
{
"category": "external",
"summary": "1204252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204252"
},
{
"category": "external",
"summary": "1204548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204548"
},
{
"category": "external",
"summary": "1204599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204599"
},
{
"category": "external",
"summary": "1204629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204629"
},
{
"category": "external",
"summary": "1204635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204635"
},
{
"category": "external",
"summary": "1204899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204899"
},
{
"category": "external",
"summary": "1204912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204912"
},
{
"category": "external",
"summary": "1204943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204943"
},
{
"category": "external",
"summary": "1205137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205137"
},
{
"category": "external",
"summary": "1205213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205213"
},
{
"category": "external",
"summary": "1205235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205235"
},
{
"category": "external",
"summary": "1205247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205247"
},
{
"category": "external",
"summary": "1205347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205347"
},
{
"category": "external",
"summary": "1205386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205386"
},
{
"category": "external",
"summary": "1205407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205407"
},
{
"category": "external",
"summary": "1205453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205453"
},
{
"category": "external",
"summary": "1205496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205496"
},
{
"category": "external",
"summary": "1205779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205779"
},
{
"category": "external",
"summary": "1205898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205898"
},
{
"category": "external",
"summary": "1205918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205918"
},
{
"category": "external",
"summary": "1205919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205919"
},
{
"category": "external",
"summary": "1205920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205920"
},
{
"category": "external",
"summary": "1206016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206016"
},
{
"category": "external",
"summary": "1206022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206022"
},
{
"category": "external",
"summary": "1206023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206023"
},
{
"category": "external",
"summary": "1206028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206028"
},
{
"category": "external",
"summary": "1206122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206122"
},
{
"category": "external",
"summary": "1206124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206124"
},
{
"category": "external",
"summary": "1206141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206141"
},
{
"category": "external",
"summary": "1206142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206142"
},
{
"category": "external",
"summary": "1206204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206204"
},
{
"category": "external",
"summary": "1206263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206263"
},
{
"category": "external",
"summary": "1206662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206662"
},
{
"category": "external",
"summary": "1206672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206672"
},
{
"category": "external",
"summary": "1206675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206675"
},
{
"category": "external",
"summary": "1206687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206687"
},
{
"category": "external",
"summary": "1206727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206727"
},
{
"category": "external",
"summary": "1206729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206729"
},
{
"category": "external",
"summary": "1207018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207018"
},
{
"category": "external",
"summary": "1207112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207112"
},
{
"category": "external",
"summary": "1207209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207209"
},
{
"category": "external",
"summary": "1207259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207259"
},
{
"category": "external",
"summary": "1207298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207298"
},
{
"category": "external",
"summary": "1207313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207313"
},
{
"category": "external",
"summary": "1207631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207631"
},
{
"category": "external",
"summary": "1207641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207641"
},
{
"category": "external",
"summary": "1207788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207788"
},
{
"category": "external",
"summary": "1207842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207842"
},
{
"category": "external",
"summary": "1207859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207859"
},
{
"category": "external",
"summary": "1207865",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207865"
},
{
"category": "external",
"summary": "1207895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207895"
},
{
"category": "external",
"summary": "1208129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208129"
},
{
"category": "external",
"summary": "1208152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208152"
},
{
"category": "external",
"summary": "1208258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208258"
},
{
"category": "external",
"summary": "1208642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208642"
},
{
"category": "external",
"summary": "1208698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208698"
},
{
"category": "external",
"summary": "1208852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208852"
},
{
"category": "external",
"summary": "1209015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209015"
},
{
"category": "external",
"summary": "1209262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209262"
},
{
"category": "external",
"summary": "1209421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209421"
},
{
"category": "external",
"summary": "1209557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209557"
},
{
"category": "external",
"summary": "1209629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209629"
},
{
"category": "external",
"summary": "1209641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209641"
},
{
"category": "external",
"summary": "1209642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209642"
},
{
"category": "external",
"summary": "1209711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209711"
},
{
"category": "external",
"summary": "1209756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209756"
},
{
"category": "external",
"summary": "1209847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209847"
},
{
"category": "external",
"summary": "1209945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209945"
},
{
"category": "external",
"summary": "1210089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210089"
},
{
"category": "external",
"summary": "1210094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210094"
},
{
"category": "external",
"summary": "1210277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210277"
},
{
"category": "external",
"summary": "1210376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210376"
},
{
"category": "external",
"summary": "1210385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210385"
},
{
"category": "external",
"summary": "1210507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210507"
},
{
"category": "external",
"summary": "1210761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210761"
},
{
"category": "external",
"summary": "1211121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211121"
},
{
"category": "external",
"summary": "1211125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211125"
},
{
"category": "external",
"summary": "1211209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211209"
},
{
"category": "external",
"summary": "1211241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211241"
},
{
"category": "external",
"summary": "1211249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211249"
},
{
"category": "external",
"summary": "1211306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211306"
},
{
"category": "external",
"summary": "1211308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211308"
},
{
"category": "external",
"summary": "1211364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211364"
},
{
"category": "external",
"summary": "1211385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211385"
},
{
"category": "external",
"summary": "1211392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211392"
},
{
"category": "external",
"summary": "1211409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211409"
},
{
"category": "external",
"summary": "1211410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211410"
},
{
"category": "external",
"summary": "1211489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211489"
},
{
"category": "external",
"summary": "1211553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211553"
},
{
"category": "external",
"summary": "1211592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211592"
},
{
"category": "external",
"summary": "1211620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211620"
},
{
"category": "external",
"summary": "1211652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211652"
},
{
"category": "external",
"summary": "1211687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211687"
},
{
"category": "external",
"summary": "1211693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211693"
},
{
"category": "external",
"summary": "1212052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212052"
},
{
"category": "external",
"summary": "1212123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212123"
},
{
"category": "external",
"summary": "1212164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212164"
},
{
"category": "external",
"summary": "1212382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212382"
},
{
"category": "external",
"summary": "1212411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212411"
},
{
"category": "external",
"summary": "1212423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212423"
},
{
"category": "external",
"summary": "1212428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212428"
},
{
"category": "external",
"summary": "1212466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212466"
},
{
"category": "external",
"summary": "1212534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212534"
},
{
"category": "external",
"summary": "1212656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212656"
},
{
"category": "external",
"summary": "1212687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212687"
},
{
"category": "external",
"summary": "1212778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212778"
},
{
"category": "external",
"summary": "1213014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213014"
},
{
"category": "external",
"summary": "1213044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213044"
},
{
"category": "external",
"summary": "1213145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213145"
},
{
"category": "external",
"summary": "1213378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213378"
},
{
"category": "external",
"summary": "1213533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213533"
},
{
"category": "external",
"summary": "1213553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213553"
},
{
"category": "external",
"summary": "1213570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213570"
},
{
"category": "external",
"summary": "1213853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213853"
},
{
"category": "external",
"summary": "1213863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213863"
},
{
"category": "external",
"summary": "1213874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213874"
},
{
"category": "external",
"summary": "1213939",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213939"
},
{
"category": "external",
"summary": "1214005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214005"
},
{
"category": "external",
"summary": "1214012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214012"
},
{
"category": "external",
"summary": "1214081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214081"
},
{
"category": "external",
"summary": "1214204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214204"
},
{
"category": "external",
"summary": "1214543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214543"
},
{
"category": "external",
"summary": "1214680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214680"
},
{
"category": "external",
"summary": "1214690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214690"
},
{
"category": "external",
"summary": "1214725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214725"
},
{
"category": "external",
"summary": "1214776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214776"
},
{
"category": "external",
"summary": "1214833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214833"
},
{
"category": "external",
"summary": "1214925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214925"
},
{
"category": "external",
"summary": "1215216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215216"
},
{
"category": "external",
"summary": "1215272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215272"
},
{
"category": "external",
"summary": "1215285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215285"
},
{
"category": "external",
"summary": "1215566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215566"
},
{
"category": "external",
"summary": "1215615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215615"
},
{
"category": "external",
"summary": "1215812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215812"
},
{
"category": "external",
"summary": "1216005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216005"
},
{
"category": "external",
"summary": "1216157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216157"
},
{
"category": "external",
"summary": "1216209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216209"
},
{
"category": "external",
"summary": "1216210",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216210"
},
{
"category": "external",
"summary": "1216222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216222"
},
{
"category": "external",
"summary": "1216224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216224"
},
{
"category": "external",
"summary": "1216969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216969"
},
{
"category": "external",
"summary": "1216978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216978"
},
{
"category": "external",
"summary": "1217161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217161"
},
{
"category": "external",
"summary": "1217195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217195"
},
{
"category": "external",
"summary": "1217216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217216"
},
{
"category": "external",
"summary": "1217253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217253"
},
{
"category": "external",
"summary": "1217257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217257"
},
{
"category": "external",
"summary": "1217262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217262"
},
{
"category": "external",
"summary": "1217324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217324"
},
{
"category": "external",
"summary": "1217336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217336"
},
{
"category": "external",
"summary": "1217348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217348"
},
{
"category": "external",
"summary": "1217391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217391"
},
{
"category": "external",
"summary": "1217394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217394"
},
{
"category": "external",
"summary": "1217532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217532"
},
{
"category": "external",
"summary": "1217597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217597"
},
{
"category": "external",
"summary": "1217601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217601"
},
{
"category": "external",
"summary": "1217637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217637"
},
{
"category": "external",
"summary": "1217812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217812"
},
{
"category": "external",
"summary": "1217818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217818"
},
{
"category": "external",
"summary": "1218406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218406"
},
{
"category": "external",
"summary": "1218429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218429"
},
{
"category": "external",
"summary": "1218436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218436"
},
{
"category": "external",
"summary": "1218441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218441"
},
{
"category": "external",
"summary": "1218607",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218607"
},
{
"category": "external",
"summary": "1218786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218786"
},
{
"category": "external",
"summary": "1218944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218944"
},
{
"category": "external",
"summary": "1219019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219019"
},
{
"category": "external",
"summary": "1219098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219098"
},
{
"category": "external",
"summary": "1219171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219171"
},
{
"category": "external",
"summary": "1219329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219329"
},
{
"category": "external",
"summary": "1219439",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219439"
},
{
"category": "external",
"summary": "1219614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219614"
},
{
"category": "external",
"summary": "1219642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219642"
},
{
"category": "external",
"summary": "1220383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220383"
},
{
"category": "external",
"summary": "1220516",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220516"
},
{
"category": "external",
"summary": "1220882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220882"
},
{
"category": "external",
"summary": "1220901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220901"
},
{
"category": "external",
"summary": "1221299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221299"
},
{
"category": "external",
"summary": "1221324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221324"
},
{
"category": "external",
"summary": "1221366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221366"
},
{
"category": "external",
"summary": "1221479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221479"
},
{
"category": "external",
"summary": "1221510",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221510"
},
{
"category": "external",
"summary": "1221716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221716"
},
{
"category": "external",
"summary": "1222035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222035"
},
{
"category": "external",
"summary": "1222138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222138"
},
{
"category": "external",
"summary": "1222615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222615"
},
{
"category": "external",
"summary": "1222616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222616"
},
{
"category": "external",
"summary": "1223042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223042"
},
{
"category": "external",
"summary": "1223835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223835"
},
{
"category": "external",
"summary": "1223934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223934"
},
{
"category": "external",
"summary": "1225173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225173"
},
{
"category": "external",
"summary": "1225178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225178"
},
{
"category": "external",
"summary": "1225205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225205"
},
{
"category": "external",
"summary": "1225377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225377"
},
{
"category": "external",
"summary": "1225662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225662"
},
{
"category": "external",
"summary": "1226428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1226428"
},
{
"category": "external",
"summary": "1227441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227441"
},
{
"category": "external",
"summary": "1228407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhba-2015_1100.json"
}
],
"title": "Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update",
"tracking": {
"current_release_date": "2024-12-07T03:41:34+00:00",
"generator": {
"date": "2024-12-07T03:41:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHBA-2015:1100",
"initial_release_date": "2015-06-16T12:28:42+00:00",
"revision_history": [
{
"date": "2015-06-16T12:28:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-06-16T12:28:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-07T03:41:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CloudForms Management Engine 5.4",
"product": {
"name": "CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cloudforms_managementengine:5::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat CloudForms"
},
{
"branches": [
{
"category": "product_version",
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-desktop@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-debuginfo@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-devel@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product": {
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product_id": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma@0.5.3-7.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product": {
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product_id": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma-debuginfo@0.5.3-7.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-debuginfo@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-progs@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-devel@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prince-0:9.0r2-4.el6cf.x86_64",
"product": {
"name": "prince-0:9.0r2-4.el6cf.x86_64",
"product_id": "prince-0:9.0r2-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prince@9.0r2-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product_id": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk@4.0P1-3.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product": {
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product_id": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk-devel@4.0P1-3.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product": {
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product_id": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin-debuginfo@1.0.0-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product_id": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin@1.0.0-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw-debuginfo@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw-gui@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging@0.20.2-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging-debuginfo@0.20.2-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product": {
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product_id": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi-debuginfo@1.3.14-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wmi-0:1.3.14-1.el6cf.x86_64",
"product": {
"name": "wmi-0:1.3.14-1.el6cf.x86_64",
"product_id": "wmi-0:1.3.14-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi@1.3.14-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg-debuginfo@0.12.2-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg@0.12.2-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine-debuginfo@1.0.7-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine@1.0.7-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json-debuginfo@1.8.2-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json@1.8.2-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri-debuginfo@1.5.11-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri@1.5.11-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby@3.0.1-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby-debuginfo@3.0.1-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra-debuginfo@1.2.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra@1.2.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych-debuginfo@2.0.13-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych@2.0.13-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi@1.9.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi-debuginfo@1.9.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin-debuginfo@1.3.1-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin@1.3.1-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer@0.11.0-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer-debuginfo@0.11.0-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-lib@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-debuginfo@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.4.0.5-1.el6cf?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product_id": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools@9.2.3-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "sneakernet_ca-0:0.1-2.el6cf.src",
"product": {
"name": "sneakernet_ca-0:0.1-2.el6cf.src",
"product_id": "sneakernet_ca-0:0.1-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sneakernet_ca@0.1-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-0:0.5.3-7.el6cf.src",
"product": {
"name": "pyliblzma-0:0.5.3-7.el6cf.src",
"product_id": "pyliblzma-0:0.5.3-7.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma@0.5.3-7.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "libdnet-0:1.12-11.el6cf.src",
"product": {
"name": "libdnet-0:1.12-11.el6cf.src",
"product_id": "libdnet-0:1.12-11.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet@1.12-11.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "prince-0:9.0r2-4.el6cf.src",
"product": {
"name": "prince-0:9.0r2-4.el6cf.src",
"product_id": "prince-0:9.0r2-4.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prince@9.0r2-4.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product_id": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk@4.0P1-3.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product_id": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin@1.0.0-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "lshw-0:B.02.16-4.el6cf.src",
"product": {
"name": "lshw-0:B.02.16-4.el6cf.src",
"product_id": "lshw-0:B.02.16-4.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw@B.02.16-4.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product_id": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging@0.20.2-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "wmi-0:1.3.14-1.el6cf.src",
"product": {
"name": "wmi-0:1.3.14-1.el6cf.src",
"product_id": "wmi-0:1.3.14-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi@1.3.14-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product_id": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg@0.12.2-9.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product_id": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine@1.0.7-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product_id": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json@1.8.2-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product_id": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri@1.5.11-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product_id": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby@3.0.1-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product_id": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra@1.2.8-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product_id": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych@2.0.13-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product_id": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi@1.9.8-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product_id": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin@1.3.1-9.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product_id": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer@0.11.0-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.4.0.5-1.el6cf.src",
"product": {
"name": "cfme-0:5.4.0.5-1.el6cf.src",
"product_id": "cfme-0:5.4.0.5-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.4.0.5-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product_id": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.4.0.5-1.el6cf?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product": {
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product_id": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sneakernet_ca@0.1-2.el6cf?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.4.0.5-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src"
},
"product_reference": "cfme-0:5.4.0.5-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src"
},
"product_reference": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src"
},
"product_reference": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64"
},
"product_reference": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64"
},
"product_reference": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-0:1.12-11.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src"
},
"product_reference": "libdnet-0:1.12-11.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-0:B.02.16-4.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src"
},
"product_reference": "lshw-0:B.02.16-4.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src"
},
"product_reference": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64"
},
"product_reference": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64"
},
"product_reference": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src"
},
"product_reference": "open-vm-tools-0:9.2.3-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prince-0:9.0r2-4.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src"
},
"product_reference": "prince-0:9.0r2-4.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prince-0:9.0r2-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64"
},
"product_reference": "prince-0:9.0r2-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-0:0.5.3-7.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src"
},
"product_reference": "pyliblzma-0:0.5.3-7.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64"
},
"product_reference": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64"
},
"product_reference": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src"
},
"product_reference": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src"
},
"product_reference": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src"
},
"product_reference": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src"
},
"product_reference": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch"
},
"product_reference": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sneakernet_ca-0:0.1-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src"
},
"product_reference": "sneakernet_ca-0:0.1-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-0:1.3.14-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src"
},
"product_reference": "wmi-0:1.3.14-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-0:1.3.14-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64"
},
"product_reference": "wmi-0:1.3.14-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
},
"product_reference": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ruby on Rails project"
]
},
{
"names": [
"Aaron Neyer"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-4389",
"cwe": {
"id": "CWE-134",
"name": "Use of Externally-Controlled Format String"
},
"discovery_date": "2013-09-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1013913"
}
],
"notes": [
{
"category": "description",
"text": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-actionmailer: email address processing DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue did not affect the versions of rubygem-actionmailer as shipped with Red Hat Subscription Asset Manager 1 as they do not include support for sending email using user supplied addresses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4389"
},
{
"category": "external",
"summary": "RHBZ#1013913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1013913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
}
],
"release_date": "2013-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-actionmailer: email address processing DoS"
},
{
"cve": "CVE-2013-4492",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1039435"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-i18n: cross-site scripting flaw in exception handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4492"
},
{
"category": "external",
"summary": "RHBZ#1039435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4492"
}
],
"release_date": "2013-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-i18n: cross-site scripting flaw in exception handling"
},
{
"acknowledgments": [
{
"names": [
"Ruby on Rails project"
]
}
],
"cve": "CVE-2014-7819",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2014-10-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1161527"
}
],
"notes": [
{
"category": "description",
"text": "Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-sprockets: arbitrary file existence disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-7819"
},
{
"category": "external",
"summary": "RHBZ#1161527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161527"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-7819",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7819"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY",
"url": "https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY"
}
],
"release_date": "2014-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-sprockets: arbitrary file existence disclosure"
},
{
"cve": "CVE-2015-1820",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2015-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1205291"
}
],
"notes": [
{
"category": "description",
"text": "REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "With the release of Satellite 6.9 available, this bug is being closed as wontfix as all parts of our Ruby stack are running under the SCL now with rest-client.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-1820"
},
{
"category": "external",
"summary": "RHBZ#1205291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1820"
}
],
"release_date": "2015-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses"
},
{
"cve": "CVE-2015-3448",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2015-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1240982"
}
],
"notes": [
{
"category": "description",
"text": "REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-rest-client: unsanitized application logging",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-3448"
},
{
"category": "external",
"summary": "RHBZ#1240982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240982"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-3448",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3448"
}
],
"release_date": "2015-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "workaround",
"details": "The permissions on log files can be changed, e.g. using \"chmod o-rwx\" to prevent anyone but the user and group owner of the file from reading it. Additionally the group permissions can also be removed, e.g. \"chmod g-rwx\" if only the user owning the file should be able to see it.",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-rest-client: unsanitized application logging"
}
]
}
RHBA-2015:1100
Vulnerability from csaf_redhat - Published: 2015-06-16 12:28 - Updated: 2026-05-13 01:49Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
|
REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: 6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated cfme packages that fix several bugs, and add various enhancements are now available for Red Hat CloudForms 3.2.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat CloudForms Management Engine delivers the insight, control, and\nautomation needed to address the challenges of managing virtual\nenvironments. CloudForms Management Engine is built on Ruby on Rails, a\nmodel-view-controller (MVC) framework for web application development.\nAction Pack implements the controller and the view components.\n\nThis update also fixes several bugs and adds various enhancements.\nDocumentation for these changes is available in the Release Notes and Technical Notes documents linked to in the References section.\n\nAll cfme users are advised to upgrade to these updated packages, which\ncorrect these issues and add these enhancements.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHBA-2015:1100",
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-US/Red_Hat_CloudForms/3.2/html/Release_Notes/index.html",
"url": "https://access.redhat.com/documentation/en-US/Red_Hat_CloudForms/3.2/html/Release_Notes/index.html"
},
{
"category": "external",
"summary": "1146178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146178"
},
{
"category": "external",
"summary": "1160890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1160890"
},
{
"category": "external",
"summary": "1161248",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161248"
},
{
"category": "external",
"summary": "1161253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161253"
},
{
"category": "external",
"summary": "1161322",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161322"
},
{
"category": "external",
"summary": "1161701",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161701"
},
{
"category": "external",
"summary": "1161744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161744"
},
{
"category": "external",
"summary": "1163382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163382"
},
{
"category": "external",
"summary": "1163465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163465"
},
{
"category": "external",
"summary": "1163468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163468"
},
{
"category": "external",
"summary": "1163469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163469"
},
{
"category": "external",
"summary": "1163472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163472"
},
{
"category": "external",
"summary": "1163661",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163661"
},
{
"category": "external",
"summary": "1163952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163952"
},
{
"category": "external",
"summary": "1163978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1163978"
},
{
"category": "external",
"summary": "1164033",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164033"
},
{
"category": "external",
"summary": "1164386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164386"
},
{
"category": "external",
"summary": "1164764",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1164764"
},
{
"category": "external",
"summary": "1166187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166187"
},
{
"category": "external",
"summary": "1166198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166198"
},
{
"category": "external",
"summary": "1166303",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166303"
},
{
"category": "external",
"summary": "1166328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166328"
},
{
"category": "external",
"summary": "1166861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166861"
},
{
"category": "external",
"summary": "1167110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167110"
},
{
"category": "external",
"summary": "1167308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167308"
},
{
"category": "external",
"summary": "1167410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167410"
},
{
"category": "external",
"summary": "1168337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168337"
},
{
"category": "external",
"summary": "1168345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1168345"
},
{
"category": "external",
"summary": "1169351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169351"
},
{
"category": "external",
"summary": "1169502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169502"
},
{
"category": "external",
"summary": "1169930",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169930"
},
{
"category": "external",
"summary": "1169937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169937"
},
{
"category": "external",
"summary": "1170319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170319"
},
{
"category": "external",
"summary": "1170358",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170358"
},
{
"category": "external",
"summary": "1170813",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1170813"
},
{
"category": "external",
"summary": "1171167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171167"
},
{
"category": "external",
"summary": "1171286",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171286"
},
{
"category": "external",
"summary": "1171577",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171577"
},
{
"category": "external",
"summary": "1171589",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171589"
},
{
"category": "external",
"summary": "1171738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171738"
},
{
"category": "external",
"summary": "1171780",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171780"
},
{
"category": "external",
"summary": "1172298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172298"
},
{
"category": "external",
"summary": "1173213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173213"
},
{
"category": "external",
"summary": "1173216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173216"
},
{
"category": "external",
"summary": "1173251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173251"
},
{
"category": "external",
"summary": "1173336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173336"
},
{
"category": "external",
"summary": "1173712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1173712"
},
{
"category": "external",
"summary": "1174855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174855"
},
{
"category": "external",
"summary": "1174881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1174881"
},
{
"category": "external",
"summary": "1176280",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176280"
},
{
"category": "external",
"summary": "1176619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176619"
},
{
"category": "external",
"summary": "1176689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176689"
},
{
"category": "external",
"summary": "1176721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1176721"
},
{
"category": "external",
"summary": "1177015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177015"
},
{
"category": "external",
"summary": "1177809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1177809"
},
{
"category": "external",
"summary": "1178078",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178078"
},
{
"category": "external",
"summary": "1178697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178697"
},
{
"category": "external",
"summary": "1178729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178729"
},
{
"category": "external",
"summary": "1179503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179503"
},
{
"category": "external",
"summary": "1179797",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179797"
},
{
"category": "external",
"summary": "1186502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186502"
},
{
"category": "external",
"summary": "1186911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186911"
},
{
"category": "external",
"summary": "1179807",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179807"
},
{
"category": "external",
"summary": "1179907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179907"
},
{
"category": "external",
"summary": "1179908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179908"
},
{
"category": "external",
"summary": "1179958",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179958"
},
{
"category": "external",
"summary": "1180313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180313"
},
{
"category": "external",
"summary": "1180649",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180649"
},
{
"category": "external",
"summary": "1180746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180746"
},
{
"category": "external",
"summary": "1181429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181429"
},
{
"category": "external",
"summary": "1181768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1181768"
},
{
"category": "external",
"summary": "1182329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182329"
},
{
"category": "external",
"summary": "1182330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182330"
},
{
"category": "external",
"summary": "1182654",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182654"
},
{
"category": "external",
"summary": "1182795",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1182795"
},
{
"category": "external",
"summary": "1183757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183757"
},
{
"category": "external",
"summary": "1184250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184250"
},
{
"category": "external",
"summary": "1184267",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184267"
},
{
"category": "external",
"summary": "1184343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184343"
},
{
"category": "external",
"summary": "1184465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184465"
},
{
"category": "external",
"summary": "1184575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184575"
},
{
"category": "external",
"summary": "1184637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184637"
},
{
"category": "external",
"summary": "1184990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184990"
},
{
"category": "external",
"summary": "1185042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1185042"
},
{
"category": "external",
"summary": "1186364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186364"
},
{
"category": "external",
"summary": "1186413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186413"
},
{
"category": "external",
"summary": "1186485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1186485"
},
{
"category": "external",
"summary": "1187233",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187233"
},
{
"category": "external",
"summary": "1187836",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187836"
},
{
"category": "external",
"summary": "1188401",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188401"
},
{
"category": "external",
"summary": "1188427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188427"
},
{
"category": "external",
"summary": "1188436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188436"
},
{
"category": "external",
"summary": "1188585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188585"
},
{
"category": "external",
"summary": "1188597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188597"
},
{
"category": "external",
"summary": "1188798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1188798"
},
{
"category": "external",
"summary": "1190054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190054"
},
{
"category": "external",
"summary": "1190211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190211"
},
{
"category": "external",
"summary": "1190260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190260"
},
{
"category": "external",
"summary": "1190293",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190293"
},
{
"category": "external",
"summary": "1190564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190564"
},
{
"category": "external",
"summary": "1190565",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190565"
},
{
"category": "external",
"summary": "1190584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190584"
},
{
"category": "external",
"summary": "1190603",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190603"
},
{
"category": "external",
"summary": "1190667",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190667"
},
{
"category": "external",
"summary": "1190672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190672"
},
{
"category": "external",
"summary": "1190852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190852"
},
{
"category": "external",
"summary": "1190855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190855"
},
{
"category": "external",
"summary": "1191197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191197"
},
{
"category": "external",
"summary": "1191279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191279"
},
{
"category": "external",
"summary": "1191468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191468"
},
{
"category": "external",
"summary": "1191489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191489"
},
{
"category": "external",
"summary": "1191496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191496"
},
{
"category": "external",
"summary": "1191585",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191585"
},
{
"category": "external",
"summary": "1192039",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192039"
},
{
"category": "external",
"summary": "1192198",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192198"
},
{
"category": "external",
"summary": "1192223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192223"
},
{
"category": "external",
"summary": "1192409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192409"
},
{
"category": "external",
"summary": "1192518",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192518"
},
{
"category": "external",
"summary": "1192562",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192562"
},
{
"category": "external",
"summary": "1193183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193183"
},
{
"category": "external",
"summary": "1193522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193522"
},
{
"category": "external",
"summary": "1193615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193615"
},
{
"category": "external",
"summary": "1193847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193847"
},
{
"category": "external",
"summary": "1194223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194223"
},
{
"category": "external",
"summary": "1194242",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194242"
},
{
"category": "external",
"summary": "1194319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194319"
},
{
"category": "external",
"summary": "1194479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194479"
},
{
"category": "external",
"summary": "1195407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195407"
},
{
"category": "external",
"summary": "1198814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198814"
},
{
"category": "external",
"summary": "1195754",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195754"
},
{
"category": "external",
"summary": "1195832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195832"
},
{
"category": "external",
"summary": "1195877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1195877"
},
{
"category": "external",
"summary": "1196369",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196369"
},
{
"category": "external",
"summary": "1196384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196384"
},
{
"category": "external",
"summary": "1196851",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196851"
},
{
"category": "external",
"summary": "1196852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196852"
},
{
"category": "external",
"summary": "1197067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1197067"
},
{
"category": "external",
"summary": "1198111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198111"
},
{
"category": "external",
"summary": "1198594",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198594"
},
{
"category": "external",
"summary": "1198735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198735"
},
{
"category": "external",
"summary": "1198867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1198867"
},
{
"category": "external",
"summary": "1199240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199240"
},
{
"category": "external",
"summary": "1199915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199915"
},
{
"category": "external",
"summary": "1200424",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200424"
},
{
"category": "external",
"summary": "1200601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200601"
},
{
"category": "external",
"summary": "1200757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200757"
},
{
"category": "external",
"summary": "1200783",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200783"
},
{
"category": "external",
"summary": "1200854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200854"
},
{
"category": "external",
"summary": "1200925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1200925"
},
{
"category": "external",
"summary": "1201092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201092"
},
{
"category": "external",
"summary": "1201093",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201093"
},
{
"category": "external",
"summary": "1201097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201097"
},
{
"category": "external",
"summary": "1201132",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201132"
},
{
"category": "external",
"summary": "1201137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201137"
},
{
"category": "external",
"summary": "1201140",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201140"
},
{
"category": "external",
"summary": "1201378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201378"
},
{
"category": "external",
"summary": "1201383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201383"
},
{
"category": "external",
"summary": "1201531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201531"
},
{
"category": "external",
"summary": "1201684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201684"
},
{
"category": "external",
"summary": "1201716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201716"
},
{
"category": "external",
"summary": "1201720",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201720"
},
{
"category": "external",
"summary": "1201751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201751"
},
{
"category": "external",
"summary": "1201771",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201771"
},
{
"category": "external",
"summary": "1201883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201883"
},
{
"category": "external",
"summary": "1201920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201920"
},
{
"category": "external",
"summary": "1201932",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1201932"
},
{
"category": "external",
"summary": "1202195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202195"
},
{
"category": "external",
"summary": "1202216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202216"
},
{
"category": "external",
"summary": "1202229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202229"
},
{
"category": "external",
"summary": "1202394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202394"
},
{
"category": "external",
"summary": "1202412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202412"
},
{
"category": "external",
"summary": "1202415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202415"
},
{
"category": "external",
"summary": "1202427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202427"
},
{
"category": "external",
"summary": "1202465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202465"
},
{
"category": "external",
"summary": "1202478",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202478"
},
{
"category": "external",
"summary": "1202491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202491"
},
{
"category": "external",
"summary": "1202543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202543"
},
{
"category": "external",
"summary": "1202648",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202648"
},
{
"category": "external",
"summary": "1202655",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202655"
},
{
"category": "external",
"summary": "1202660",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202660"
},
{
"category": "external",
"summary": "1202681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202681"
},
{
"category": "external",
"summary": "1202816",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1202816"
},
{
"category": "external",
"summary": "1203003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203003"
},
{
"category": "external",
"summary": "1203168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203168"
},
{
"category": "external",
"summary": "1203184",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203184"
},
{
"category": "external",
"summary": "1203207",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203207"
},
{
"category": "external",
"summary": "1203301",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203301"
},
{
"category": "external",
"summary": "1203426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203426"
},
{
"category": "external",
"summary": "1203442",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203442"
},
{
"category": "external",
"summary": "1203547",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203547"
},
{
"category": "external",
"summary": "1203713",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203713"
},
{
"category": "external",
"summary": "1204115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204115"
},
{
"category": "external",
"summary": "1204117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204117"
},
{
"category": "external",
"summary": "1204125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204125"
},
{
"category": "external",
"summary": "1204232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204232"
},
{
"category": "external",
"summary": "1204252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204252"
},
{
"category": "external",
"summary": "1204548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204548"
},
{
"category": "external",
"summary": "1204599",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204599"
},
{
"category": "external",
"summary": "1204629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204629"
},
{
"category": "external",
"summary": "1204635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204635"
},
{
"category": "external",
"summary": "1204899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204899"
},
{
"category": "external",
"summary": "1204912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204912"
},
{
"category": "external",
"summary": "1204943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1204943"
},
{
"category": "external",
"summary": "1205137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205137"
},
{
"category": "external",
"summary": "1205213",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205213"
},
{
"category": "external",
"summary": "1205235",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205235"
},
{
"category": "external",
"summary": "1205247",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205247"
},
{
"category": "external",
"summary": "1205347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205347"
},
{
"category": "external",
"summary": "1205386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205386"
},
{
"category": "external",
"summary": "1205407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205407"
},
{
"category": "external",
"summary": "1205453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205453"
},
{
"category": "external",
"summary": "1205496",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205496"
},
{
"category": "external",
"summary": "1205779",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205779"
},
{
"category": "external",
"summary": "1205898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205898"
},
{
"category": "external",
"summary": "1205918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205918"
},
{
"category": "external",
"summary": "1205919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205919"
},
{
"category": "external",
"summary": "1205920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205920"
},
{
"category": "external",
"summary": "1206016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206016"
},
{
"category": "external",
"summary": "1206022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206022"
},
{
"category": "external",
"summary": "1206023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206023"
},
{
"category": "external",
"summary": "1206028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206028"
},
{
"category": "external",
"summary": "1206122",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206122"
},
{
"category": "external",
"summary": "1206124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206124"
},
{
"category": "external",
"summary": "1206141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206141"
},
{
"category": "external",
"summary": "1206142",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206142"
},
{
"category": "external",
"summary": "1206204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206204"
},
{
"category": "external",
"summary": "1206263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206263"
},
{
"category": "external",
"summary": "1206662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206662"
},
{
"category": "external",
"summary": "1206672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206672"
},
{
"category": "external",
"summary": "1206675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206675"
},
{
"category": "external",
"summary": "1206687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206687"
},
{
"category": "external",
"summary": "1206727",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206727"
},
{
"category": "external",
"summary": "1206729",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206729"
},
{
"category": "external",
"summary": "1207018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207018"
},
{
"category": "external",
"summary": "1207112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207112"
},
{
"category": "external",
"summary": "1207209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207209"
},
{
"category": "external",
"summary": "1207259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207259"
},
{
"category": "external",
"summary": "1207298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207298"
},
{
"category": "external",
"summary": "1207313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207313"
},
{
"category": "external",
"summary": "1207631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207631"
},
{
"category": "external",
"summary": "1207641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207641"
},
{
"category": "external",
"summary": "1207788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207788"
},
{
"category": "external",
"summary": "1207842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207842"
},
{
"category": "external",
"summary": "1207859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207859"
},
{
"category": "external",
"summary": "1207865",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207865"
},
{
"category": "external",
"summary": "1207895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207895"
},
{
"category": "external",
"summary": "1208129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208129"
},
{
"category": "external",
"summary": "1208152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208152"
},
{
"category": "external",
"summary": "1208258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208258"
},
{
"category": "external",
"summary": "1208642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208642"
},
{
"category": "external",
"summary": "1208698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208698"
},
{
"category": "external",
"summary": "1208852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208852"
},
{
"category": "external",
"summary": "1209015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209015"
},
{
"category": "external",
"summary": "1209262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209262"
},
{
"category": "external",
"summary": "1209421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209421"
},
{
"category": "external",
"summary": "1209557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209557"
},
{
"category": "external",
"summary": "1209629",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209629"
},
{
"category": "external",
"summary": "1209641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209641"
},
{
"category": "external",
"summary": "1209642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209642"
},
{
"category": "external",
"summary": "1209711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209711"
},
{
"category": "external",
"summary": "1209756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209756"
},
{
"category": "external",
"summary": "1209847",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209847"
},
{
"category": "external",
"summary": "1209945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1209945"
},
{
"category": "external",
"summary": "1210089",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210089"
},
{
"category": "external",
"summary": "1210094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210094"
},
{
"category": "external",
"summary": "1210277",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210277"
},
{
"category": "external",
"summary": "1210376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210376"
},
{
"category": "external",
"summary": "1210385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210385"
},
{
"category": "external",
"summary": "1210507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210507"
},
{
"category": "external",
"summary": "1210761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210761"
},
{
"category": "external",
"summary": "1211121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211121"
},
{
"category": "external",
"summary": "1211125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211125"
},
{
"category": "external",
"summary": "1211209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211209"
},
{
"category": "external",
"summary": "1211241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211241"
},
{
"category": "external",
"summary": "1211249",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211249"
},
{
"category": "external",
"summary": "1211306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211306"
},
{
"category": "external",
"summary": "1211308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211308"
},
{
"category": "external",
"summary": "1211364",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211364"
},
{
"category": "external",
"summary": "1211385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211385"
},
{
"category": "external",
"summary": "1211392",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211392"
},
{
"category": "external",
"summary": "1212428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212428"
},
{
"category": "external",
"summary": "1211409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211409"
},
{
"category": "external",
"summary": "1211410",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211410"
},
{
"category": "external",
"summary": "1211489",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211489"
},
{
"category": "external",
"summary": "1211553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211553"
},
{
"category": "external",
"summary": "1211592",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211592"
},
{
"category": "external",
"summary": "1211620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211620"
},
{
"category": "external",
"summary": "1211652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211652"
},
{
"category": "external",
"summary": "1211687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211687"
},
{
"category": "external",
"summary": "1211693",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211693"
},
{
"category": "external",
"summary": "1212052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212052"
},
{
"category": "external",
"summary": "1212123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212123"
},
{
"category": "external",
"summary": "1212164",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212164"
},
{
"category": "external",
"summary": "1212382",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212382"
},
{
"category": "external",
"summary": "1212411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212411"
},
{
"category": "external",
"summary": "1212423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212423"
},
{
"category": "external",
"summary": "1212466",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212466"
},
{
"category": "external",
"summary": "1212534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212534"
},
{
"category": "external",
"summary": "1212656",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212656"
},
{
"category": "external",
"summary": "1212687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212687"
},
{
"category": "external",
"summary": "1212778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1212778"
},
{
"category": "external",
"summary": "1213014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213014"
},
{
"category": "external",
"summary": "1213044",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213044"
},
{
"category": "external",
"summary": "1213145",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213145"
},
{
"category": "external",
"summary": "1213378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213378"
},
{
"category": "external",
"summary": "1213533",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213533"
},
{
"category": "external",
"summary": "1213553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213553"
},
{
"category": "external",
"summary": "1213570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213570"
},
{
"category": "external",
"summary": "1213853",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213853"
},
{
"category": "external",
"summary": "1213863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213863"
},
{
"category": "external",
"summary": "1213874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213874"
},
{
"category": "external",
"summary": "1213939",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213939"
},
{
"category": "external",
"summary": "1214005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214005"
},
{
"category": "external",
"summary": "1214012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214012"
},
{
"category": "external",
"summary": "1214081",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214081"
},
{
"category": "external",
"summary": "1214204",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214204"
},
{
"category": "external",
"summary": "1214543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214543"
},
{
"category": "external",
"summary": "1214680",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214680"
},
{
"category": "external",
"summary": "1214690",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214690"
},
{
"category": "external",
"summary": "1214725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214725"
},
{
"category": "external",
"summary": "1214776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214776"
},
{
"category": "external",
"summary": "1214833",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214833"
},
{
"category": "external",
"summary": "1214925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1214925"
},
{
"category": "external",
"summary": "1215216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215216"
},
{
"category": "external",
"summary": "1215272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215272"
},
{
"category": "external",
"summary": "1215285",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215285"
},
{
"category": "external",
"summary": "1215566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215566"
},
{
"category": "external",
"summary": "1215615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215615"
},
{
"category": "external",
"summary": "1215812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1215812"
},
{
"category": "external",
"summary": "1216005",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216005"
},
{
"category": "external",
"summary": "1216157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216157"
},
{
"category": "external",
"summary": "1216209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216209"
},
{
"category": "external",
"summary": "1216210",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216210"
},
{
"category": "external",
"summary": "1216222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216222"
},
{
"category": "external",
"summary": "1216224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216224"
},
{
"category": "external",
"summary": "1216969",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216969"
},
{
"category": "external",
"summary": "1216978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1216978"
},
{
"category": "external",
"summary": "1217161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217161"
},
{
"category": "external",
"summary": "1217195",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217195"
},
{
"category": "external",
"summary": "1217216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217216"
},
{
"category": "external",
"summary": "1217253",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217253"
},
{
"category": "external",
"summary": "1217257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217257"
},
{
"category": "external",
"summary": "1217262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217262"
},
{
"category": "external",
"summary": "1217324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217324"
},
{
"category": "external",
"summary": "1217336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217336"
},
{
"category": "external",
"summary": "1217348",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217348"
},
{
"category": "external",
"summary": "1217391",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217391"
},
{
"category": "external",
"summary": "1217394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217394"
},
{
"category": "external",
"summary": "1217532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217532"
},
{
"category": "external",
"summary": "1217597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217597"
},
{
"category": "external",
"summary": "1217601",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217601"
},
{
"category": "external",
"summary": "1217637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217637"
},
{
"category": "external",
"summary": "1217812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217812"
},
{
"category": "external",
"summary": "1217818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217818"
},
{
"category": "external",
"summary": "1218406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218406"
},
{
"category": "external",
"summary": "1218429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218429"
},
{
"category": "external",
"summary": "1218436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218436"
},
{
"category": "external",
"summary": "1218441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218441"
},
{
"category": "external",
"summary": "1218607",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218607"
},
{
"category": "external",
"summary": "1218786",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218786"
},
{
"category": "external",
"summary": "1218944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218944"
},
{
"category": "external",
"summary": "1219019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219019"
},
{
"category": "external",
"summary": "1219098",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219098"
},
{
"category": "external",
"summary": "1219171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219171"
},
{
"category": "external",
"summary": "1219329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219329"
},
{
"category": "external",
"summary": "1219439",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219439"
},
{
"category": "external",
"summary": "1219614",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219614"
},
{
"category": "external",
"summary": "1219642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1219642"
},
{
"category": "external",
"summary": "1220383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220383"
},
{
"category": "external",
"summary": "1220516",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220516"
},
{
"category": "external",
"summary": "1220882",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220882"
},
{
"category": "external",
"summary": "1220901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220901"
},
{
"category": "external",
"summary": "1221299",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221299"
},
{
"category": "external",
"summary": "1221324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221324"
},
{
"category": "external",
"summary": "1221366",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221366"
},
{
"category": "external",
"summary": "1221479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221479"
},
{
"category": "external",
"summary": "1221510",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221510"
},
{
"category": "external",
"summary": "1221716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1221716"
},
{
"category": "external",
"summary": "1222035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222035"
},
{
"category": "external",
"summary": "1222138",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222138"
},
{
"category": "external",
"summary": "1222615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222615"
},
{
"category": "external",
"summary": "1222616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1222616"
},
{
"category": "external",
"summary": "1223042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223042"
},
{
"category": "external",
"summary": "1223835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223835"
},
{
"category": "external",
"summary": "1223934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223934"
},
{
"category": "external",
"summary": "1225173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225173"
},
{
"category": "external",
"summary": "1225178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225178"
},
{
"category": "external",
"summary": "1225205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225205"
},
{
"category": "external",
"summary": "1225377",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225377"
},
{
"category": "external",
"summary": "1225662",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1225662"
},
{
"category": "external",
"summary": "1226428",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1226428"
},
{
"category": "external",
"summary": "1227441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1227441"
},
{
"category": "external",
"summary": "1228407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1228407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhba-2015_1100.json"
}
],
"title": "Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update",
"tracking": {
"current_release_date": "2026-05-13T01:49:04+00:00",
"generator": {
"date": "2026-05-13T01:49:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHBA-2015:1100",
"initial_release_date": "2015-06-16T12:28:42+00:00",
"revision_history": [
{
"date": "2015-06-16T12:28:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2015-06-16T12:28:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-13T01:49:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "CloudForms Management Engine 5.4",
"product": {
"name": "CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cloudforms_managementengine:5::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat CloudForms"
},
{
"branches": [
{
"category": "product_version",
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-desktop@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-debuginfo@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product": {
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product_id": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools-devel@9.2.3-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product": {
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product_id": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma@0.5.3-7.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product": {
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product_id": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma-debuginfo@0.5.3-7.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-debuginfo@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-progs@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product": {
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product_id": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet-devel@1.12-11.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "prince-0:9.0r2-4.el6cf.x86_64",
"product": {
"name": "prince-0:9.0r2-4.el6cf.x86_64",
"product_id": "prince-0:9.0r2-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prince@9.0r2-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product_id": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk@4.0P1-3.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product": {
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product_id": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk-devel@4.0P1-3.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product": {
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product_id": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin-debuginfo@1.0.0-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product_id": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin@1.0.0-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw-debuginfo@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw-gui@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lshw-0:B.02.16-4.el6cf.x86_64",
"product": {
"name": "lshw-0:B.02.16-4.el6cf.x86_64",
"product_id": "lshw-0:B.02.16-4.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw@B.02.16-4.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging@0.20.2-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging-debuginfo@0.20.2-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product": {
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product_id": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi-debuginfo@1.3.14-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "wmi-0:1.3.14-1.el6cf.x86_64",
"product": {
"name": "wmi-0:1.3.14-1.el6cf.x86_64",
"product_id": "wmi-0:1.3.14-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi@1.3.14-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg-debuginfo@0.12.2-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg@0.12.2-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine-debuginfo@1.0.7-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine@1.0.7-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json-debuginfo@1.8.2-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json@1.8.2-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri-debuginfo@1.5.11-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri@1.5.11-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby@3.0.1-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product_id": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby-debuginfo@3.0.1-2.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra-debuginfo@1.2.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra@1.2.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych-debuginfo@2.0.13-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych@2.0.13-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi@1.9.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product_id": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi-debuginfo@1.9.8-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin-debuginfo@1.3.1-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product_id": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin@1.3.1-9.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer@0.11.0-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product": {
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product_id": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer-debuginfo@0.11.0-5.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-lib@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-debuginfo@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-appliance@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.4.0.5-1.el6cf?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product_id": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.4.0.5-1.el6cf?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product_id": "open-vm-tools-0:9.2.3-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/open-vm-tools@9.2.3-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "sneakernet_ca-0:0.1-2.el6cf.src",
"product": {
"name": "sneakernet_ca-0:0.1-2.el6cf.src",
"product_id": "sneakernet_ca-0:0.1-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sneakernet_ca@0.1-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "pyliblzma-0:0.5.3-7.el6cf.src",
"product": {
"name": "pyliblzma-0:0.5.3-7.el6cf.src",
"product_id": "pyliblzma-0:0.5.3-7.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pyliblzma@0.5.3-7.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "libdnet-0:1.12-11.el6cf.src",
"product": {
"name": "libdnet-0:1.12-11.el6cf.src",
"product_id": "libdnet-0:1.12-11.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libdnet@1.12-11.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "prince-0:9.0r2-4.el6cf.src",
"product": {
"name": "prince-0:9.0r2-4.el6cf.src",
"product_id": "prince-0:9.0r2-4.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/prince@9.0r2-4.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product_id": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netapp-manageability-sdk@4.0P1-3.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product_id": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-vnc-plugin@1.0.0-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "lshw-0:B.02.16-4.el6cf.src",
"product": {
"name": "lshw-0:B.02.16-4.el6cf.src",
"product_id": "lshw-0:B.02.16-4.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lshw@B.02.16-4.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product_id": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-qpid_messaging@0.20.2-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "wmi-0:1.3.14-1.el6cf.src",
"product": {
"name": "wmi-0:1.3.14-1.el6cf.src",
"product_id": "wmi-0:1.3.14-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/wmi@1.3.14-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product_id": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-pg@0.12.2-9.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product_id": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-eventmachine@1.0.7-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product_id": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-json@1.8.2-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product_id": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-nokogiri@1.5.11-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product_id": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-bcrypt-ruby@3.0.1-2.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product_id": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-io-extra@1.2.8-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product_id": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-psych@2.0.13-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product_id": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-ffi@1.9.8-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product_id": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-thin@1.3.1-9.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product_id": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby200-rubygem-therubyracer@0.11.0-5.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-0:5.4.0.5-1.el6cf.src",
"product": {
"name": "cfme-0:5.4.0.5-1.el6cf.src",
"product_id": "cfme-0:5.4.0.5-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme@5.4.0.5-1.el6cf?arch=src"
}
}
},
{
"category": "product_version",
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product_id": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cfme-gemset@5.4.0.5-1.el6cf?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product": {
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product_id": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/sneakernet_ca@0.1-2.el6cf?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.4.0.5-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src"
},
"product_reference": "cfme-0:5.4.0.5-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src"
},
"product_reference": "cfme-gemset-0:5.4.0.5-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64"
},
"product_reference": "cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src"
},
"product_reference": "cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64"
},
"product_reference": "cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64"
},
"product_reference": "cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-0:1.12-11.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src"
},
"product_reference": "libdnet-0:1.12-11.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-devel-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-devel-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnet-progs-0:1.12-11.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64"
},
"product_reference": "libdnet-progs-0:1.12-11.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-0:B.02.16-4.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src"
},
"product_reference": "lshw-0:B.02.16-4.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lshw-gui-0:B.02.16-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64"
},
"product_reference": "lshw-gui-0:B.02.16-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src"
},
"product_reference": "netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64"
},
"product_reference": "netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64"
},
"product_reference": "netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src"
},
"product_reference": "open-vm-tools-0:9.2.3-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64"
},
"product_reference": "open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prince-0:9.0r2-4.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src"
},
"product_reference": "prince-0:9.0r2-4.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "prince-0:9.0r2-4.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64"
},
"product_reference": "prince-0:9.0r2-4.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-0:0.5.3-7.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src"
},
"product_reference": "pyliblzma-0:0.5.3-7.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-0:0.5.3-7.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64"
},
"product_reference": "pyliblzma-0:0.5.3-7.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64"
},
"product_reference": "pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src"
},
"product_reference": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src"
},
"product_reference": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src"
},
"product_reference": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src"
},
"product_reference": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src"
},
"product_reference": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src"
},
"product_reference": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64"
},
"product_reference": "ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sneakernet_ca-0:0.1-2.el6cf.noarch as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch"
},
"product_reference": "sneakernet_ca-0:0.1-2.el6cf.noarch",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sneakernet_ca-0:0.1-2.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src"
},
"product_reference": "sneakernet_ca-0:0.1-2.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-0:1.3.14-1.el6cf.src as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src"
},
"product_reference": "wmi-0:1.3.14-1.el6cf.src",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-0:1.3.14-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64"
},
"product_reference": "wmi-0:1.3.14-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64 as a component of CloudForms Management Engine 5.4",
"product_id": "6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
},
"product_reference": "wmi-debuginfo-0:1.3.14-1.el6cf.x86_64",
"relates_to_product_reference": "6Server-CFME-5.4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ruby on Rails project"
]
},
{
"names": [
"Aaron Neyer"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-4389",
"cwe": {
"id": "CWE-134",
"name": "Use of Externally-Controlled Format String"
},
"discovery_date": "2013-09-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1013913"
}
],
"notes": [
{
"category": "description",
"text": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-actionmailer: email address processing DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue did not affect the versions of rubygem-actionmailer as shipped with Red Hat Subscription Asset Manager 1 as they do not include support for sending email using user supplied addresses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4389"
},
{
"category": "external",
"summary": "RHBZ#1013913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1013913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4389"
}
],
"release_date": "2013-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-actionmailer: email address processing DoS"
},
{
"cve": "CVE-2013-4492",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2013-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1039435"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in exceptions.rb in the i18n gem before 0.6.6 for Ruby allows remote attackers to inject arbitrary web script or HTML via a crafted I18n::MissingTranslationData.new call.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-i18n: cross-site scripting flaw in exception handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-4492"
},
{
"category": "external",
"summary": "RHBZ#1039435",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039435"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4492"
}
],
"release_date": "2013-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-i18n: cross-site scripting flaw in exception handling"
},
{
"acknowledgments": [
{
"names": [
"Ruby on Rails project"
]
}
],
"cve": "CVE-2014-7819",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2014-10-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1161527"
}
],
"notes": [
{
"category": "description",
"text": "Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-sprockets: arbitrary file existence disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-7819"
},
{
"category": "external",
"summary": "RHBZ#1161527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1161527"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-7819",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7819"
},
{
"category": "external",
"summary": "https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY",
"url": "https://groups.google.com/forum/#!topic/rubyonrails-security/doAVp0YaTqY"
}
],
"release_date": "2014-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-sprockets: arbitrary file existence disclosure"
},
{
"cve": "CVE-2015-1820",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2015-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1205291"
}
],
"notes": [
{
"category": "description",
"text": "REST client for Ruby (aka rest-client) before 1.8.0 allows remote attackers to conduct session fixation attacks or obtain sensitive cookie information by leveraging passage of cookies set in a response to a redirect.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "With the release of Satellite 6.9 available, this bug is being closed as wontfix as all parts of our Ruby stack are running under the SCL now with rest-client.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-1820"
},
{
"category": "external",
"summary": "RHBZ#1205291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1820"
}
],
"release_date": "2015-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-rest-client: session fixation vulnerability Set-Cookie headers present in an HTTP 30x redirection responses"
},
{
"cve": "CVE-2015-3448",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"discovery_date": "2015-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1240982"
}
],
"notes": [
{
"category": "description",
"text": "REST client for Ruby (aka rest-client) before 1.7.3 logs usernames and passwords, which allows local users to obtain sensitive information by reading the log.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-rest-client: unsanitized application logging",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-3448"
},
{
"category": "external",
"summary": "RHBZ#1240982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1240982"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-3448",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3448"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3448",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3448"
}
],
"release_date": "2015-01-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2015-06-16T12:28:42+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHBA-2015:1100"
},
{
"category": "workaround",
"details": "The permissions on log files can be changed, e.g. using \"chmod o-rwx\" to prevent anyone but the user and group owner of the file from reading it. Additionally the group permissions can also be removed, e.g. \"chmod g-rwx\" if only the user owning the file should be able to see it.",
"product_ids": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-appliance-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-debuginfo-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.src",
"6Server-CFME-5.4:cfme-gemset-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-lib-0:5.4.0.5-1.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.src",
"6Server-CFME-5.4:cfme-vnc-plugin-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:cfme-vnc-plugin-debuginfo-0:1.0.0-2.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.src",
"6Server-CFME-5.4:libdnet-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-debuginfo-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-devel-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:libdnet-progs-0:1.12-11.el6cf.x86_64",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.src",
"6Server-CFME-5.4:lshw-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-debuginfo-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:lshw-gui-0:B.02.16-4.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.src",
"6Server-CFME-5.4:netapp-manageability-sdk-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:netapp-manageability-sdk-devel-0:4.0P1-3.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.src",
"6Server-CFME-5.4:open-vm-tools-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-debuginfo-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-desktop-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:open-vm-tools-devel-0:9.2.3-5.el6cf.x86_64",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.src",
"6Server-CFME-5.4:prince-0:9.0r2-4.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.src",
"6Server-CFME-5.4:pyliblzma-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:pyliblzma-debuginfo-0:0.5.3-7.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-bcrypt-ruby-debuginfo-0:3.0.1-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-eventmachine-debuginfo-0:1.0.7-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-ffi-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-ffi-debuginfo-0:1.9.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-io-extra-debuginfo-0:1.2.8-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-json-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-json-debuginfo-0:1.8.2-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-nokogiri-debuginfo-0:1.5.11-2.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-pg-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-pg-debuginfo-0:0.12.2-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-psych-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-psych-debuginfo-0:2.0.13-1.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-qpid_messaging-debuginfo-0:0.20.2-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-therubyracer-debuginfo-0:0.11.0-5.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.src",
"6Server-CFME-5.4:ruby200-rubygem-thin-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:ruby200-rubygem-thin-debuginfo-0:1.3.1-9.el6cf.x86_64",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.noarch",
"6Server-CFME-5.4:sneakernet_ca-0:0.1-2.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.src",
"6Server-CFME-5.4:wmi-0:1.3.14-1.el6cf.x86_64",
"6Server-CFME-5.4:wmi-debuginfo-0:1.3.14-1.el6cf.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "rubygem-rest-client: unsanitized application logging"
}
]
}
FKIE_CVE-2013-4389
Vulnerability from fkie_nvd - Published: 2013-10-17 00:55 - Updated: 2026-04-29 01:13| Vendor | Product | Version | |
|---|---|---|---|
| rubyonrails | rails | * | |
| opensuse | opensuse | 12.2 | |
| opensuse | opensuse | 12.3 | |
| opensuse | opensuse | 13.1 | |
| debian | debian_linux | 7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"matchCriteriaId": "393CE9B0-AD9B-4A51-AC58-CF10BF115251",
"versionEndExcluding": "3.2.15",
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidadews de format string en archivos log_subscriber.rb en el componente de suscripci\u00f3n de log de Action Mailer en Ruby on Rails 3.x anterior a 3.2.15 permite a atacantes remotos causar una denegaci\u00f3n de servicio a trav\u00e9s de una direcci\u00f3n de email manipulada que es manejada de manera inapropiada durante la construcci\u00f3n de un mensaje de log."
}
],
"id": "CVE-2013-4389",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-17T00:55:03.320",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2888"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Exploit"
],
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2887"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-2888"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Exploit"
],
"url": "https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-134"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTA-2013-AVI-591
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été corrigée dans Ruby on Rails. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Ruby On Rail versions antérieures à 3.2.15
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eRuby On Rail versions ant\u00e9rieures \u00e0 3.2.15\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4389"
}
],
"links": [],
"reference": "CERTA-2013-AVI-591",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eRuby on\nRails\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Ruby on Rails",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails du 16 octobre 2013",
"url": "http://weblog.rubyonrails.org/2013/10/16/Rails-3-2-15-has-been-released/"
}
]
}
CERTA-2013-AVI-591
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été corrigée dans Ruby on Rails. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Ruby On Rail versions antérieures à 3.2.15
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eRuby On Rail versions ant\u00e9rieures \u00e0 3.2.15\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-4389",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4389"
}
],
"links": [],
"reference": "CERTA-2013-AVI-591",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eRuby on\nRails\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Ruby on Rails",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ruby on Rails du 16 octobre 2013",
"url": "http://weblog.rubyonrails.org/2013/10/16/Rails-3-2-15-has-been-released/"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.