rhsa-2013_1263
Vulnerability from csaf_redhat
Published
2013-09-16 03:07
Modified
2024-11-05 18:11
Summary
Red Hat Security Advisory: Red Hat Storage Console 2.1 security update
Notes
Topic
Updated Red Hat Storage Console packages that fix one security issue,
various bugs, and add enhancements are now available for Red Hat Storage
Server 2.1.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
Red Hat Storage Console (RHS-C) is a powerful and simple web based
Graphical User Interface for managing a Red Hat Storage 2.1 environment.
This feature is provided as a Technology Preview, and is currently not
supported under Red Hat Storage subscription services. Refer to the
following for more information about Technology Previews:
https://access.redhat.com/support/offerings/techpreview/
It was found that RESTEasy was vulnerable to XML External Entity (XXE)
attacks. If a remote attacker who is able to access the Red Hat Storage
Console REST API submitted a request containing an external XML entity
to a RESTEasy endpoint, the entity would be resolved, allowing the
attacker to read files accessible to the user running the application
server. This flaw affected DOM (Document Object Model) Document and JAXB
(Java Architecture for XML Binding) input. (CVE-2012-0818)
This update also fixes the following bugs:
* A new server could not be added to a cluster if the required packages
were not installed on the server. Now, the administrator can add a server
to a cluster which will automatically install the required packages, if
missing. (BZ#850431)
* Previously, the rhs-log-collector tool did not collect GlusterFS related
logs. (BZ#855271)
* Previously, it was not possible for rhsc-setup to complete successfully
on systems that have SELinux in disabled mode. (BZ#841342)
* The 'Add Brick' button in the 'Add Bricks' pop up is now placed next to
the 'Brick Directory' field for a better UI experience. (BZ#863929)
* The UUID of the volume was not visible. Now, a new field is added to the
'Summary' sub-tab of the 'Volumes' tab to display the UUIDs. (BZ#887806)
* The web console was not accessible after a server reboot. The setup
mechanism has been modified to ensure the web console is accessible after a
server reboot. (BZ#838284)
This update also adds the following enhancements:
* Previously, to import an existing storage cluster into the Red Hat
Storage Console the hosts were added one by one. Now, a new feature has
been added that allows users to import an existing storage cluster. The new
Cluster Creation window has an option to import an existing storage
cluster. If IP_Address or the hostname and password of one of the hosts of
the cluster is entered, a list containing all the hosts of the cluster is
displayed and the same can be added to the Console. The volumes which are
part of the cluster also get imported. (BZ#850438)
* The command line was required to enable a volume to use CIFS. Now, you
can enable or disable the export of a volume with the new 'CIFS' checkbox
in the 'Create Volume' window. (BZ#850452)
* The new Red Hat Support plug-in for Red Hat Storage is a Technology
Preview feature that offers seamless, integrated access to the Red Hat
subscription services from the Red Hat Customer Portal. Subscribers who
install this plug-in can access these features:
- Create, manage, and update the Red Hat support cases.
- Conveniently access exclusive Red Hat knowledge and solutions.
- Search error codes, messages, etc. and view related knowledge from the
Red Hat Customer Portal. (BZ#999245)
* A new 'Event ID' column is added to the 'Events' table in the 'Advanced
View' of 'Events' tab which allows users to see the ID of each event in the
'Events' tab. (BZ#889942)
* A new feature is added to manage and monitor the hooks on the Console. It
also reports changes in the hooks and checks for new hook scripts by
polling at regular intervals. (BZ#850483)
* A new 'Optimize for Virt Store' option is added to optimize a volume to
use it as a virt store. The system sets the "virt" group option on the
volume and also the following two volume options:
- storage.owner-uid=36
- storage.owner-gid=36
This option is available during volume creation and also for existing
volumes. (BZ#891493, BZ#891491)
All users of Red Hat Storage Server 2.1 are advised to upgrade to these
updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Red Hat Storage Console packages that fix one security issue,\nvarious bugs, and add enhancements are now available for Red Hat Storage\nServer 2.1.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Storage Console (RHS-C) is a powerful and simple web based\nGraphical User Interface for managing a Red Hat Storage 2.1 environment.\nThis feature is provided as a Technology Preview, and is currently not\nsupported under Red Hat Storage subscription services. Refer to the\nfollowing for more information about Technology Previews:\nhttps://access.redhat.com/support/offerings/techpreview/\n\nIt was found that RESTEasy was vulnerable to XML External Entity (XXE)\nattacks. If a remote attacker who is able to access the Red Hat Storage\nConsole REST API submitted a request containing an external XML entity\nto a RESTEasy endpoint, the entity would be resolved, allowing the\nattacker to read files accessible to the user running the application\nserver. This flaw affected DOM (Document Object Model) Document and JAXB\n(Java Architecture for XML Binding) input. (CVE-2012-0818)\n\nThis update also fixes the following bugs:\n\n* A new server could not be added to a cluster if the required packages\nwere not installed on the server. Now, the administrator can add a server\nto a cluster which will automatically install the required packages, if\nmissing. (BZ#850431)\n\n* Previously, the rhs-log-collector tool did not collect GlusterFS related\nlogs. (BZ#855271)\n\n* Previously, it was not possible for rhsc-setup to complete successfully\non systems that have SELinux in disabled mode. (BZ#841342)\n\n* The \u0027Add Brick\u0027 button in the \u0027Add Bricks\u0027 pop up is now placed next to\nthe \u0027Brick Directory\u0027 field for a better UI experience. (BZ#863929)\n\n* The UUID of the volume was not visible. Now, a new field is added to the\n\u0027Summary\u0027 sub-tab of the \u0027Volumes\u0027 tab to display the UUIDs. (BZ#887806)\n\n* The web console was not accessible after a server reboot. The setup\nmechanism has been modified to ensure the web console is accessible after a\nserver reboot. (BZ#838284)\n\nThis update also adds the following enhancements:\n\n* Previously, to import an existing storage cluster into the Red Hat\nStorage Console the hosts were added one by one. Now, a new feature has\nbeen added that allows users to import an existing storage cluster. The new\nCluster Creation window has an option to import an existing storage\ncluster. If IP_Address or the hostname and password of one of the hosts of\nthe cluster is entered, a list containing all the hosts of the cluster is\ndisplayed and the same can be added to the Console. The volumes which are\npart of the cluster also get imported. (BZ#850438)\n\n* The command line was required to enable a volume to use CIFS. Now, you\ncan enable or disable the export of a volume with the new \u0027CIFS\u0027 checkbox\nin the \u0027Create Volume\u0027 window. (BZ#850452)\n\n* The new Red Hat Support plug-in for Red Hat Storage is a Technology\nPreview feature that offers seamless, integrated access to the Red Hat\nsubscription services from the Red Hat Customer Portal. Subscribers who\ninstall this plug-in can access these features:\n\n- Create, manage, and update the Red Hat support cases.\n- Conveniently access exclusive Red Hat knowledge and solutions.\n- Search error codes, messages, etc. and view related knowledge from the\nRed Hat Customer Portal. (BZ#999245)\n\n* A new \u0027Event ID\u0027 column is added to the \u0027Events\u0027 table in the \u0027Advanced\nView\u0027 of \u0027Events\u0027 tab which allows users to see the ID of each event in the\n\u0027Events\u0027 tab. (BZ#889942)\n\n* A new feature is added to manage and monitor the hooks on the Console. It\nalso reports changes in the hooks and checks for new hook scripts by\npolling at regular intervals. (BZ#850483)\n\n* A new \u0027Optimize for Virt Store\u0027 option is added to optimize a volume to\nuse it as a virt store. The system sets the \"virt\" group option on the\nvolume and also the following two volume options:\n\n- storage.owner-uid=36\n- storage.owner-gid=36\n\nThis option is available during volume creation and also for existing\nvolumes. (BZ#891493, BZ#891491)\n\nAll users of Red Hat Storage Server 2.1 are advised to upgrade to these\nupdated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1263", "url": "https://access.redhat.com/errata/RHSA-2013:1263" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/support/offerings/techpreview/", "url": "https://access.redhat.com/support/offerings/techpreview/" }, { "category": "external", "summary": "785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "855271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=855271" }, { "category": "external", "summary": "863929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=863929" }, { "category": "external", "summary": "887806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=887806" }, { "category": "external", "summary": "889942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=889942" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1263.json" } ], "title": "Red Hat Security Advisory: Red Hat Storage Console 2.1 security update", "tracking": { "current_release_date": "2024-11-05T18:11:59+00:00", "generator": { "date": "2024-11-05T18:11:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2013:1263", "initial_release_date": "2013-09-16T03:07:00+00:00", "revision_history": [ { "date": "2013-09-16T03:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-09-16T03:08:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:11:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Storage Console 2.1", "product": { "name": "Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:2.1:console:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "python-ply-0:3.3-7.el6ev.noarch", "product": { "name": "python-ply-0:3.3-7.el6ev.noarch", "product_id": "python-ply-0:3.3-7.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ply@3.3-7.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "python-daemon-0:1.5.2-1.el6.noarch", "product": { "name": "python-daemon-0:1.5.2-1.el6.noarch", "product_id": "python-daemon-0:1.5.2-1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-daemon@1.5.2-1.el6?arch=noarch" } } }, { "category": "product_version", "name": "python-kitchen-0:1.1.1-2.el6ev.noarch", "product": { "name": "python-kitchen-0:1.1.1-2.el6ev.noarch", "product_id": "python-kitchen-0:1.1.1-2.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-kitchen@1.1.1-2.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product": { "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product_id": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-sdk@2.1.0.0-0.bb3a.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product": { "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product_id": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-cli@2.1.0.0-0.bb3a.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "product": { "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "product_id": "rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-log-collector@2.1-0.1.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "python-lockfile-0:0.8-5.el6.noarch", "product": { "name": "python-lockfile-0:0.8-5.el6.noarch", "product_id": "python-lockfile-0:0.8-5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-lockfile@0.8-5.el6?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-webadmin-portal@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-tools@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-restapi@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-backend@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-dbscripts@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "product": { "name": "rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "product_id": "rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-setup@2.1.0-0.bb10.el6rhs?arch=noarch" } } }, { "category": "product_version", "name": "otopi-repolib-0:1.1.0-1.el6ev.noarch", "product": { "name": "otopi-repolib-0:1.1.0-1.el6ev.noarch", "product_id": "otopi-repolib-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/otopi-repolib@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "otopi-devel-0:1.1.0-1.el6ev.noarch", "product": { "name": "otopi-devel-0:1.1.0-1.el6ev.noarch", "product_id": "otopi-devel-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/otopi-devel@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "otopi-0:1.1.0-1.el6ev.noarch", "product": { "name": "otopi-0:1.1.0-1.el6ev.noarch", "product_id": "otopi-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/otopi@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "otopi-java-0:1.1.0-1.el6ev.noarch", "product": { "name": "otopi-java-0:1.1.0-1.el6ev.noarch", "product_id": "otopi-java-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/otopi-java@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "product": { "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "product_id": "ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-deploy@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "product": { "name": "ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "product_id": "ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-deploy-java@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "product": { "name": "ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "product_id": "ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-deploy-repolib@1.1.0-1.el6ev?arch=noarch" } } }, { "category": "product_version", "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "product": { "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "product_id": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-access-plugin-storage@2.1.0-0.el6rhs?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-ply-0:3.3-7.el6ev.src", "product": { "name": "python-ply-0:3.3-7.el6ev.src", "product_id": "python-ply-0:3.3-7.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ply@3.3-7.el6ev?arch=src" } } }, { "category": "product_version", "name": "python-daemon-0:1.5.2-1.el6.src", "product": { "name": "python-daemon-0:1.5.2-1.el6.src", "product_id": "python-daemon-0:1.5.2-1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-daemon@1.5.2-1.el6?arch=src" } } }, { "category": "product_version", "name": "python-kitchen-0:1.1.1-2.el6ev.src", "product": { "name": "python-kitchen-0:1.1.1-2.el6ev.src", "product_id": "python-kitchen-0:1.1.1-2.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-kitchen@1.1.1-2.el6ev?arch=src" } } }, { "category": "product_version", "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "product": { "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "product_id": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-sdk@2.1.0.0-0.bb3a.el6rhs?arch=src" } } }, { "category": "product_version", "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "product": { "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "product_id": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-cli@2.1.0.0-0.bb3a.el6rhs?arch=src" } } }, { "category": "product_version", "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.src", "product": { "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.src", "product_id": "rhsc-log-collector-0:2.1-0.1.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc-log-collector@2.1-0.1.el6rhs?arch=src" } } }, { "category": "product_version", "name": "python-lockfile-0:0.8-5.el6.src", "product": { "name": "python-lockfile-0:0.8-5.el6.src", "product_id": "python-lockfile-0:0.8-5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-lockfile@0.8-5.el6?arch=src" } } }, { "category": "product_version", "name": "rhsc-0:2.1.0-0.bb10.el6rhs.src", "product": { "name": "rhsc-0:2.1.0-0.bb10.el6rhs.src", "product_id": "rhsc-0:2.1.0-0.bb10.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhsc@2.1.0-0.bb10.el6rhs?arch=src" } } }, { "category": "product_version", "name": "otopi-0:1.1.0-1.el6ev.src", "product": { "name": "otopi-0:1.1.0-1.el6ev.src", "product_id": "otopi-0:1.1.0-1.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/otopi@1.1.0-1.el6ev?arch=src" } } }, { "category": "product_version", "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.src", "product": { "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.src", "product_id": "ovirt-host-deploy-0:1.1.0-1.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovirt-host-deploy@1.1.0-1.el6ev?arch=src" } } }, { "category": "product_version", "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "product": { "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "product_id": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/redhat-access-plugin-storage@2.1.0-0.el6rhs?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "otopi-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.noarch" }, "product_reference": "otopi-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "otopi-0:1.1.0-1.el6ev.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.src" }, "product_reference": "otopi-0:1.1.0-1.el6ev.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "otopi-devel-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:otopi-devel-0:1.1.0-1.el6ev.noarch" }, "product_reference": "otopi-devel-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "otopi-java-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:otopi-java-0:1.1.0-1.el6ev.noarch" }, "product_reference": "otopi-java-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "otopi-repolib-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:otopi-repolib-0:1.1.0-1.el6ev.noarch" }, "product_reference": "otopi-repolib-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.noarch" }, "product_reference": "ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-deploy-0:1.1.0-1.el6ev.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.src" }, "product_reference": "ovirt-host-deploy-0:1.1.0-1.el6ev.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch" }, "product_reference": "ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch" }, "product_reference": "ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-daemon-0:1.5.2-1.el6.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.noarch" }, "product_reference": "python-daemon-0:1.5.2-1.el6.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-daemon-0:1.5.2-1.el6.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.src" }, "product_reference": "python-daemon-0:1.5.2-1.el6.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-kitchen-0:1.1.1-2.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.noarch" }, "product_reference": "python-kitchen-0:1.1.1-2.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-kitchen-0:1.1.1-2.el6ev.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.src" }, "product_reference": "python-kitchen-0:1.1.1-2.el6ev.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-lockfile-0:0.8-5.el6.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.noarch" }, "product_reference": "python-lockfile-0:0.8-5.el6.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-lockfile-0:0.8-5.el6.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.src" }, "product_reference": "python-lockfile-0:0.8-5.el6.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-ply-0:3.3-7.el6ev.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.noarch" }, "product_reference": "python-ply-0:3.3-7.el6ev.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "python-ply-0:3.3-7.el6ev.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.src" }, "product_reference": "python-ply-0:3.3-7.el6ev.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch" }, "product_reference": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src" }, "product_reference": "redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-0:2.1.0-0.bb10.el6rhs.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.src" }, "product_reference": "rhsc-0:2.1.0-0.bb10.el6rhs.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch" }, "product_reference": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src" }, "product_reference": "rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.noarch" }, "product_reference": "rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-log-collector-0:2.1-0.1.el6rhs.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.src" }, "product_reference": "rhsc-log-collector-0:2.1-0.1.el6rhs.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch" }, "product_reference": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src" }, "product_reference": "rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch as a component of Red Hat Storage Console 2.1", "product_id": "6Server-RHSC-2.1:rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch" }, "product_reference": "rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch", "relates_to_product_reference": "6Server-RHSC-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-0818", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2012-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785631" } ], "notes": [ { "category": "description", "text": "RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "RESTEasy: XML eXternal Entity (XXE) flaw", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:otopi-devel-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.src", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.noarch", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.src", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.noarch", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.src", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.noarch", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.src", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.src", "6Server-RHSC-2.1:rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.src", "6Server-RHSC-2.1:rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "category": "external", "summary": "RHBZ#785631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0818", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" } ], "release_date": "2011-12-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-09-16T03:07:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:otopi-devel-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.src", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.noarch", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.src", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.noarch", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.src", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.noarch", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.src", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.src", "6Server-RHSC-2.1:rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.src", "6Server-RHSC-2.1:rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1263" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:otopi-devel-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:otopi-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-0:1.1.0-1.el6ev.src", "6Server-RHSC-2.1:ovirt-host-deploy-java-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:ovirt-host-deploy-repolib-0:1.1.0-1.el6ev.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.noarch", "6Server-RHSC-2.1:python-daemon-0:1.5.2-1.el6.src", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.noarch", "6Server-RHSC-2.1:python-kitchen-0:1.1.1-2.el6ev.src", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.noarch", "6Server-RHSC-2.1:python-lockfile-0:0.8-5.el6.src", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.noarch", "6Server-RHSC-2.1:python-ply-0:3.3-7.el6ev.src", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.noarch", "6Server-RHSC-2.1:redhat-access-plugin-storage-0:2.1.0-0.el6rhs.src", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-0:2.1.0-0.bb10.el6rhs.src", "6Server-RHSC-2.1:rhsc-backend-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-cli-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-dbscripts-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-log-collector-0:2.1-0.1.el6rhs.src", "6Server-RHSC-2.1:rhsc-restapi-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-sdk-0:2.1.0.0-0.bb3a.el6rhs.src", "6Server-RHSC-2.1:rhsc-setup-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-tools-0:2.1.0-0.bb10.el6rhs.noarch", "6Server-RHSC-2.1:rhsc-webadmin-portal-0:2.1.0-0.bb10.el6rhs.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "RESTEasy: XML eXternal Entity (XXE) flaw" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.